Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (415)

Search Parameters:
Keywords = location privacy

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
16 pages, 2848 KiB  
Article
Improving the Accuracy of mmWave Radar for Ethical Patient Monitoring in Mental Health Settings
by Colm Dowling, Hadi Larijani, Mike Mannion, Matt Marais and Simon Black
Sensors 2024, 24(18), 6074; https://doi.org/10.3390/s24186074 (registering DOI) - 19 Sep 2024
Viewed by 264
Abstract
Monitoring patient safety in high-risk mental health environments is a challenge for clinical staff. There has been a recent increase in the adoption of contactless sensing solutions for remote patient monitoring. mmWave radar is a technology that has high potential in this field [...] Read more.
Monitoring patient safety in high-risk mental health environments is a challenge for clinical staff. There has been a recent increase in the adoption of contactless sensing solutions for remote patient monitoring. mmWave radar is a technology that has high potential in this field due it its low cost and protection of privacy; however, it is prone to multipath reflections and other sources of environmental noise. This paper discusses some of the challenges in mmWave remote sensing applications for patient safety in mental health wards. In line with these challenges, we propose a novel low-data solution to mitigate the impact of multipath reflections and other sources of noise in mmWave sensing. Our solution uses an unscented Kalman filter for target tracking over time and analyses features of movement to determine whether targets are human or not. We chose a commercial off-the-shelf radar and compared the accuracy and reliability of sensor measurements before and after applying our solution. Our results show a marked decrease in false positives and false negatives during human target tracking, as well as an improvement in spatial location detection in a two-dimensional space. These improvements demonstrate how a simple low-data solution can improve existing mmWave sensors, making them more suitable for patient safety solutions in high-risk environments. Full article
Show Figures

Figure 1

29 pages, 9496 KiB  
Article
Trustworthy Communities for Critical Energy and Mobility Cyber-Physical Applications
by Juhani Latvakoski, Jouni Heikkinen, Jari Palosaari, Vesa Kyllönen and Jari Rehu
Smart Cities 2024, 7(5), 2616-2644; https://doi.org/10.3390/smartcities7050102 - 12 Sep 2024
Viewed by 534
Abstract
The aim of this research has been to enable the management of trustworthy relationships between stakeholders, service providers, and physical assets, which are required in critical energy and mobility cyber–physical systems (CPS) applications. The achieved novel contribution is the concept of trustworthy communities [...] Read more.
The aim of this research has been to enable the management of trustworthy relationships between stakeholders, service providers, and physical assets, which are required in critical energy and mobility cyber–physical systems (CPS) applications. The achieved novel contribution is the concept of trustworthy communities with respective experimental solutions, which are developed by relying on verifiable credentials, smart contracts, trust over IP, and an Ethereum-based distributed ledger. The provided trustworthy community solutions are validated by executing them in two practical use cases, which are called energy flexibility and hunting safety. The energy flexibility case validation considered the execution of the solutions with one simulated and two real buildings with the energy flexibility aggregation platform, which was able to trade the flexibilities in an energy flexibility marketplace. The provided solutions were executed with a hunting safety smartphone application for a hunter and the smartwatch of a person moving around in the forest. The evaluations indicate that conceptual solutions for trustworthy communities fulfill the purpose and contribute toward making energy flexibility trading and hunting safety possible and trustworthy enough for participants. A trustworthy community solution is required to make value sharing and usage of critical energy resources and their flexibilities feasible and secure enough for their owners as part of the energy flexibility community. Sharing the presence and location in mobile conditions requires a trustworthy community solution because of security and privacy reasons, but it can also save lives in real-life elk hunting cases. During the evaluations, the need for further studies related to performance, scalability, community applications, verifiable credentials with wallets, sharing of values and incentives, authorized trust networks, dynamic trust situations, time-sensitive behavior, autonomous operations with smart contracts through security assessment, and applicability have been detected. Full article
Show Figures

