Category: Allgemein
-
You’re more unique than you think – about the difficulty of anonymizing mobility data
One of the main reasons why people can easily be re-identified in mobility data is because mobility patterns are highly unique. Consider your visited locations over the last few days, where did you go and when? E.g., you have been to your home, university, fitness studio, and your favorite supermarket. This combination of locations visited…
-
Publication: Towards mobility reports with user-level privacy
Mobility data, even aggregated statistics, can usually not be shared without privacy concerns. Within this publication, my co-authors Saskia Nuñez von Voigt, Helena Mihaljević, and Florian Tschorsch and I aim to provide a report that compiles typical analyses of urban human mobility and provides privacy guarantees so that it can be shared freely. [Download paper]…
-
Publication: Collection, usage and privacy of mobility data in the enterprise and public administrations
What mobility data sources are used in practice? For which purposes? Which models are used? What privacy enhancements are already implemented? I asked 13 experts from public administrations, public transit companies, mobility platforms and apps, automobile manufacturers, sensor companies, and market research companies and presented my results at the Privacy Enhancing Technologies Symposium 2022, which…
-
How much privacy do “Privacy Zones” provide?
In this post, I gave an overview of different privacy-enhancing techniques for mobility data. This post is the first to deep-dive into single specific techniques by looking into privacy zones. Social-network sports apps like Strava are used to track and share personal sporting performances, including pictures and GPS traces. This has led to undesired events:…
-
Attack scenarios – how adversaries retrieve sensitive information
Attack scenarios are used in privacy research to describe how an adversary potentially obtains sensitive information about a person. Such a scenario entails assumptions on side information available to an adversary, which sensitive information the adversary wants to retrieve, and how they use the side information to retrieve the sensitive information. Such scenarios are used…
-
How is mobility data sensitive information?
Political opinions, religious beliefs, sexual orientation, or health issues are typical examples of obvious sensitive information in the need of data protection. While human mobility data is also personal data, it is inherently complex and thus there are different aspects that can be considered sensitive. Is only the information about a person’s home and their…
-
Privacy-preserving techniques and how they apply to mobility data
What does it actually mean to “anonymize” data? With this blog post, I want to give an overview of different established methods and how they apply to mobility data. (The survey of Fiore et al., 2020 has been a major source for this overview). First of all, it should be noted, that there is a…
-
What is Human Mobility Data good for? Part 2 – Routing and Traffic Management
This is the second part of the series on use cases based on human mobility data. After part 1 about urban and traffic planning, we will have a closer look at routing and traffic management in this post. Unlike the mid- to long-term planning use cases in part 1, routing and traffic management applications optimize the…
-
Real-Life Privacy Breaches: Why Mobility Data needs Protection
The General Data Protection Regulation (GDPR) of 2016 was a novel and unique law to secure the privacy and security of personal data, but it was not introduced without criticism. Companies see the GDPR as an obstacle that hinders them to pursue their use cases and which poses unrealistically high demands. Privacy threats on the…
-
What is Human Mobility Data good for? Part 1 – Urban and Traffic Planning
There is a common misconception by data scientists who are not familiar with privacy measures that anonymization of data happens prior to and is independent of further analyses. The anonymized data can then supposedly be used for any desired use case. But the opposite is true: the better you know your use cases the more…