location intelligence
play

Location Intelligence. Privacy Augsburg 2020 Anto Aasa - PowerPoint PPT Presentation

Location Intelligence. Privacy Augsburg 2020 Anto Aasa http://aasa.ut.ee/augsburg Location intelligence (LI) or spatial intelligence process of deriving meaningful insight from geospatial data relationships to solve a particular


  1. Location Intelligence. Privacy Augsburg 2020 Anto Aasa http://aasa.ut.ee/augsburg

  2. Location intelligence (LI) • or spatial intelligence • process of deriving meaningful insight from geospatial data relationships to solve a particular problem. • It involves layering multiple data sets spatially and/or chronologically, for easy reference on a map. • John Snow (London 1854) http://aasa.ut.ee/augsburg

  3. • Using IT services – Collecting of the personal information • Sensitive data • Preferences • Behaviour, attitudes, social situation • Tracking – Recording – Processing – Communicating http://aasa.ut.ee/augsburg

  4. • Acceptance of IT services strongly depends on the existence of technical mechanisms for protecting the user’s privacy – Data protection law 2011

  5. Data protection law 2014 http://aasa.ut.ee/augsburg

  6. https://static.ftitechnology.com/docs/third-party/forrester- 2015-data-privacy.pdf 6

  7. www.privacyinternational.org http://aasa.ut.ee/augsburg

  8. • Cloud computing • Server parks • Who’s law? http://aasa.ut.ee/augsburg

  9. http://aasa.ut.ee/augsburg

  10. http://aasa.ut.ee/augsburg

  11. Game of drones http://aasa.ut.ee/augsburg

  12. • Compared to conventional IT services LBSs impose much higher requirements on mechanisms for saving privacy: – Location information passes many actors along the LBS supply chain – Tracking during everyday activities – Location information is often desired to be saved more than other personal information http://aasa.ut.ee/augsburg

  13. dilemma in privacy protection for LBSs • Positioning and tracking represent inherent key functions without which LBSs will not work and even make any sense at all. • The same functions represent a potential source for misuse and are therefore the reason LBSs are often exposed to distrust in public, which may prevent the success of LBSs in general. Desired Misuse function

  14. http://aasa.ut.ee/augsburg

  15. What is privacy? Different meaning http://aasa.ut.ee/augsburg

  16. Google Street View Land Board orthophoto http://aasa.ut.ee/augsburg

  17. Google Street View http://aasa.ut.ee/augsburg

  18. http://ring24.positium.com

  19. Privacy • Many definitions • Privacy is often equated with confidentiality or anonymity • „Privacy is the claim of individuals, groups, and institutions to determine for themselves, when, how, and to what extent information about them is communicated to others“ (Westin, 1970) http://aasa.ut.ee/augsburg

  20. Privacy principles • Collection limitation • Data Quality • Purpose specification • Use limitation • Security safeguards • Openness • Individual participation • Accountability

  21. Personal data is • any information relating to an identified or identifiable natural person ('data subject'); • an identifiable person is one who can be identified, directly or indirectly, in particular by reference to an identification number or to one or more factors specific to his physical, physiological, mental, economic, cultural or social identity – (Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data) – link

  22. Surveillance process • Content – Interception, reading SMS messages, bank operations, internet preferences, … • Dynamics – Regularities in movement, behaviour

  23. Guidelines for Location-Based Services • to promote and protect user privacy as new and exciting LBSs are developed and deployed. http://files.ctia.org/pdf/CTIA_LBS_Best_Practices_Adopted_03_10.pdf

  24. Fundamental principles: • LBS Providers must ensure that users receive meaningful notice about how location information will be used, disclosed and protected so that users can make informed decisions whether or not to use the LBS and thus will have control over their location information. • LBS Providers must ensure that users consent to the use or disclosure of location information, and LBS Providers bear the burden of demonstrating such consent. Users must have the right to revoke consent or terminate the LBS at any time. Guidelines for Location-Based Services

  25. Notice • Potential users must be informed about how their location information will be used, disclosed and protected. • If, LBS Providers want to use location information for a new purpose not disclosed in the original notice, they must provide users with further notice and obtain consent to the new or other use. Guidelines for Location-Based Services