Figure 1

18 pages, 13182 KiB  
Article
Hierarchical Progressive Image Forgery Detection and Localization Method Based on UNet
by Yang Liu, Xiaofei Li, Jun Zhang, Shuohao Li, Shengze Hu and Jun Lei
Big Data Cogn. Comput. 2024, 8(9), 119; https://doi.org/10.3390/bdcc8090119 - 10 Sep 2024
Viewed by 447
Abstract
The rapid development of generative technologies has made the production of forged products easier, and AI-generated forged images are increasingly difficult to accurately detect, posing serious privacy risks and cognitive obstacles to individuals and society. Therefore, constructing an effective method that can accurately [...] Read more.
The rapid development of generative technologies has made the production of forged products easier, and AI-generated forged images are increasingly difficult to accurately detect, posing serious privacy risks and cognitive obstacles to individuals and society. Therefore, constructing an effective method that can accurately detect and locate forged regions has become an important task. This paper proposes a hierarchical and progressive forged image detection and localization method called HPUNet. This method assigns more reasonable hierarchical multi-level labels to the dataset as supervisory information at different levels, following cognitive laws. Secondly, multiple types of features are extracted from AI-generated images for detection and localization, and the detection and localization results are combined to enhance the task-relevant features. Subsequently, HPUNet expands the obtained image features into four different resolutions and performs detection and localization at different levels in a coarse-to-fine cognitive order. To address the limited feature field of view caused by inconsistent forgery sizes, we employ three sets of densely cross-connected hierarchical networks for sufficient interaction between feature images at different resolutions. Finally, a UNet network with a soft-threshold-constrained feature enhancement module is used to achieve detection and localization at different scales, and the reliance on a progressive mechanism establishes relationships between different branches. We use ACC and F1 as evaluation metrics, and extensive experiments on our method and the baseline methods demonstrate the effectiveness of our approach. Full article
Show Figures

Figure 1

14 pages, 4441 KiB  
Article
AI-Enabled Sensor Fusion of Time-of-Flight Imaging and mmWave for Concealed Metal Detection
by Chaitanya Kaul, Kevin J. Mitchell, Khaled Kassem, Athanasios Tragakis, Valentin Kapitany, Ilya Starshynov, Federica Villa, Roderick Murray-Smith and Daniele Faccio
Sensors 2024, 24(18), 5865; https://doi.org/10.3390/s24185865 - 10 Sep 2024
Viewed by 337
Abstract
In the field of detection and ranging, multiple complementary sensing modalities may be used to enrich information obtained from a dynamic scene. One application of this sensor fusion is in public security and surveillance, where efficacy and privacy protection measures must be continually [...] Read more.
In the field of detection and ranging, multiple complementary sensing modalities may be used to enrich information obtained from a dynamic scene. One application of this sensor fusion is in public security and surveillance, where efficacy and privacy protection measures must be continually evaluated. We present a novel deployment of sensor fusion for the discrete detection of concealed metal objects on persons whilst preserving their privacy. This is achieved by coupling off-the-shelf mmWave radar and depth camera technology with a novel neural network architecture that processes radar signals using convolutional Long Short-Term Memory (LSTM) blocks and depth signals using convolutional operations. The combined latent features are then magnified using deep feature magnification to reveal cross-modality dependencies in the data. We further propose a decoder, based on the feature extraction and embedding block, to learn an efficient upsampling of the latent space to locate the concealed object in the spatial domain through radar feature guidance. We demonstrate the ability to detect the presence and infer the 3D location of concealed metal objects. We achieve accuracies of up to 95% using a technique that is robust to multiple persons. This work provides a demonstration of the potential for cost-effective and portable sensor fusion with strong opportunities for further development. Full article
(This article belongs to the Section Radar Sensors)
Show Figures

Figure 1

22 pages, 894 KiB  
Article
Enhancing Unmanned Aerial Vehicle Security: A Zero-Knowledge Proof Approach with Zero-Knowledge Succinct Non-Interactive Arguments of Knowledge for Authentication and Location Proof
by Athanasios Koulianos, Panagiotis Paraskevopoulos, Antonios Litke and Nikolaos K. Papadakis
Sensors 2024, 24(17), 5838; https://doi.org/10.3390/s24175838 - 8 Sep 2024
Viewed by 823
Abstract
UAVs are increasingly being used in various domains, from personal and commercial applications to military operations. Ensuring the security and trustworthiness of UAV communications is crucial, and blockchain technology has been explored as a solution. However, privacy remains a challenge, especially in public [...] Read more.
UAVs are increasingly being used in various domains, from personal and commercial applications to military operations. Ensuring the security and trustworthiness of UAV communications is crucial, and blockchain technology has been explored as a solution. However, privacy remains a challenge, especially in public blockchains. In this work, we propose a novel approach utilizing zero-knowledge proof techniques, specifically zk-SNARKs, which are non-interactive cryptographic proofs. This approach allows UAVs to prove their authenticity or location without disclosing sensitive information. We generated zk-SNARK proofs using the Zokrates tool on a Raspberry Pi, simulating a drone environment, and analyzed power consumption and CPU utilization. The results are promising, especially in the case of larger drones with higher battery capacities. Ethereum was chosen as the public blockchain platform, with smart contracts developed in Solidity and tested on the Sepolia testnet using Remix IDE. This novel proposed approach paves the way for a new path of research in the UAV area. Full article
(This article belongs to the Special Issue UAV Secure Communication for IoT Applications)
Show Figures

Figure 1

17 pages, 21513 KiB  
Article
Differential Privacy-Based Location Privacy Protection for Edge Computing Networks
by Guowei Zhang, Jiayuan Du, Xiaowei Yuan and Kewei Zhang
Electronics 2024, 13(17), 3510; https://doi.org/10.3390/electronics13173510 - 4 Sep 2024
Viewed by 409
Abstract
Mobile Edge Computing (MEC) has been widely applied in various Internet of Things (IoT) scenarios due to its advantages of low latency and low energy consumption. However, the offloading of tasks generated by terminal devices to edge servers inevitably raises privacy leakage concerns. [...] Read more.
Mobile Edge Computing (MEC) has been widely applied in various Internet of Things (IoT) scenarios due to its advantages of low latency and low energy consumption. However, the offloading of tasks generated by terminal devices to edge servers inevitably raises privacy leakage concerns. Given the limited resources in MEC networks, this paper proposes a task scheduling strategy, named DQN-DP, to minimize location privacy leakage under the constraint of offloading costs. The strategy is based on a differential privacy location obfuscation probability density function. Theoretical analysis demonstrates that the probability density function employed in this study is valid and satisfies ϵ-differential privacy in terms of security. Numerical results indicate that, compared to existing baseline approaches, the proposed DQN-DP algorithm effectively balances privacy leakage and offloading cost. Specifically, DQN-DP reduces privacy leakage by approximately 20% relative to baseline approaches. Full article
Show Figures

Figure 1

27 pages, 595 KiB  
Review
Centralized vs. Decentralized Cloud Computing in Healthcare
by Mona Abughazalah, Wafaa Alsaggaf, Shireen Saifuddin and Shahenda Sarhan
Appl. Sci. 2024, 14(17), 7765; https://doi.org/10.3390/app14177765 - 3 Sep 2024
Viewed by 818
Abstract
Healthcare is one of the industries that seeks to deliver medical services to patients on time. One of the issues it currently grapples with is real-time patient data exchange between various healthcare organizations. This challenge was solved by both centralized and decentralized cloud [...] Read more.
Healthcare is one of the industries that seeks to deliver medical services to patients on time. One of the issues it currently grapples with is real-time patient data exchange between various healthcare organizations. This challenge was solved by both centralized and decentralized cloud computing architecture solutions. In this paper, we review the current state of these two cloud computing architectures in the health sector with regard to the effect on the efficiency of Health Information Exchange (HIE) systems. Our study seeks to determine the relevance of these cloud computing approaches in assisting healthcare facilities in the decision-making process to adopt HIE systems. This paper considers the system performance, patient data privacy, and cost and identifies research directions in each of the architectures. This study shows that there are some benefits in both cloud architectures, but there are also some drawbacks. The prominent characteristic of centralized cloud computing is that all data and information are stored together at one location, known as a single data center. This offers many services, such as integration, effectiveness, simplicity, and rapid information access. However, it entails providing data privacy and confidentiality aspects because it will face the hazard of a single point of failure. On the other hand, decentralized cloud computing is built to safeguard data privacy and security whereby data are distributed to several nodes as a way of forming mini-data centers. This increases the system’s ability to cope with a node failure. Thus, continuity and less latency are achieved. Nevertheless, it poses integration issues because managing data from several sites could be a problem, and the costs of operating several data centers are higher and complex. This paper also pays attention to the differences in aspects like efficiency, capacity, and cost. This paper assists healthcare organizations in determining the most suitable cloud architecture strategy for deploying secure and effective HIE systems. Full article
Show Figures

