2019
DOI: 10.1111/tgis.12606
|View full text |Cite
|
Sign up to set email alerts
|

MaskMy.XYZ: An easy‐to‐use tool for protecting geoprivacy using geographic masks

Abstract: Geographic masks are techniques used to protect privacy when publishing sensitive data in maps, but are not well adopted among researchers and may be difficult to execute for some GIS users. We developed a client‐side web application called MaskMy.XYZ that makes geographic masking easy to perform. It executes donut geomasking, a well‐known geographic mask, on thousands of points in seconds, and visualizes the original and masked point patterns in an integrated web map for visual comparison. MaskMy.XYZ also fea… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 14 publications
(20 citation statements)
references
References 23 publications
0
19
0
Order By: Relevance
“…2b. Random perturbation, firstly proposed by Armstrong et al [20], is one of the most widely used geomasking methods [47]. The method displaces each point in a dataset to a random location within a buffer area centered at the original point [20].…”
Section: Daily Activity Locations (Dal) K-anonymity For Individual Gpmentioning
confidence: 99%
“…2b. Random perturbation, firstly proposed by Armstrong et al [20], is one of the most widely used geomasking methods [47]. The method displaces each point in a dataset to a random location within a buffer area centered at the original point [20].…”
Section: Daily Activity Locations (Dal) K-anonymity For Individual Gpmentioning
confidence: 99%
“…Data custodians can utilize the travel time information to exclude locations that can result in high travel time errors. In this light, an interactive geomasking platform between data custodians and data users for addressing travel time errors may be helpful (e.g., Ajayakumar, Curtis, & Curtis, 2019; Swanlund et al., 2020).…”
Section: Resultsmentioning
confidence: 99%
“…Point data, even when only disclosed on published maps, can often be reverse engineered (Curtis et al 2006, Kounadi and Leitner 2014). To alleviate this, geomasking (or perturbing) techniques can be applied to such data (Swanlund et al 2020) but LBS provide additional challenges to privacy as they can contain more precise, expansive, and linkable data than conventional point data sets (Gao et al 2019). De-anonymization and re-identification are very serious concerns.…”
Section: Privacy and Ethicsmentioning
confidence: 99%