2017
DOI: 10.1109/tmc.2016.2561281
|View full text |Cite
|
Sign up to set email alerts
|

Quantifying Interdependent Privacy Risks with Location Data

Abstract: Abstract-Co-location information about users is increasingly available online. For instance, mobile users more and more frequently report their co-locations with other users in the messages and in the pictures they post on social networking websites by tagging the names of the friends they are with. The users' IP addresses also constitute a source of co-location information. Combined with (possibly obfuscated) location information, such co-locations can be used to improve the inference of the users' locations,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
45
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 72 publications
(45 citation statements)
references
References 39 publications
0
45
0
Order By: Relevance
“…In the case where co-located users are directly tagged by the uploader, detection is, obviously, no longer needed. The context provided to a consenter in the case of co-location data could also include an estimation of the location privacy loss stemming from that reported co-location, as proposed by Olteanu et al [53]. However, as co-locations introduce dependencies among the data of different users, once a co-location between Alice and Bob is shared, Alice's future location posts would also affect Bob's location privacy and vice versa.…”
Section: Discussion: Limitations and Extensionmentioning
confidence: 99%
See 1 more Smart Citation
“…In the case where co-located users are directly tagged by the uploader, detection is, obviously, no longer needed. The context provided to a consenter in the case of co-location data could also include an estimation of the location privacy loss stemming from that reported co-location, as proposed by Olteanu et al [53]. However, as co-locations introduce dependencies among the data of different users, once a co-location between Alice and Bob is shared, Alice's future location posts would also affect Bob's location privacy and vice versa.…”
Section: Discussion: Limitations and Extensionmentioning
confidence: 99%
“…Beyond MSPD data, recent studies showed that seemingly strictly personal data reveals information about other individuals [18], [36], [45], [53]. This concept is referred to as interdependent personal data (IPD; the term interdependent privacy was coined by Biczók and Chia [12]).…”
Section: Introductionmentioning
confidence: 99%
“…The main differences between our work and Shokri et al's are (1) the use of general Bayesian networks to model users' behavior and (2) a two-step background construction (i.e., first semantic, then geographical) to deal with sparse data. Similarly, but orthogonal, to our work, in [12], the authors study the effect of co-location information (e.g., Alice and Bob are at the same (unknown) location at 2pm) on users' location privacy. As for obfuscation mechanisms, a detailed survey can be found in [1].…”
Section: Related Workmentioning
confidence: 95%
“…This however, makes existing techniques for background construction inefficient due to the sparsity of the transition data (although many transitions go from one geographical region to another, the number of transitions from a couple (region, semantic tag) to another is significantly reduced). Also, recent work have shown that moving from Hidden Markov Models to Bayesian networks enables the adversary to take into account more complex information such as colocation [12]. The main differences between our work and Shokri et al's are (1) the use of general Bayesian networks to model users' behavior and (2) a two-step background construction (i.e., first semantic, then geographical) to deal with sparse data.…”
Section: Related Workmentioning
confidence: 96%
“…Location tracking has achieved significant attention in the research community [44,96,73,67,92] and great notoriety in the news cycle. In late 2017, Quartz [16] reported that Android devices sent location data to Google when they were within range of a new cell tower.…”
Section: Introductionmentioning
confidence: 99%