Figure 1

26 pages, 13280 KiB  
Article
Impact of Privacy Filters and Fleet Changes on Connected Vehicle Trajectory Datasets for Intersection and Freeway Use Cases
by Enrique D. Saldivar-Carranza, Rahul Suryakant Sakhare, Jairaj Desai, Jijo K. Mathew, Ashmitha Jaysi Sivakumar, Justin Mukai and Darcy M. Bullock
Smart Cities 2024, 7(5), 2366-2391; https://doi.org/10.3390/smartcities7050093 - 30 Aug 2024
Viewed by 678
Abstract
Commercially available crowdsourced connected vehicle (CV) trajectory data have recently been used to provide stakeholders with actionable and scalable roadway mobility infrastructure performance measures. Transportation agencies and automotive original equipment manufacturers (OEMs) share a common vision of ensuring the privacy of motorists that [...] Read more.
Commercially available crowdsourced connected vehicle (CV) trajectory data have recently been used to provide stakeholders with actionable and scalable roadway mobility infrastructure performance measures. Transportation agencies and automotive original equipment manufacturers (OEMs) share a common vision of ensuring the privacy of motorists that anonymously provide their journey information. As this market has evolved, the fleet mix has changed, and some OEMs have introduced additional fuzzification of CV data around 0.5 miles of frequently visited locations. This study compared the estimated Indiana market penetration rates (MPRs) between historic non-fuzzified CV datasets from 2020 to 2023 and a 5–11 May 2024, CV dataset with fuzzified records and a reduced fleet. At selected permanent interstate and non-interstate count stations, overall CV MPRs decreased by 0.5% and 0.3% compared to 2023, respectively. However, the trend in previous years was upward. Additionally, this paper evaluated the impact on data characteristics at freeways and intersections between the 5–11 May 2024, fuzzified CV dataset and a non-fuzzified 7–13 May 2023, CV dataset. The analysis found that the total number of GPS samples decreased 10% statewide. Of the evaluated 54,284 0.1-mile Indiana freeway, US Route, and State Route segments, the number of CV samples increased for 33.8% and decreased for 65.9%. This study also evaluated 26,291 movements at 3289 intersections and found that the number of available trajectories increased for 28.3% and decreased for 70.4%. This paper concludes that data representativeness is enough to derive most relevant mobility performance measures. However, since the change in available trajectories is not uniformly distributed among intersection movements, an unintended sample bias may be introduced when computing performance measures. This may affect signal retiming or capital investment opportunity identification algorithms. Full article
Show Figures

Figure 1

29 pages, 2443 KiB  
Article
User Mobility Modeling in Crowdsourcing Application to Prevent Inference Attacks
by Farid Yessoufou, Salma Sassi, Elie Chicha, Richard Chbeir and Jules Degila
Future Internet 2024, 16(9), 311; https://doi.org/10.3390/fi16090311 - 28 Aug 2024
Viewed by 1280
Abstract
With the rise of the Internet of Things (IoT), mobile crowdsourcing has become a leading application, leveraging the ubiquitous presence of smartphone users to collect and process data. Spatial crowdsourcing, which assigns tasks based on users’ geographic locations, has proven to be particularly [...] Read more.
With the rise of the Internet of Things (IoT), mobile crowdsourcing has become a leading application, leveraging the ubiquitous presence of smartphone users to collect and process data. Spatial crowdsourcing, which assigns tasks based on users’ geographic locations, has proven to be particularly innovative. However, this trend raises significant privacy concerns, particularly regarding the precise geographic data required by these crowdsourcing platforms. Traditional methods, such as dummy locations, spatial cloaking, differential privacy, k-anonymity, and encryption, often fail to mitigate the risks associated with the continuous disclosure of location data. An unauthorized entity could access these data and infer personal information about individuals, such as their home address, workplace, religion, or political affiliations, thus constituting a privacy violation. In this paper, we propose a user mobility model designed to enhance location privacy protection by accurately identifying Points of Interest (POIs) and countering inference attacks. Our main contribution here focuses on user mobility modeling and the introduction of an advanced algorithm for precise POI identification. We evaluate our contributions using GPS data collected from 10 volunteers over a period of 3 months. The results show that our mobility model delivers significant performance and that our POI extraction algorithm outperforms existing approaches. Full article
Show Figures

