Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing 2014
DOI: 10.1145/2632048.2632077
|View full text |Cite
|
Sign up to set email alerts
|

Elastic pathing

Abstract: Today, people have the opportunity to opt-in to usage-based automotive insurances for reduced premiums by allowing companies to monitor their driving behavior. Several companies claim to measure only speed data to preserve privacy. With our elastic pathing algorithm, we show that drivers can be tracked by merely collecting their speed data and knowing their home location, which insurance companies do, with an accuracy that constitutes privacy intrusion. To demonstrate the algorithm's real-world applicability, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 61 publications
(9 citation statements)
references
References 35 publications
0
9
0
Order By: Relevance
“…Unlike traditional privacy techniques, which are vulnerable to auxiliary information attacks [8,29,33,67,79,94], differential privacy [28] mathematically formalizes a privacy guarantee agnostic to background information. A function guarantees differential privacy (e.g., an analytics query or a machine learning (ML) model) if it bounds the information gain that an attacker can expect from its outputs.…”
Section: Differential Privacymentioning
confidence: 99%
See 2 more Smart Citations
“…Unlike traditional privacy techniques, which are vulnerable to auxiliary information attacks [8,29,33,67,79,94], differential privacy [28] mathematically formalizes a privacy guarantee agnostic to background information. A function guarantees differential privacy (e.g., an analytics query or a machine learning (ML) model) if it bounds the information gain that an attacker can expect from its outputs.…”
Section: Differential Privacymentioning
confidence: 99%
“…Attacks on privacy (Q2) could enable malicious analysts to misuse data for spying on or leaking secret information of celebrities, acquaintances, "friends", or relatives [100], blackmailing, or discriminating individuals in social or commercial transactions online [35]. Despite the risks, companies predominantly use traditional and potentially vulnerable anonymization techniques (e.g., pseudo-anonymization or k-anonymity), as demonstrated by the research community [8,29,33,67,79,94]. Thus, we suggest companies increase efforts to research and deploy more advanced PETs.…”
Section: Key Findingsmentioning
confidence: 99%
See 1 more Smart Citation
“…Less sensitive are data about the environmental conditions or the technical condition of the vehicle [162]. Since even a speed signal is sufficient to trace PII such as location [163], the transmission of raw data from the vehicle to a backend to establish behavior monitoring is very limited. For processing and storage, especially outside the vehicle, either explicit authorization must be granted or legal regulations must require it.…”
Section: H Privacymentioning
confidence: 99%
“…Recently, Chang et al [19] designed and implemented an Android-based navigation app, which can help reduce the traveling time, fuel consumption and emitted carbon dioxide. Gao et al [20] have developed an "elastic pathing" algorithm, which can be used to derive driving routes merely with the knowledge of the starting location and time-stamped speed data.…”
Section: Related Workmentioning
confidence: 99%