  26. Notice • how long any location information will be retained, if at all • LBS Providers that share location information with third parties must disclose what information will be provided • LBS Providers must inform users how they may terminate the LBS Guidelines for Location-Based Services

  27. Consent • LBS Providers must obtain user consent to the use or disclosure of location information before initiating an LBS • LBS Providers must allow users to revoke their prior consent Guidelines for Location-Based Services

  28. Safeguards 1. Security of Location Information 2. Storage of Location Information 3. Reporting Abuse 4. Compliance with Laws 5. Compliance with Guidelines Guidelines for Location-Based Services

  29. Four states of privacy: • Anonymity permits the engagement and interaction with others without being identified • Solitude is the right of being alone and secure from intrusion, interruption, and observation. • Intimacy is the right to decide with whom, how much, and when to interact. • Reserve is the freedom to withhold a personal information or the option to choose when to express it http://aasa.ut.ee/augsburg

  30. Concepts and Mechanisms for Privacy Protection • Secure communications • Privacy policies • Anonymization • Identifier abstraction • Information content abstraction http://aasa.ut.ee/augsburg

  31. Secure Communications • Location dissemination • Negotiating and enforcing privacy policies • Managing anonymity • Identifier abstraction http://aasa.ut.ee/augsburg

  32. Privacy Policies 1. Actor constraints 2. Service constraints 3. Time constraints 4. Location constraints 5. Notification constraints 6. Accuracy constraints 7. Identity constraints http://aasa.ut.ee/augsburg

  33. Target must have full control on how location information is treated. 1) the target must be able to identify LBS users and providers that have access to its location information; 2) target may identify a set of LBSs or types of LBSs for which it either grants or denies acces to its location information and allows or not to process it for service operation; 3) target must be able to restrict positioning to a certain period of time; 4) must be possible to limit positioning and location information access to predefined locations; 5) target can specify whether or not it wishes to be informed about positioning attempts. Upon arrival of such notification, it can authorize or deny positioning; 6) target can degrade the accuracy of location information; 7) target can determine to pass location informatin to other actors either by using a pseudonym insted of its true identity or without any identity at all. http://aasa.ut.ee/augsburg

  34. Anonymization • Policies are efficient if all actors are trustworthy • LBS actor may „talk about the target behind its back“ – Misbehavior or negligence of an actor – Attacks from hackers – Unauthorized access from insiders – Technical & human errors • Pseudonymization http://aasa.ut.ee/augsburg

  35. Identifier abstraction • Identifier is replaced by a pseudonym – Permanent pseudonym – Temporary pseudonym http://aasa.ut.ee/augsburg

  36. Information content abstraction • Degrading the the resolution of location information in space, time, or both • To make a certain target’s location data indistinguishable from other persons staying close • K-anonymity http://aasa.ut.ee/augsburg

  37. K-anonymity http://aasa.ut.ee/augsburg

  38. Authentication Secure Integrity communication LBS privacy protection Confidentiality Specification Policies Enforcement Identifier abstraction Anonymization Content astraction http://aasa.ut.ee/augsburg

  39. • Communication • Location • Habits • Identification http://aasa.ut.ee/augsburg

  40. Location intelligence • Spatial intelligence • Meaningful insight from geospatial data relationships to solve a particular problem • Layering multiple datasets • London 1854, John Snow http://aasa.ut.ee/augsburg

  41. https://www.forbes.com/sites/louiscolumbus/2018/02/11/what-new-in-location- intelligence-for-2018/#679b157f14b5

  42. Crowd sensing • Evacuation plan – Real time emergency GIS • Mass events • Commuting • Transportation http://aasa.ut.ee/augsburg

  43. Evacuation plan? http://aasa.ut.ee/augsburg

  44. Mobile Positioning Data for the Mobility Studies http://aasa.ut.ee/augsburg

  45. Passive Mobile Positioning: Memory files of mobile operators • Call detail records (CDR) – location, time of call and user id. • Database : 2006 … today.

  46. Spatial resolution of CDR 100km

  47. Data processing & Modelling … Anchor points model: • Home • Work • Other • leisure, • household, • second home • etc

  48. Mobile Census

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend