k-Anonymous Crowd Flow Analytics

Valeriu-Daniel Stanciu, Maarten van Steen, Ciprian Dobre, Andreas Peter

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

3 Citations (Scopus)
36 Downloads (Pure)

Abstract

Measuring pedestrian dynamics using the signals sent from smartphones has become popular. Notably, Wi-Fi-based systems are currently widely deployed. However, many such systems have also become subject to serious debate due to privacy infringement. For some time, secure hashing of a smartphone’s unique MAC address was considered to be sufficient, yet this method has been overruled by Europe’s General Data Protection Regulation which states that an individual should not be identifiable from any dataset without explicit prior consent.

In this paper, we propose a novel anonymization technique that essentially anonymizes detected smartphones immediately at the sensor before any data on such a detection is stored for further analysis. Our solution borrows from the notion of k-anonymity, while avoiding its well-known drawbacks that lead to de-anonymization. Moreover, while ensuring what we coin detection k-anonymity, we also ensure high accuracy of counting measures when dealing with realistic pedestrian flows within crowds. We evaluate our solution both in a simulated environment and in a realistic environment reproducing real-life settings.
Original languageEnglish
Title of host publicationMobiQuitous '20: MobiQuitous 2020 - 17th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services
Pages376-385
DOIs
Publication statusPublished - Dec 2020
Event17th EAI International Conference on Mobile and Ubiquitous Systems:
Computing, Networking and Services
-
Duration: 7 Dec 20209 Dec 2020

Conference

Conference17th EAI International Conference on Mobile and Ubiquitous Systems:
Computing, Networking and Services
Abbreviated titleMobiQuitous 2020
Period7/12/209/12/20

Keywords

  • Cybersecurity

Fingerprint

Dive into the research topics of 'k-Anonymous Crowd Flow Analytics'. Together they form a unique fingerprint.

Cite this