Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
On the complexity of optimal K-anonymity
PODS '04 Proceedings of the twenty-third ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
\ell -Diversity: Privacy Beyond \kappa -Anonymity
ICDE '06 Proceedings of the 22nd International Conference on Data Engineering
The new Casper: query processing for location services without compromising privacy
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
A model for enriching trajectories with semantic geographical information
Proceedings of the 15th annual ACM international symposium on Advances in geographic information systems
A conceptual view on trajectories
Data & Knowledge Engineering
A clustering-based approach for discovering interesting places in trajectories
Proceedings of the 2008 ACM symposium on Applied computing
Privacy-Preserving Data Mining: Models and Algorithms
Privacy-Preserving Data Mining: Models and Algorithms
Privacy Preservation in the Publication of Trajectories
MDM '08 Proceedings of the The Ninth International Conference on Mobile Data Management
Privacy-Preserving Publication of User Locations in the Proximity of Sensitive Sites
SSDBM '08 Proceedings of the 20th international conference on Scientific and Statistical Database Management
Privacy-preserving anonymization of set-valued data
Proceedings of the VLDB Endowment
A measure of variance for hierarchical nominal attributes
Information Sciences: an International Journal
Anonymizing moving objects: how to hide a MOB in a crowd?
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
On the Anonymization of Sparse High-Dimensional Data
ICDE '08 Proceedings of the 2008 IEEE 24th International Conference on Data Engineering
Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases
ICDE '08 Proceedings of the 2008 IEEE 24th International Conference on Data Engineering
Anonymization of set-valued data via top-down, local generalization
Proceedings of the VLDB Endowment
Advanced knowledge discovery on movement data with the GeoPKDD system
Proceedings of the 13th International Conference on Extending Database Technology
Privacy-aware location data publishing
ACM Transactions on Database Systems (TODS)
Movement Data Anonymity through Generalization
Transactions on Data Privacy
The PROBE Framework for the Personalized Cloaking of Private Locations
Transactions on Data Privacy
Hiding Sequential and Spatiotemporal Patterns
IEEE Transactions on Knowledge and Data Engineering
Semantic trajectories modeling and analysis
ACM Computing Surveys (CSUR)
Hi-index | 0.00 |
The increasing abundance of data about the trajectories of personal movement is opening new opportunities for analyzing and mining human mobility. However, new risks emerge since it opens new ways of intruding into personal privacy. Representing the personal movements as sequences of places visited by a person during her/his movements-semantic trajectory-poses great privacy threats. In this paper we propose a privacy model defining the attack model of semantic trajectory linking and a privacy notion, called c-safety based on a generalization of visited places based on a taxonomy. This method provides an upper bound to the probability of inferring that a given person, observed in a sequence of non-sensitive places, has also visited any sensitive location. Coherently with the privacy model, we propose an algorithm for transforming any dataset of semantic trajectories into a c-safe one. We report a study on two real-life GPS trajectory datasets to show how our algorithm preserves interesting quality/utility measures of the original trajectories, when mining semantic trajectories sequential pattern mining results. We also empirically measure how the probability that the attacker's inference succeeds is much lower than the theoretical upper bound established.