Author
Listed:
- Rahul Marri
- Sriram Varanasi
- Satwik Varma Kalidindi Chaitanya
- Sai Krishna Marri
Abstract
The protection of Geographic Information Systems (GIS) is now more relevant since these systems gather, process, and store geospatial data to various ends, receiving and processing a broad array of applications. Data in the GIS framework is open to everyone, and digital assault, cyber theft, and many more issues which make privacy important. This paper addresses two methods: anonymization and differential privacy to protect GIS data. The performance of anonymization techniques like k-anonymity and geo-indistinguishability and the ability of differential privacy techniques to prevent the reverse engineering of the original data in large datasets are assessed. An area of interest to the research is the applicability of these techniques in reducing the threat of traditional GIS security threats. The paper uses several cases and quantitative evaluation of the results to describe the advantages and disadvantages of both types of analysis and to demonstrate how these analyses can be applied in practice. These methods show that data breaches are minimized and general data protection improved by as much as 30% for location-specific attacks, for instance. This research seeks to address the application of privacy-preserving techniques in the GIS while requiring high privacy standards in using geospatial datasets. Importantly, the study's findings are intended to inform policymakers and system designers of the best practices for improving GIS security structures.
Suggested Citation
Rahul Marri & Sriram Varanasi & Satwik Varma Kalidindi Chaitanya & Sai Krishna Marri, 2024.
"Strengthening GIS Security: Anonymization and Differential Privacy for Safeguarding Sensitive Geospatial Data,"
Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023, Open Knowledge, vol. 4(1), pages 338-361.
Handle:
RePEc:das:njaigs:v:4:y:2024:i:1:p:338-361:id:264
Download full text from publisher
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:das:njaigs:v:4:y:2024:i:1:p:338-361:id:264. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Open Knowledge (email available below). General contact details of provider: https://newjaigs.com/index.php/JAIGS/ .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.