608
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Influence of tracking duration on the privacy of individual mobility graphs

, , , &
Pages 370-388 | Received 15 Feb 2023, Accepted 15 Jul 2023, Published online: 27 Jul 2023

References

  • Andrés, M. E., N. E. Bordenabe, K. Chatzikokolakis, and Catuscia Palamidessi. 2013. “Geo-Indistinguishability: Differential Privacy for Location-Based Systems.” In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, Berlin, Germany, 901–914.
  • Banerjee, Syagnik. 2019. “Geosurveillance, Location Privacy, and Personalization.” Journal of Public Policy & Marketing 380 (4): 0 484–499. https://doi.org/10.1177/0743915619860137.
  • Charleux, Laure, and Katherine Schofield. 2020. “True Spatial K-Anonymity: Adaptive Areal Elimination Vs. Adaptive Areal Masking.” Cartography and Geographic Information Science 470 (6): 0 537–549. https://doi.org/10.1080/15230406.2020.1794975.
  • Craswell, Nick. 2009. “Mean Reciprocal Rank.“ Encyclopedia of Database Systems, 1703. Springer US
  • De Montjoye, Yves-Alexandre, César A Hidalgo, Michel Verleysen, and Vincent D Blondel. 2013. “Unique in the Crowd: The Privacy Bounds of Human Mobility.” Scientific Reports 30 (1): 0 1–5. https://doi.org/10.1038/srep01376.
  • De Mulder, Yoni, George Danezis, Lejla Batina, and Bart Preneel. 2008. “Identification via Location-Profiling in GSM Networks.” In Proceedings of the 7th ACM workshop on Privacy in the electronic society, Alexandria Virginia USA, 23–32.
  • Duckham, Matt, and Lars Kulik. 2005. “A Formal Model of Obfuscation and Negotiation for Location Privacy.” In Pervasive Computing 3468 152–170. Berlin Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/11428572_10.
  • Fiore, Marco, Panagiota Katsikouli, Elli Zavou, Mathieu Cunche, Françoise Fessant, Dominique Le Hello, Ulrich Matchi Aivodji, Baptiste Olivier, Tony Quertier, and Razvan Stanica. 2020. “Privacy in Trajectory Micro-Data Publishing: A Survey.“ Transactions on Data Privacy 13: 91–149.
  • Floyd, Robert W. 1962. “Algorithm 97: Shortest Path.” Communications of the ACM 50 (6): 0 345. https://doi.org/10.1145/367766.368168.
  • Freeman, Linton C. 1977. “A Set of Measures of Centrality Based on Betweenness.” Sociometry 40 (1): 35–41. https://doi.org/10.2307/3033543.
  • Gambs, Sébastien, Marc-Olivier Killijian, and Miguel Núñez Del Prado Cortez. 2014. “De-Anonymization Attack on Geolocated Data.” Journal of Computer and System Sciences 800 (8): 0 1597–1614. https://doi.org/10.1016/j.jcss.2014.04.024.
  • Golle, Philippe and Kurt Partridge. 2009. “On the Anonymity of Home/Work Location Pairs.” In International Conference on Pervasive Computing, Nara, Japan, 390–397. Springer.
  • Gruteser, Marco and Dirk Grunwald. 2003. “Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In Proceedings of the 1st international conference on Mobile systems, applications and services Boppard, Germany, 31–42.
  • Guixiang, Ma, Nesreen K Ahmed, Theodore L Willke, and Philip S Yu. 2021. “Deep Graph Similarity Learning: A Survey.” Data Mining and Knowledge Discovery 35:0 688–725. https://doi.org/10.1007/s10618-020-00733-5.
  • Haussler, David. 1999. Convolution Kernels on Discrete Structures. Technical report, Department of Computer Science, University of California.
  • Haydari, Ammar, Michael Zhang, Chen-Nee Chuah, Jane Macfarlane, and Sean Peisert. 2021 https://arxiv.org/abs/2112.08487. “Adaptive Differential Privacy Mechanism for Aggregated Mobility Dataset.“ arXiv e-prints. arXiv:2112.08487 [cs].
  • Keßler, Carsten, and Grant McKenzie. 2018. “A Geoprivacy Manifesto.” Transactions in GIS 220 (1): 0 3–19. https://doi.org/10.1111/tgis.12305.
  • Kounadi, Ourania, Bernd Resch, and Andreas Petutschnig. 2018. “Privacy Threats and Protection Recommendations for the Use of Geosocial Network Data in Research.” Social Sciences 7 (10): 191. https://doi.org/10.3390/socsci7100191.
  • Manousakas, Dionysis, Cecilia Mascolo, Alastair R Beresford, Dennis Chan, and Nikhil Sharma. 2018. “Quantifying Privacy Loss of Human Mobility Graph Topology.” Proceedings on Privacy Enhancing Technologies 20180 (3): 0 5–21. https://doi.org/10.1515/popets-2018-0018.
  • Martin, Henry, Henrik Becker, Dominik Bucher, David Jonietz, Martin Raubal, and Kay W. Axhausen. 2019. “Begleitstudie SBB Green Class-Abschlussbericht.” Arbeitsberichte Verkehrs-und Raumplanung 1439. https://doi.org/10.3929/ethz-b-000353337.
  • Martin, Henry, Dominik Bucher, Esra Suel, Pengxiang Zhao, Fernando Perez-Cruz, and Martin Raubal. 2018. “Graph Convolutional Neural Networks for Human Activity Purpose Imputation. In NIPS spatiotemporal workshop at the 32nd Annual conference on neural information processing systems (NIPS 2018), Montreal, Canada.
