Blog

Publication: Towards mobility reports with user-level privacy

Mobility data, even aggregated statistics, can usually not be shared without privacy concerns. Within this publication, my co-authors Saskia Nuñez von Voigt, Helena Mihaljević, and Florian Tschorsch and I aim to provide a report that compiles typical analyses of urban human mobility and provides privacy guarantees so that it can be shared freely. [Download paper]…

Publication: Collection, usage and privacy of mobility data in the enterprise and public administrations

What mobility data sources are used in practice? For which purposes? Which models are used? What privacy enhancements are already implemented? I asked 13 experts from public administrations, public transit companies, mobility platforms and apps, automobile manufacturers, sensor companies, and market research companies and presented my results at the Privacy Enhancing Technologies Symposium 2022, which…

How much privacy do “Privacy Zones” provide?

In this post, I gave an overview of different privacy-enhancing techniques for mobility data. This post is the first to deep-dive into single specific techniques by looking into privacy zones. Social-network sports apps like Strava are used to track and share personal sporting performances, including pictures and GPS traces. This has led to undesired events:…

Attack scenarios – how adversaries retrieve sensitive information

Attack scenarios are used in privacy research to describe how an adversary potentially obtains sensitive information about a person. Such a scenario entails assumptions on side information available to an adversary, which sensitive information the adversary wants to retrieve, and how they use the side information to retrieve the sensitive information. Such scenarios are used…

Loading…

Something went wrong. Please refresh the page and/or try again.

Subscribe

Subscribe to blog post updates.

RSS: https://alexandrakapp.blog/feed