The problem of information security of spatial data as personal data and possible ways to solve it
Abstract and keywords
Abstract:
Spatial data becomes personal in cases where, in combination with other data, they allow the data subject to be uniquely identified. In this regard, it is necessary to clearly distinguish in which cases such data should be considered personal and protected as personal, and in which this is not necessary. The purpose of the research was to determine a set of necessary requirements for the protection of spatial data in the context of personal data when developing systems related to location determination. To achieve this goal, a classification of systems that process spatial data has been carried out, approaches to protecting such data have been studied, and effective measures to protect them have been justified. Various methods of geomasking and depersonalization are considered as methods of data protection. As a result of the research, information security methods for selected classes of systems are justified and rationally distributed. A set of necessary requirements for the protection of spatial data when developing systems related to location determination has been identified, and directions for further research in this area have been identified.

Keywords:
geomasking, geofencing, geolocation API, depersonalization, point aggregation, areal aggregation, adjusting coordinates, coordinate replacement, FOAM
Text
Text (PDF): Read Download
References

1. Redlich S. Quantitative Analysis of Geomasking Methods. Dr. of Sci. thesis. Essen: 2022. 318 p.

2. Kounadi O, Leitner M. Adaptive Areal Elimination (AAE): A tansparent way of disclosing protected spatial datasets. Computers, Environment and Urban Systems. 2016;57: 59–67. DOIhttps://doi.org/10.1016/j.compenvurbsys.2016.01.004. (https://www.sciencedirect.com/science/article/pii/S0198971516300047?via%3Dihub)

3. Leitner M, Curtis A. Cartographic Guidelines for Geographically Masking the Locations of Confidential Point Data. Cartographic Perspectives. 2004;49(7): 22–39. DOIhttps://doi.org/10.14714/CP49.439. (https://cartographicperspectives.org/index.php/journal/article/view/cp49-leitner-curtis)

4. Allshouse WB., Fitch MK, Hampton KH, et al. Geomasking sensitive health data and privacy protection: an evaluation using an E911 database. Geocarto International. 2010;25(6): 443–452. DOI:10.1080%2F10106049.2010.496496. https://www.tandfonline.com/doi/abs/10.1080/10106049.2010.496496)

5. Kroll M, Schnell R. Anonymisation of geographical distance matrices via Lipschitz embedding. International Journal of Health Geographics. 2016;15(1): 1–14. DOIhttps://doi.org/10.1186/s12942-015-0031-7. (https://ij-healthgeographics.biomedcentral.com/articles/10.1186/s12942-015-0031-7)

6. Schnell R, Klingwort J, Farrow JM. Locational privacy-preserving distance computations with intersecting sets of randomly labeled grid points. International Journal of Health Geographics. 2021;20(14): 1–16. DOIhttps://doi.org/10.1186/s12942-021-00268-y. (https://ij-healthgeographics.biomedcentral.com/articles/10.1186/s12942-021-00268-y)

Login or Create
* Forgot password?