• Title/Summary/Keyword: Location Data Collection

Search Result 173, Processing Time 0.023 seconds

An Enhanced Data Utility Framework for Privacy-Preserving Location Data Collection

  • Jong Wook Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.6
    • /
    • pp.69-76
    • /
    • 2024
  • Recent advances in sensor and mobile technologies have made it possible to collect user location data. This location information is used as a valuable asset in various industries, resulting in increased demand for location data collection and sharing. However, because location data contains sensitive user information, indiscriminate collection can lead to privacy issues. Recently, geo-indistinguishability (Geo-I), a method of differential privacy, has been widely used to protect the privacy of location data. While Geo-I is powerful in effectively protecting users' locations, it poses a problem because the utility of the collected location data decreases due to data perturbation. Therefore, this paper proposes a method using Geo-I technology to effectively collect user location data while maintaining its data utility. The proposed method utilizes the prior distribution of users to improve the overall data utility, while protecting accurate location information. Experimental results using real data show that the proposed method significantly improves the usefulness of the collected data compared to existing methods.

Smart Tourism Information System and IoT Data Collection Devices for Location-based Tourism and Tourist Safety Services

  • Ko, Tae-Seung;Kim, Byeong-Joo;Jwa, Jeong-Woo
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.1
    • /
    • pp.310-316
    • /
    • 2022
  • The smart tourism service provides services such as travel planning and tour guides to tourists using key technologies of the 4th industrial revolution, such as the Internet of Things, communication infrastructure, big data, artificial intelligence, AR/VR, and drones. We are developing smart tourism services such as recommended travel products, my travel itinerary, tourism information, and chatbots for tourists through the smart tourism app. In this paper, we develop a smart tourism service system that provides real-time location-based tourism information and weather information to tourists. The smart tourism service system consists of a smart tourism app, a smart tourism information system, and an IoT data collection device. The smart tourism information system receives weather information from the IoT data collection device installed in the tourist destination. The location-based smart tourism service is provided as a smart tourism app in the smart tourism information system according to the Beacon's UUID in the IoT data collection device. The smart tourism information system stores the Beacon's UUIDs received from tourists and provides a safe hiking service for tourists.

Privacy-Preserving Traffic Volume Estimation by Leveraging Local Differential Privacy

  • Oh, Yang-Taek;Kim, Jong Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.12
    • /
    • pp.19-27
    • /
    • 2021
  • In this paper, we present a method for effectively predicting traffic volume based on vehicle location data that are collected by using LDP (Local Differential Privacy). The proposed solution in this paper consists of two phases: the process of collecting vehicle location data in a privacy-presering manner and the process of predicting traffic volume using the collected location data. In the first phase, the vehicle's location data is collected by using LDP to prevent privacy issues that may arise during the data collection process. LDP adds random noise to the original data when collecting data to prevent the data owner's sensitive information from being exposed to the outside. This allows the collection of vehicle location data, while preserving the driver's privacy. In the second phase, the traffic volume is predicted by applying deep learning techniques to the data collected in the first stage. Experimental results with real data sets demonstrate that the method proposed in this paper can effectively predict the traffic volume using the location data that are collected in a privacy-preserving manner.

A Lightweight and Privacy-Preserving Answer Collection Scheme for Mobile Crowdsourcing

  • Dai, Yingling;Weng, Jian;Yang, Anjia;Yu, Shui;Deng, Robert H.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.8
    • /
    • pp.2827-2848
    • /
    • 2021
  • Mobile Crowdsourcing (MCS) has become an emerging paradigm evolved from crowdsourcing by employing advanced features of mobile devices such as smartphones to perform more complicated, especially spatial tasks. One of the key procedures in MCS is to collect answers from mobile users (workers), which may face several security issues. First, authentication is required to ensure that answers are from authorized workers. In addition, MCS tasks are usually location-dependent, so the collected answers could disclose workers' location privacy, which may discourage workers to participate in the tasks. Finally, the overhead occurred by authentication and privacy protection should be minimized since mobile devices are resource-constrained. Considering all the above concerns, in this paper, we propose a lightweight and privacy-preserving answer collection scheme for MCS. In the proposed scheme, we achieve anonymous authentication based on traceable ring signature, which provides authentication, anonymity, as well as traceability by enabling malicious workers tracing. In order to balance user location privacy and data availability, we propose a new concept named current location privacy, which means the location of the worker cannot be disclosed to anyone until a specified time. Since the leakage of current location will seriously threaten workers' personal safety, causing such as absence or presence disclosure attacks, it is necessary to pay attention to the current location privacy of workers in MCS. We encrypt the collected answers based on timed-release encryption, ensuring the secure transmission and high availability of data, as well as preserving the current location privacy of workers. Finally, we analyze the security and performance of the proposed scheme. The experimental results show that the computation costs of a worker depend on the number of ring signature members, which indicates the flexibility for a worker to choose an appropriate size of the group under considerations of privacy and efficiency.

A Network Sensor Location Model Considering Discrete Characteristics of Data Collection (데이터 수집의 이산적 특성을 고려한 네트워크 센서 위치 모형)

  • Yang, Jaehwan;Kho, Seung-Young;Kim, Dong-Kyu
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.16 no.5
    • /
    • pp.38-48
    • /
    • 2017
  • Link attributes, such as speed, occupancy, and flow, are essential factors for transportation planning and operation. It is, therefore, one of the most important decision-making problems in intelligent transport system (ITS) to determine the optimal location of a sensor for collecting the information on link attributes. This paper aims to develop a model to determine the optimal location of a sensor to minimize the variability of traffic information on whole networks. To achieve this, a network sensor location model (NSLM) is developed to reflect discrete characteristics of data collection. The variability indices of traffic information are calculated based on the summation of diagonal elements of the variance-covariance matrix. To assess the applicability of the developed model, speed data collected from the dedicated short range communication (DSRC) systems were used in Daegu metropolitan area. The developed model in this study contributes to the enhancement of investment efficiency and the improvement of information accuracy in intelligent transport system (ITS).

