Home| Contact Us| New Journals| Browse Journals| Journal Prices| For Authors|

Print ISSN: 0976-9005
Online ISSN:
0976-9013


  About JIC
  DLINE Portal Home
Home
Aims & Scope
Editorial Board
Current Issue
Next Issue
Previous Issue
Sample Issue
Upcoming Conferences
Self-archiving policy
Alert Services
Be a Reviewer
Publisher
Paper Submission
Subscription
Contact us
 
  How To Order
  Order Online
Price Information
Request for Complimentary
Print Copy
 
  For Authors
  Guidelines for Contributors
Online Submission
Call for Papers
Author Rights
 
 
RELATED JOURNALS
Journal of Digital Information Management (JDIM)
International Journal of Computational Linguistics Research (IJCL)
International Journal of Web Application (IJWA)

 

 
Journal of Intelligent Computing
 

Study of the Geomasking Effects using K-Anonymity
Fiona Polzin, Ourania Kounadi
ITC-Faculty of Geoinformation and Earth Observation University of Twente, Enschede, The Netherlands., Department of Geography and Regional Research University of Vienna Austria
Abstract: The discrete spatial information set is grouped and modified the original points to arrive for the protection of Geomasks. We have developed Adaptive Voronoi Masking which relies on Adaptive Aerial Elimination (AAE) and Voronoi Masking and it serves a potential alternative. It uses the population density by establishing areas of K-anonymity in which Voronoi polygons are created. AVM uses the underlying topography and displaces data points to street intersections. This process enables the decreases the risk of false-identification since residences are not endowed with a data point. We in the work further assessed the geomasking effects of AVM by many spatial analytical results and compared with the outputs of AAE, VM, and Donut Masking (DM). We found that the VM attains the best efficiency for the mean centres whereas DM does for the median centres. DM proved to the strongest performance since its cluster ellipsoids and clustering distance are the most similar to those of the original data. Finally, we found that the AVM was ranked as 2nd in terms of data utility (i) and also outperforms all methods regarding the risk of false re-identification. AVM is found to be an advantageous technique to mask geodata which is assessed with the help of the performance combination of all the factors.
Keywords: Geoprivacy, Location Privacy, Geomasking, Adaptive Voronoi Masking, Voronoi Masking, Adaptive Aerial Elimination, Donut Geomasking, ESDA Study of the Geomasking Effects using K-Anonymity
DOI:https://doi.org/10.6025/jic/2021/12/4/107-121
Full_Text   PDF 1.05 MB   Download:   94  times
References:

