Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Strengthening GIS Security: Anonymization and Differential Privacy for Safeguarding Sensitive Geospatial Data

View through CrossRef
The protection of Geographic Information Systems (GIS) is now more relevant since these systems gather, process, and store geospatial data to various ends, receiving and processing a broad array of applications. Data in the GIS framework is open to everyone, and digital assault, cyber theft, and many more issues which make privacy important. This paper addresses two methods: anonymization and differential privacy to protect GIS data. The performance of anonymization techniques like k-anonymity and geo-indistinguishability and the ability of differential privacy techniques to prevent the reverse engineering of the original data in large datasets are assessed. An area of interest to the research is the applicability of these techniques in reducing the threat of traditional GIS security threats. The paper uses several cases and quantitative evaluation of the results to describe the advantages and disadvantages of both types of analysis and to demonstrate how these analyses can be applied in practice. These methods show that data breaches are minimized and general data protection improved by as much as 30% for location-specific attacks, for instance. This research seeks to address the application of privacy-preserving techniques in the GIS while requiring high privacy standards in using geospatial datasets. Importantly, the study's findings are intended to inform policymakers and system designers of the best practices for improving GIS security structures.
Title: Strengthening GIS Security: Anonymization and Differential Privacy for Safeguarding Sensitive Geospatial Data
Description:
The protection of Geographic Information Systems (GIS) is now more relevant since these systems gather, process, and store geospatial data to various ends, receiving and processing a broad array of applications.
Data in the GIS framework is open to everyone, and digital assault, cyber theft, and many more issues which make privacy important.
This paper addresses two methods: anonymization and differential privacy to protect GIS data.
The performance of anonymization techniques like k-anonymity and geo-indistinguishability and the ability of differential privacy techniques to prevent the reverse engineering of the original data in large datasets are assessed.
An area of interest to the research is the applicability of these techniques in reducing the threat of traditional GIS security threats.
The paper uses several cases and quantitative evaluation of the results to describe the advantages and disadvantages of both types of analysis and to demonstrate how these analyses can be applied in practice.
These methods show that data breaches are minimized and general data protection improved by as much as 30% for location-specific attacks, for instance.
This research seeks to address the application of privacy-preserving techniques in the GIS while requiring high privacy standards in using geospatial datasets.
Importantly, the study's findings are intended to inform policymakers and system designers of the best practices for improving GIS security structures.

Related Results

ICH safeguarding actions : Jingdezhen porcelain industry skills in the context of UNESCO
ICH safeguarding actions : Jingdezhen porcelain industry skills in the context of UNESCO
Jingdezhen has a long history of porcelain making, a complex industrial structure, and extensive skill systems. The objectives of this dissertation focus on: in such a pan-systemic...
Augmented Differential Privacy Framework for Data Analytics
Augmented Differential Privacy Framework for Data Analytics
Abstract Differential privacy has emerged as a popular privacy framework for providing privacy preserving noisy query answers based on statistical properties of databases. ...
THE SECURITY AND PRIVACY MEASURING SYSTEM FOR THE INTERNET OF THINGS DEVICES
THE SECURITY AND PRIVACY MEASURING SYSTEM FOR THE INTERNET OF THINGS DEVICES
The purpose of the article: elimination of the gap in existing need in the set of clear and objective security and privacy metrics for the IoT devices users and manufacturers and a...
The Costs of Anonymization: Case Study Using Clinical Data (Preprint)
The Costs of Anonymization: Case Study Using Clinical Data (Preprint)
BACKGROUND Sharing data from clinical studies can accelerate scientific progress, improve transparency, and increase the potential for innovation and collab...
Anonymize or synthesize? Privacy-preserving methods for heart failure score analytics
Anonymize or synthesize? Privacy-preserving methods for heart failure score analytics
Abstract Aims Data availability remains a critical challenge in modern, data-driven medical research. Due to the sensitive natur...
Differential privacy learned index
Differential privacy learned index
Indexes are fundamental components of database management systems, traditionally implemented through structures like B-Tree, Hash, and BitMap indexes. These index structures map ke...
Privacy Risk in Recommender Systems
Privacy Risk in Recommender Systems
Nowadays, recommender systems are mostly used in many online applications to filter information and help users in selecting their relevant requirements. It avoids users to become o...

Back to Top