Figure 1

21 pages, 2915 KiB  
Article
A Smart Approach to Electric Vehicle Optimization via IoT-Enabled Recommender Systems
by Padmanabhan Amudhavalli, Rahiman Zahira, Subramaniam Umashankar and Xavier N. Fernando
Technologies 2024, 12(8), 137; https://doi.org/10.3390/technologies12080137 - 20 Aug 2024
Viewed by 1221
Abstract
Electric vehicles (EVs) are becoming of significant interest owing to their environmental benefits; however, energy efficiency concerns remain unsolved and require more investigation. A major issue is a lack of EV charging infrastructure, which can lead to operational difficulties. Effective infrastructure development, including [...] Read more.
Electric vehicles (EVs) are becoming of significant interest owing to their environmental benefits; however, energy efficiency concerns remain unsolved and require more investigation. A major issue is a lack of EV charging infrastructure, which can lead to operational difficulties. Effective infrastructure development, including well-placed charging stations (CS), is critical to enhancing connectivity. To overcome this, consumers want real-time data on charging station availability, neighboring station locations, and access times. This work leverages the Distance Vector Multicast Routing Protocol (DVMRP) to enhance the information collection process for charging stations through the Internet of Things (IoT). The evolving IoT paradigm enables the use of sensors and data transfer to give real-time information. Strategic sensor placement helps forecast server access to neighboring stations, optimize vehicle scheduling, and estimate wait times. A recommender system is designed to identify stations with more rapidly charging rates, along with uniform pricing. In addition, the routing protocol has a privacy protection strategy to prevent unauthorized access and safeguard EV data during exchanges between charging stations and user locations. The system is simulated with MATLAB 2020a, and the data are controlled and secured in the cloud. The predicted algorithm’s performance is evaluated using several kinds of standards, including power costs, vehicle counts, charging costs, energy consumption, and optimization values. Full article
(This article belongs to the Special Issue IoT-Enabling Technologies and Applications)
Show Figures

Figure 1

14 pages, 5936 KiB  
Article
GeoLocator: A Location-Integrated Large Multimodal Model (LMM) for Inferring Geo-Privacy
by Yifan Yang, Siqin Wang, Daoyang Li, Shuju Sun and Qingyang Wu
Appl. Sci. 2024, 14(16), 7091; https://doi.org/10.3390/app14167091 - 13 Aug 2024
Viewed by 824
Abstract
To ensure the sustainable development of artificial intelligence (AI) application in urban and geospatial science, it is important to protect the geographic privacy, or geo-privacy, which refers to an individual’s geographic location details. As a crucial aspect of personal security, geo-privacy plays a [...] Read more.
To ensure the sustainable development of artificial intelligence (AI) application in urban and geospatial science, it is important to protect the geographic privacy, or geo-privacy, which refers to an individual’s geographic location details. As a crucial aspect of personal security, geo-privacy plays a key role not only in individual protection but also in maintaining ethical standards in geoscientific practices. Despite its importance, geo-privacy is often not sufficiently addressed in daily activities. With the increasing use of large multimodal models (LMMs) such as GPT-4 for open-source intelligence (OSINT), the risks related to geo-privacy breaches have significantly escalated. This study introduces a novel GPT-4-based model, GeoLocator, integrated with location capabilities, and conducts four experiments to evaluate its ability to accurately infer location information from images and social media content. The results demonstrate that GeoLocator can generate specific geographic details with high precision, thereby increasing the potential for inadvertent exposure of sensitive geospatial information. This highlights the dual challenges posed by online data-sharing and information-gathering technologies in the context of geo-privacy. We conclude with a discussion on the broader impacts of GeoLocator and our findings on individuals and communities, emphasizing the urgent need for increased awareness and protective measures against geo-privacy breaches in the era of advancing AI and widespread social media usage. This contribution thus advocates for sustainable and responsible geoscientific practices. Full article
(This article belongs to the Special Issue Artificial Intelligence and the Future of Smart Cities)
Show Figures