  • Martin, Henry, Ye Hong, Nina Wiedemann, Dominik Bucher, and Martin Raubal. 2023. “Trackintel: An Open-Source Python Library for Human Mobility Analysis.” Computers, Environment and Urban Systems 101:101938. https://doi.org/10.1016/j.compenvurbsys.2023.101938.
  • Martin, Henry, Nina Wiedemann, Daniel J Reck, and Martin Raubal. 2023. “Graph-Based Mobility Profiling.” Computers, Environment and Urban Systems 100:101910. https://doi.org/10.1016/j.compenvurbsys.2022.101910.
  • Melendez, Steven, and Alex Pasternack. 2019. “Here are the Data Brokers Quietly Buying and Selling Your Personal Information.” The Fast Company. https://www.fastcompany.com/90310803/here-are-the-data-brokers-quietly-buying-and-selling-your-personal-information.
  • Pappalardo, Luca, Filippo Simini, Salvatore Rinzivillo, Dino Pedreschi, Fosca Giannotti, and Albert-László Barabási. 2015. “Returners and Explorers Dichotomy in Human Mobility.” Nature Communications 60 (1): 0 8166. https://doi.org/10.1038/ncomms9166.
  • Primault, Vincent, Antoine Boutet, Sonia Ben Mokhtar, and Lionel Brunie. 2018. “The Long Road to Computational Location Privacy: A Survey.” IEEE Communications Surveys & Tutorials 210 (3): 0 2772–2793. https://doi.org/10.1109/COMST.2018.2873950.
  • Raubal, Martin, Dominik Bucher, and Henry Martin. 2021. “Geosmartness for Personalized and Sustainable Future Urban Mobility.” In Urban Informatics, 59–83. Springer Singapore. https://doi.org/10.1007/978-981-15-8983-6_6.
  • Riesen, Kaspar, Xiaoyi Jiang, and Horst Bunke. 2010. “Exact and Inexact Graph Matching: Methodology and Applications.” In Managing and Mining Graph Data, 217–247. Springer US. https://doi.org/10.1007/978-1-4419-6045-0_7.
  • Rinzivillo, Salvatore, Lorenzo Gabrielli, Mirco Nanni, Luca Pappalardo, Dino Pedreschi, and Fosca Giannotti. 2014. The Purpose of Motion: Learning Activities from Individual Mobility Networks. In 2014 International Conference on Data Science and Advanced Analytics (DSAA), Shanghai, China, 312–318. IEEE.
  • Rossi, Luca, James Walker, and Mirco Musolesi. 2015. “Spatio-Temporal Techniques for User Identification by Means of GPS Mobility Data.” EPJ Data Science 40 (1): 0 11. https://doi.org/10.1140/epjds/s13688-015-0049-x.
  • Shokri, Reza, Carmela Troncoso, Claudia Diaz, Julien Freudiger, and Jean-Pierre Hubaux. 2010. “Unraveling an Old Cloak: K-Anonymity for Location Privacy.” In Proceedings of the 9th annual ACM workshop on Privacy in the electronic society, Chicago, USA, 115–118.
  • Song, Chaoming, Qu Zehui, Nicholas Blumm, and Albert-László Barabási. 2010. “Limits of Predictability in Human Mobility.” Science: Advanced Materials and Devices 3270 (5968): 0 1018–1021. https://doi.org/10.1126/science.1177170.
  • Sweeney, Latanya. 2002. “K-Anonymity: A Model for Protecting Privacy.” International Journal of Uncertainty, Fuzziness & Knowledge-Based Systems 100 (5): 0 557–570. https://doi.org/10.1142/S0218488502001648.
  • Thompson, Stuart A and Charlie Warzel. 2019. “The Privacy Project: Twelve Million Phones, One Dataset, Zero Privacy.” The New York Times. https://www.nytimes.com/interactive/2019/12/19/opinion/location-tracking-cell-phone.html.
  • Tong, Wei, Yinggang Tong, Chang Xia, Jingyu Hua, Li Qun, and Sheng Zhong. 2022. “Understanding Location Privacy of the Point-Of-Interest Aggregate Data via Practical Attacks and Defenses.“ IEEE Transactions on Dependable and Secure Computing 20 (3): 2433–2449.
  • Wang, Leye, Gehua Qin, Dingqi Yang, Xiao Han, and Ma. Xiaojuan. 2017. “Geographic Differential Privacy for Mobile Crowd Coverage Maximization.” arXiv: 1710,10477 [Cs] 32. https://doi.org/10.1609/aaai.v32i1.11285.
  • Warshall, Stephen. 1962. “A Theorem on Boolean Matrices.” Journal of the ACM (JACM) 90 (1): 0 11–12. https://doi.org/10.1145/321105.321107.
  • Wiedemann, Nina, Henry Martin, and Martin Raubal. 2022. “Unlocking Social Network Analysis Methods for Studying Human Mobility.” AGILE: GIScience Series 3:0 19. https://doi.org/10.5194/agile-giss-3-19-2022.
  • Yanardag, Pinar and S. V. N. Vishwanathan. 2015. “Deep Graph Kernels.” In Proceedings of the 21th ACM SIGKDD international conference on knowledge discovery and data mining, Sydney, NSW, Australia, 1365–1374. New York, NY, USA: Association for Computing Machinery.
  • Zang, Hui and Jean Bolot. 2011. “Anonymization of Location Data Does Not Work: A Large-Scale Measurement Study.” In Proceedings of the 17th annual international conference on Mobile computing and networking, Las Vegas, USA, 145–156.
  • Zhen, Tu, Kai Zhao, Xu Fengli, Li Yong, Li Su, and Depeng Jin. 2019. “Protecting Trajectory from Semantic Attack Considering K -Anonymity, L-Diversity, and T-Closeness.” IEEE Transactions on Network and Service Management 160 (1): 0 264–278. https://doi.org/10.1109/TNSM.2018.2877790.