[1] Ajayakumar, Jayakrishnan., Curtis, Andrew J., Curtis, Jacqueline. (2019). Addressing the data guardian and geospatial scientist collaborator dilemma: how to share health records for spatial analysis while maintaining patient confidentiality. International Journal of Health Geographics, 18 (1) 1–12.
[2] Allshouse, William B., Fitch, Molly K., Hampton, Kristen H., Gesink, Dionne C., Doherty, Irene A., Leone, Peter A., Serre, Marc L., Miller, William C. (2010). Geomasking sensitive health data and privacy protection: an evaluation using an e911 database. Geocarto international, 25 (6) 443– 452, 2010.
[3] Armstrong, Marc P., Rushton, Gerard., Zimmerman, Dale L. (1999). Geographically masking health data to preserve confidentiality. Statistics in medicine, 18 (5) 497–525.
[4] Brownsteinm, John S., Cassa, Christopher A., Mandl, Kenneth D. (2006). No place to hide—reverse identification of patients from published maps. New England Journal of Medicine, 355 (16) 1741– 1742.
[5] Cassa, Christopher A., Grannis, Shaun J., Overhage, J Marc., Mandl, Kenneth D. (2006). A contextsensitive approach to anonymizing spatial surveillance data: impact on outbreak detection. Journal of the American Medical Informatics Association, 13 (2) 160–165.
[6] Chainey, Spencer., Tompson, Lisa., Uhlig, Sebastian. (2008). The utility of hotspot mapping for predicting spatial patterns of crime. Security journal, 21 (1-2) 4–28.
[7] National Research Council et al. (2007). Putting people on the map: Protecting confidentiality with linked social-spatial data. National Academies Press.
[8] Dixon, Philip M. (2014). R ipley’s k function. Wiley StatsRef: Statistics Reference Online.
[9] Duckham, Matt., Kulik, Lars. (2006). Location privacy and location-aware computing. Dynamic & mobile GIS: investigating change in space and time, 3:35–51, 2006.
[10] Fu, Weijung J., Jiang, Peikun K., Zhou, Guomo M., Zhao, Keli L. (2014). Using moran’s i and gis to study the spatial pattern of forest litter carbon density in a subtropical region of southeastern china. Biogeosciences, 11 (8) 2401.
[11] Gao, Song., Rao, Jinmeng., Liu, Xinyi., Kang, Yuhao., Huang, Qunying., App, Joseph. (2019). Exploring the effectiveness of geomasking techniques for protecting the geoprivacy of twitter users. Journal of Spatial Information Science, (19) 105–129.
[12] Graham, Christopher. (2012). Anonymisation: managing data protection risk code of practice. In- formation Commissioner’s Office.
[13] Gupta, Ruchika., Rao, Udai Pratap. (2020). Preserving location privacy using three layer rdv masking in geocoded published discrete point data. World Wide Web, 23 (1) 175–206.
[14] Haley, Danielle F., Matthews, Stephen A., Cooper, Hannah LF., Haardörfer, Regine., Adimora, Adaora A., Wingood, Gina M., Kramer, Michael R. (2016). Confidentiality considerations for use of social-spatial data on the social determinants of health: Sexual and reproductive health case study. Social Science & Medicine, 166, 49–56.
[15] Hampton, Kristen H., Fitch, Molly K., Allshouse., William B., Doherty, Irene A., Gesink, Dionne C., Leone, Peter A., Serre, Marc L., Miller, William C. (2010). Mapping health data: improved privacy protection with donut method geomasking. American journal of epidemiology, 172 (9) 1062– 1069.
[16] Keßler, Carsten., McKenzie, Grant. (2018). A geoprivacy manifesto. Transactions in GIS, 22 (1) 3–19.
[17] Kounadi, Ourania., Leitner, Michael. (2014). Why does geoprivacy matter? the scientific publication of confidential data presented on maps. Journal of Empirical Research on Human Research Ethics, 9 (4) 34–45.
[18] Kounadi, Ourania., Leitner, Michael. (2015). Spatial information divergence: Using global and local indices to compare geographical masks applied to crime data. Transactions in GIS, 19 (5) 737–757.
[19] Kounadi, Ourania., Leitner, Michael. (2016). Adaptive areal elimination (aae): A transparent way of disclosing protected spatial datasets. Computers, Environment and Urban Systems, 57: 59–67.
[20] Kounadi, Ourania. (2018). Resch. A geoprivacy by design guideline for research campaigns that use participatory Journal of Intelligent Computing Volume 12 Number 4 December 2021 121 sensing data. Journal of Empirical Research on Human Research Ethics, 13 (3) 203–222.
[21] Kwan, Mei-Po., Casas, Irene., Schmitz, Ben. (2004). Protection of geoprivacy and accuracy of spatial information: How effective are geographical masks? Cartographica: The International Journal for Geographic Information and Geovisualization, 39 (2)15–28, 2004.
[22] Leitner, Michael., Curtis, Andrew. (2004). Cartographic guidelines for geographically masking the locations of confidential point data. Cartographic Perspectives, (49) 22–39, 2004.
[23] Rushton, Gerard., Armstrong, Marc P., Gittler, Josephine., Greene, Barry R., Pavlik, Claire E., West, Michele M., Zimmerman, Dale L.(2007). Geocoding health data: the use of geographic codes in cancer prevention and control, research and practice. CRC Press.
[24] Samarati, Pierangela. (2001). Protecting respondents identities in microdata release. IEEE transactions on Knowledge and Data Engineering, 13 (6) 1010–1027.
[25] Schilit, Bill., Hong, Jason., Gruteser, Marco. (2003). Wireless location privacy protection. Computer, 36 (12) 135– 137.
[26] Schwab, Klaus., Marcus, Alan., Oyola, JO., Hoffman, William., Luzi, Michele. (2011). Personal data: The emergence of a new asset class. In An Initiative of the World Economic Forum.
[27] Seidl, Dara E., Jankowski, Piotr., Clarke, Keith C. (2018). Privacy and false identification risk in geomasking techniques. Geographical Analysis, 50 (3) 280–297.
[28] Seidl, Dara E., Jankowski, Piotr., Nara, Atsushi. (2019). An empirical test of household identification risk in geomasked maps. Cartography and Geographic Information Science, 46 (6) 475–488, 2019.
[29] Seidl, Dara E, Paulus, Gernot., Jankowski, Piotr., Regenfelder, Melanie. (2015). Spatial obfuscation methods for privacy protection of household-level data. Applied Geography, 63:253–263.
[30] Zandbergen, Paul A. (2014). Ensuring confidentiality of geocoded health data: assessing geographic masking strategies for individual-level data. Advances in medicine, 2014.
[31] Zhang, Su., Freundschuh, Scott M., Lenzer, Kate., Zandbergen, Paul A. (2017). The location swapping method for geomasking. Cartography and Geographic Information Science, 44 (1) 22–34.


Home | Aim & Scope | Editorial Board | Author Guidelines | Publisher | Subscription | Previous Issue | Contact Us |Upcoming Conferences|Sample Issues|Library Recommendation Form|

 

Copyright © 2011 dline.info