Figure 1

19 pages, 1891 KiB  
Article
Efficient and Verifiable Range Query Scheme for Encrypted Geographical Information in Untrusted Cloud Environments
by Zhuolin Mei, Jing Zeng, Caicai Zhang, Shimao Yao, Shunli Zhang, Haibin Wang, Hongbo Li and Jiaoli Shi
ISPRS Int. J. Geo-Inf. 2024, 13(8), 281; https://doi.org/10.3390/ijgi13080281 - 11 Aug 2024
Viewed by 608
Abstract
With the rapid development of geo-positioning technologies, location-based services have become increasingly widespread. In the field of location-based services, range queries on geographical data have emerged as an important research topic, attracting significant attention from academia and industry. In many applications, data owners [...] Read more.
With the rapid development of geo-positioning technologies, location-based services have become increasingly widespread. In the field of location-based services, range queries on geographical data have emerged as an important research topic, attracting significant attention from academia and industry. In many applications, data owners choose to outsource their geographical data and range query tasks to cloud servers to alleviate the burden of local data storage and computation. However, this outsourcing presents many security challenges. These challenges include adversaries analyzing outsourced geographical data and query requests to obtain privacy information, untrusted cloud servers selectively querying a portion of the outsourced data to conserve computational resources, returning incorrect search results to data users, and even illegally modifying the outsourced geographical data, etc. To address these security concerns and provide reliable services to data owners and data users, this paper proposes an efficient and verifiable range query scheme (EVRQ) for encrypted geographical information in untrusted cloud environments. EVRQ is constructed based on a map region tree, 0–1 encoding, hash function, Bloom filter, and cryptographic multiset accumulator. Extensive experimental evaluations demonstrate the efficiency of EVRQ, and a comprehensive analysis confirms the security of EVRQ. Full article
(This article belongs to the Topic Recent Advances in Security, Privacy, and Trust)
Show Figures

Figure 1

16 pages, 1253 KiB  
Article
On the Security of a Secure and Computationally Efficient Authentication and Key Agreement Scheme for Internet of Vehicles
by Kisung Park, Myeonghyun Kim and Youngho Park
Electronics 2024, 13(16), 3136; https://doi.org/10.3390/electronics13163136 - 8 Aug 2024
Viewed by 739
Abstract
In the Internet of Vehicles (IoV) environments, vehicles and roadside units (RSUs) communicate predominantly through public channels. These vehicles and RSUs exchange various data, such as traffic density, location, speed, etc. Therefore, secure and efficient authentication and key establishment (AKE) are needed to [...] Read more.
In the Internet of Vehicles (IoV) environments, vehicles and roadside units (RSUs) communicate predominantly through public channels. These vehicles and RSUs exchange various data, such as traffic density, location, speed, etc. Therefore, secure and efficient authentication and key establishment (AKE) are needed to guarantee user privacy when exchanging data between vehicles and RSUs. Recently, a secure and computationally AKE scheme have been proposed to construct secure IoV environments. In their research, the authors asserted that their AKE scheme provides comprehensive security properties, protecting against various potential threats while simultaneously ensuring session key integrity, robust mutual authentication. This paper proved that the previous scheme does not prevent various attacks using logical and mathematical analyses. Moreover, we demonstrated that this scheme does not meet the essential security requirements and correctness of security assumptions. We perform the simulation proof using AVISPA, which is well known as a formal verification tool. To enhance the resilience of attacks, we propose solutions aimed at developing more robust and efficient AKE for IoV environments. Full article
Show Figures