Unlabeled Wi-Fi RSSI Indoor Positioning by Using IMU

  • Chanyeong, Ju;Jaehyun, Yoo
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.12 no.1
    • /
    • pp.37-42
    • /
    • 2023
  • Wi-Fi Received Signal Strength Indicator (RSSI) is considered one of the most important sensor data types for indoor localization. However, collecting a RSSI fingerprint, which consists of pairs of a RSSI measurement set and a corresponding location, is costly and time-consuming. In this paper, we propose a Wi-Fi RSSI learning technique without true location data to overcome the limitations of static database construction. Instead of the true reference positions, inertial measurement unit (IMU) data are used to generate pseudo locations, which enable a trainer to move during data collection. This improves the efficiency of data collection dramatically. From an experiment it is seen that the proposed algorithm successfully learns the unsupervised Wi-Fi RSSI positioning model, resulting in 2 m accuracy when the cumulative distribution function (CDF) is 0.8.

Proposal of AI-based Digital Forensic Evidence Collecting System

  • Jang, Eun-Jin;Shin, Seung-Jung
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.124-129
    • /
    • 2021
  • As the 4th industrial era is in full swing, the public's interest in related technologies such as artificial intelligence, big data, and block chain is increasing. As artificial intelligence technology is used in various industrial fields, the need for research methods incorporating artificial intelligence technology in related fields is also increasing. Evidence collection among digital forensic investigation techniques is a very important procedure in the investigation process that needs to prove a specific person's suspicions. However, there may be cases in which evidence is damaged due to intentional damage to evidence or other physical reasons, and there is a limit to the collection of evidence in this situation. Therefore, this paper we intends to propose an artificial intelligence-based evidence collection system that analyzes numerous image files reported by citizens in real time to visually check the location, user information, and shooting time of the image files. When this system is applied, it is expected that the evidence expected data collected in real time can be actually used as evidence, and it is also expected that the risk area analysis will be possible through big data analysis.

An Exploratory Study for the Market of Seoul Collection -From the Collection Participant's Perspective- (서울컬렉션 시장부합 요소와 시장지향에 관한 탐색적 연구 -컬렉션 참가자들을 중심으로-)

  • Han, Cha-Young;Lee, Soo-Jin
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.32 no.4
    • /
    • pp.562-572
    • /
    • 2008
  • This study is to understand the current situation of the Seoul Collection and suggest market oriented strategies in order to establish a more effective fashion market. Three elements-time, form, and, place-were defined to analyse the dynamics of the collection and two factors-customer/competitor oriented information and information interaction among participants-were employed to evaluate the Seoul collection toward market orientation. The data were collected from the collection participants via an in-depth interview. The identified major market factors were: 1. Time-In order to create a desirable market, the opening time of the Seoul Collection needs to be rescheduled in accordance with the openings of other countries. Also the time must be suitable to the buyer's movement. 2. Product-Products which did not meet the needs of the market and their unrealistically high prices were two main factors that hindered sales. 3. Place-Although the place was a vital factor to the success of the collection, the facility was not fully a suitable location for buyers to place orders. Additionally, the analyzed data indicated the low market-oriented Seoul collection. Vital to elevating the Seoul Collection to meet the global standard, therefore, more practical research and merchandise planning should be arranged in advance.

A HAZARDOUS AREA IDENTIFICATION MODEL USING AUTOMATED DATA COLLECTION (ADC) BASED ON BUILDING INFORMATION MODELLING (BIM)

  • Hyunsoo Kim;Hyun-Soo Lee;Moonseo Park;Sungjoo Hwang
    • International conference on construction engineering and project management
    • /
    • 2011.02a
    • /
    • pp.17-22
    • /
    • 2011
  • A considerable number of construction disasters occur on pathways. Safety management is usually performed on construction sites to prevent accidents in activity areas. This means that the safety management level of hazards on pathways is relatively minimized. Many researchers have noted that hazard identification is fundamental to safety management. Thus, algorithms for helping safety managers to identify hazardous areas are developed using automated data collection technology. These algorithms primarily search for potential hazardous areas by comparing workers' location logs based on a real-time location system and optimal routes based on BIM. Potential hazardous areas are filtered by identified hazardous areas and activity areas. After that, safety managers are provided with information about potential hazardous areas and can establish proper safety countermeasures. This can help to improve safety on construction sites.

  • PDF

Minimum Period of Data Collection for the Determination of Average Water Pressure in the Water Distribution Networks (배수구역의 평균수압결정을 위한 최소수압측정기간)

  • Hyun, In-Hwaan;DockKo, Seok;Kim, Duck-Hyun
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.24 no.5
    • /
    • pp.573-580
    • /
    • 2010
  • Average pressure in a pipe network is one of critical factors to estimate the flow distribution and to calculate UARL (Unavoidable Annual Real Losses) value in ILI (Infrastructure Leakage Index). While its collection period and measuring location are essential to obtain average pressure, their standard method have not been established so far. In this study, proper method including its procedure for data collection period and measuring point for average pressure were suggested using non-exceedance probability concept in the water distribution network.