Protecting Respondents' Identities in Microdata Release
IEEE Transactions on Knowledge and Data Engineering
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Location Privacy in Mobile Systems: A Personalized Anonymization Model
ICDCS '05 Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
Ordinal, Continuous and Heterogeneous k-Anonymity Through Microaggregation
Data Mining and Knowledge Discovery
Protecting Location Privacy Through Path Confusion
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
Mondrian Multidimensional K-Anonymity
ICDE '06 Proceedings of the 22nd International Conference on Data Engineering
\ell -Diversity: Privacy Beyond \kappa -Anonymity
ICDE '06 Proceedings of the 22nd International Conference on Data Engineering
Achieving anonymity via clustering
Proceedings of the twenty-fifth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
The new Casper: query processing for location services without compromising privacy
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
K-anonymization incremental maintenance and optimization techniques
Proceedings of the 2007 ACM symposium on Applied computing
Hiding the presence of individuals from shared databases
Proceedings of the 2007 ACM SIGMOD international conference on Management of data
Data & Knowledge Engineering
Preserving privacy in gps traces via uncertainty-aware path cloaking
Proceedings of the 14th ACM conference on Computer and communications security
Minimality attack in privacy preserving data publishing
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
Private queries in location based services: anonymizers are not necessary
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Privacy Preservation in the Publication of Trajectories
MDM '08 Proceedings of the The Ninth International Conference on Mobile Data Management
Protecting Privacy in Continuous Location-Tracking Applications
IEEE Security and Privacy
Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases
ICDE '08 Proceedings of the 2008 IEEE 24th International Conference on Data Engineering
Efficient k-anonymization using clustering techniques
DASFAA'07 Proceedings of the 12th international conference on Database systems for advanced applications
Weak k-anonymity: a low-distortion model for protecting privacy
ISC'06 Proceedings of the 9th international conference on Information Security
Protecting privacy against location-based personal identification
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
A formal model of obfuscation and negotiation for location privacy
PERVASIVE'05 Proceedings of the Third international conference on Pervasive Computing
Secure anonymization for incremental datasets
SDM'06 Proceedings of the Third VLDB international conference on Secure Data Management
Preserving user location privacy in mobile data management infrastructures
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Private Queries and Trajectory Anonymization: a Dual Perspective on Location Privacy
Transactions on Data Privacy
Privacy-Preserving Data Publishing
Foundations and Trends in Databases
Discovering private trajectories using background information
Data & Knowledge Engineering
Anonymization of moving objects databases by clustering and perturbation
Information Systems
An online framework for publishing privacy-sensitive location traces
Proceedings of the Ninth ACM International Workshop on Data Engineering for Wireless and Mobile Access
Privacy-preserving publication of trajectories using microaggregation
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
Show Me How You Move and I Will Tell You Who You Are
Transactions on Data Privacy
Spatially regularized logistic regression for disease mapping on large moving populations
Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining
Trajectory anonymity in publishing personal mobility data
ACM SIGKDD Explorations Newsletter
Privacy-aware querying over sensitive trajectory data
Proceedings of the 20th ACM international conference on Information and knowledge management
Preserving privacy of moving objects via temporal clustering of spatio-temporal data streams
Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
A spatial cloaking framework based on range search for nearest neighbor search
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
Microaggregation- and permutation-based anonymization of movement data
Information Sciences: an International Journal
A novel trajectory privacy-preserving future time index structure in moving object databases
ICCCI'12 Proceedings of the 4th international conference on Computational Collective Intelligence: technologies and applications - Volume Part I
A Query Language for Mobility Data Mining
International Journal of Data Warehousing and Mining
Differential private trajectory protection of moving objects
Proceedings of the Third ACM SIGSPATIAL International Workshop on GeoStreaming
Re-identification of Smart Meter data
Personal and Ubiquitous Computing
Semantic trajectories modeling and analysis
ACM Computing Surveys (CSUR)
Balancing trajectory privacy and data utility using a personalized anonymization model
Journal of Network and Computer Applications
Hi-index | 0.00 |
Trajectory datasets are becoming more and more popular due to the massive usage of GPS and other location-based devices and services. In this paper, we address privacy issues regarding the identification of individuals in static trajectory datasets. We provide privacy protection by definig trajectory k-anonymity, meaning every released information refers to at least k users/trajectories. We propose a novel generalization-based approach that applies to trajectories and sequences in general. We also suggest the use of a simple random reconstruction of the original dataset from the anonymization, to overcome possible drawbacks of generalization approaches. We present a utility metric that maximizes the probability of a good representation and propose trajectory anonymization techniques to address time and space sensitive applications. The experimental results over synthetic trajectory datasets show the effectiveness of the proposed approach.