Figure 1

15 pages, 364 KiB  
Article
Improving Data Utility in Privacy-Preserving Location Data Collection via Adaptive Grid Partitioning
by Jongwook Kim
Electronics 2024, 13(15), 3073; https://doi.org/10.3390/electronics13153073 - 3 Aug 2024
Viewed by 478
Abstract
The widespread availability of GPS-enabled devices and advances in positioning technologies have significantly facilitated collecting user location data, making it an invaluable asset across various industries. As a result, there is an increasing demand for the collection and sharing of these data. Given [...] Read more.
The widespread availability of GPS-enabled devices and advances in positioning technologies have significantly facilitated collecting user location data, making it an invaluable asset across various industries. As a result, there is an increasing demand for the collection and sharing of these data. Given the sensitive nature of user location information, considerable efforts have been made to ensure privacy, with differential privacy (DP)-based schemes emerging as the most preferred approach. However, these methods typically represent user locations on uniformly partitioned grids, which often do not accurately reflect the true distribution of users within a space. Therefore, in this paper, we introduce a novel method that adaptively adjusts the grid in real-time during data collection, thereby representing users on these dynamically partitioned grids to enhance the utility of the collected data. Specifically, our method directly captures user distribution during the data collection process, eliminating the need to rely on pre-existing user distribution data. Experimental results with real datasets show that the proposed scheme significantly enhances the utility of the collected location data compared to the existing method. Full article
(This article belongs to the Special Issue Cryptography in Network Security)
Show Figures

Figure 1

18 pages, 1199 KiB  
Article
A Geospatial Framework of Food Demand Mapping
by Valentas Gruzauskas, Aurelija Burinskiene, Artur Airapetian and Neringa Urbonaitė
Appl. Sci. 2024, 14(15), 6677; https://doi.org/10.3390/app14156677 - 31 Jul 2024
Viewed by 380
Abstract
Spatial mapping of food demand is essential for understanding and addressing disparities in food accessibility, which significantly impact public health and nutrition. This research presents an innovative geospatial framework designed to map food demand, integrating individual dietary behaviors with advanced spatial analysis techniques. [...] Read more.
Spatial mapping of food demand is essential for understanding and addressing disparities in food accessibility, which significantly impact public health and nutrition. This research presents an innovative geospatial framework designed to map food demand, integrating individual dietary behaviors with advanced spatial analysis techniques. This study analyzes the spatial distribution of eating habits across Lithuania using a geospatial approach. The methodology involves dividing Lithuania into 60,000 points and interpolating survey data with Shepard’s operator, which relies on a weighted average of values at data points. This flexible approach allows for adjusting the number of points based on spatial resolution and sample size, enhancing the reliability and applicability of the generated maps. The procedure includes generating a structured grid system, incorporating measurements into the grid, and applying Shepard’s operator for interpolation, resulting in precise representations of food demand. This framework provides a comprehensive understanding of dietary behaviors, informing targeted policy interventions to improve food accessibility and nutrition. Traditional food spatial mapping approaches are often limited to specific polygons and lack the flexibility to achieve high granular detail. By applying advanced interpolation techniques and ensuring respondent location data without breaching privacy concerns, this study creates high-resolution maps that accurately represent regional differences in eating habits. The methodology’s flexibility allows for adjustments in spatial resolution and sample size, enhancing the maps’ validity and applicability. This novel approach facilitates the creation of detailed food demand maps at any granular level, providing valuable insights for policymakers and stakeholders. These insights enable the development of targeted strategies to improve food accessibility and nutrition. Additionally, the obtained information can be used for computer simulations to further analyze and predict food demand scenarios. By leveraging spatial data integration, this study contributes to a deeper understanding of the complex dynamics of food demand, identifying critical areas such as food deserts and swamps, and paving the way for more effective public health interventions and policies aimed at achieving equitable food distribution and better nutritional outcomes. Full article
Show Figures

Figure 1

Back to TopTop