Proceedings of the Third International Workshop on Sensing Applications on Mobile Phones 2012
DOI: 10.1145/2389148.2389151
|View full text |Cite
|
Sign up to set email alerts
|

On the feasibility of user de-anonymization from shared mobile sensor data

Abstract: Underpinning many recent advances in sensing applications (e.g., mHealth) is the ability to safely collect and share mobile sensor data. Research has shown that even from seemingly harmless sensors (e.g., accelerometers, gyroscopes, or magnetometers) an ever expanding set of potentially sensitive user behavior can be inferred. Providing robust anonymity assurances is a principal mechanism for protecting users when data is shared (e.g., with medical professionals or friends). In this paper, we study the feasibi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 23 publications
(20 citation statements)
references
References 12 publications
0
20
0
Order By: Relevance
“…Such informationeven at coarse resolutioncan be used in conjunction with employment directories, white pages, tax records, and other public or private datasets to uniquely identify a tracked person [22]. Social networks have also been proven to be excellent sources of auxiliary data for the de-anonymization of smartphone sensor data [36]. Some researchers even argue that no method exists to reliably prevent the deanonymization of location data [46].…”
Section: De-anonymization Of Sensor Datamentioning
confidence: 99%
See 1 more Smart Citation
“…Such informationeven at coarse resolutioncan be used in conjunction with employment directories, white pages, tax records, and other public or private datasets to uniquely identify a tracked person [22]. Social networks have also been proven to be excellent sources of auxiliary data for the de-anonymization of smartphone sensor data [36]. Some researchers even argue that no method exists to reliably prevent the deanonymization of location data [46].…”
Section: De-anonymization Of Sensor Datamentioning
confidence: 99%
“…information brokers, public datasets) but can also be collected from within a user's own ecosystem of connected devices. As shown in [36], mobile sensor data can become personally identifiable through linkage with less protected data streams of the same user. Seemingly innocuous sensors could thus be used as gateways to de-anonymize sensitive streams of user activity.…”
Section: De-anonymization Of Sensor Datamentioning
confidence: 99%
“…Sparse data share comparatively few relationships. Lane et al [49] used activity stream of the target within anonymised sets of streams gathered from other users. They designed a two-stage deanonymisation framework: the first stage follows activity relationship mining, which consist of rules that link various aspects of two captured activity types and can help to decide if two activities were probably achieved by the same individual or not.…”
Section: Deanonymisation Approachesmentioning
confidence: 99%
“…5 Nicholas Lane and his colleagues discuss anonymity for mobile sensor datasets, 6 and Delphine Christin and her colleagues 7 extensively discuss the privacy concepts associated with mobile participatory sensing, 8,9 as well as applications for monitoring noise levels in urban areas and in-house air quality.…”
Section: Systems For Participatory Sensingmentioning
confidence: 99%