Generalizing data to provide anonymity when disclosing information (abstract)
PODS '98 Proceedings of the seventeenth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems
On k-anonymity and the curse of dimensionality
VLDB '05 Proceedings of the 31st international conference on Very large data bases
L-diversity: Privacy beyond k-anonymity
ACM Transactions on Knowledge Discovery from Data (TKDD)
Handicapping attacker's confidence: an alternative to k-anonymization
Knowledge and Information Systems
Anonymizing Classification Data for Privacy Preservation
IEEE Transactions on Knowledge and Data Engineering
Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining
Privacy Preservation in the Publication of Trajectories
MDM '08 Proceedings of the The Ninth International Conference on Mobile Data Management
Anonymizing transaction databases for publication
Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining
Privacy-preserving anonymization of set-valued data
Proceedings of the VLDB Endowment
Publishing Sensitive Transactions for Itemset Utility
ICDM '08 Proceedings of the 2008 Eighth IEEE International Conference on Data Mining
Anonymizing moving objects: how to hide a MOB in a crowd?
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases
ICDE '08 Proceedings of the 2008 IEEE 24th International Conference on Data Engineering
Anonymizing healthcare data: a case study on the blood transfusion service
Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining
(α, k)-anonymous data publishing
Journal of Intelligent Information Systems
Trajectory anonymity in publishing personal mobility data
ACM SIGKDD Explorations Newsletter
Utility-preserving transaction data anonymization with low information loss
Expert Systems with Applications: An International Journal
Microaggregation- and permutation-based anonymization of movement data
Information Sciences: an International Journal
Privacy-preserving trajectory data publishing by local suppression
Information Sciences: an International Journal
Semantic trajectories modeling and analysis
ACM Computing Surveys (CSUR)
Preserving location privacy without exact locations in mobile services
Frontiers of Computer Science: Selected Publications from Chinese Universities
Hi-index | 0.01 |
Recently, trajectory data mining has received a lot of attention in both the industry and the academic research. In this paper, we study the privacy threats in trajectory data publishing and show that traditional anonymization methods are not applicable for trajectory data due to its challenging properties: high-dimensional, sparse, and sequential. Our primary contributions are (1) to propose a new privacy model called LKC-privacy that overcomes these challenges, and (2) to develop an efficient anonymization algorithm to achieve LKC-privacy while preserving the information utility for trajectory pattern mining.