Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
Efficient Retrieval of Similar Time Sequences Under Time Warping
ICDE '98 Proceedings of the Fourteenth International Conference on Data Engineering
Privacy Preserving Data Mining
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
Capturing the Uncertainty of Moving-Object Representations
SSD '99 Proceedings of the 6th International Symposium on Advances in Spatial Databases
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Discovering Similar Multidimensional Trajectories
ICDE '02 Proceedings of the 18th International Conference on Data Engineering
Managing uncertainty in moving objects databases
ACM Transactions on Database Systems (TODS)
Data Privacy through Optimal k-Anonymization
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
Incognito: efficient full-domain K-anonymity
Proceedings of the 2005 ACM SIGMOD international conference on Management of data
Robust and fast similarity search for moving object trajectories
Proceedings of the 2005 ACM SIGMOD international conference on Management of data
Location Privacy in Mobile Systems: A Personalized Anonymization Model
ICDCS '05 Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
\ell -Diversity: Privacy Beyond \kappa -Anonymity
ICDE '06 Proceedings of the 22nd International Conference on Data Engineering
Cryptographically private support vector machines
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
The new Casper: query processing for location services without compromising privacy
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
Exact indexing of dynamic time warping
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Preventing Location-Based Identity Inference in Anonymous Spatial Queries
IEEE Transactions on Knowledge and Data Engineering
On the marriage of Lp-norms and edit distance
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Privacy Preservation in the Publication of Trajectories
MDM '08 Proceedings of the The Ninth International Conference on Mobile Data Management
A k-Anonymity Clustering Method for Effective Data Privacy Preservation
ADMA '07 Proceedings of the 3rd international conference on Advanced Data Mining and Applications
Towards trajectory anonymization: a generalization-based approach
SPRINGL '08 Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS
ICDE '08 Proceedings of the 2008 IEEE 24th International Conference on Data Engineering
Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases
ICDE '08 Proceedings of the 2008 IEEE 24th International Conference on Data Engineering
Privacy in location-based services: a system architecture perspective
SIGSPATIAL Special
Protecting location privacy against spatial inferences: the PROBE approach
Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS
Achieving k-anonymity via a density-based clustering method
APWeb/WAIM'07 Proceedings of the joint 9th Asia-Pacific web and 8th international conference on web-age information management conference on Advances in data and web management
Preserving privacy in semantic-rich trajectories of human mobility
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
Data Mining: Practical Machine Learning Tools and Techniques
Data Mining: Practical Machine Learning Tools and Techniques
ICALP'06 Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part II
Achieving k-anonymity by clustering in attribute hierarchical structures
DaWaK'06 Proceedings of the 8th international conference on Data Warehousing and Knowledge Discovery
Preserving user location privacy in mobile data management infrastructures
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Hi-index | 0.00 |
The collection and exploration of a profusion of location data for mobility pattern mining has been met with stiff resistance from individuals and privacy groups due to privacy and security concerns. Such concerns have driven research to find the best trade-off between data mining and privacy. Unlike other techniques that make use of the spatial properties of spatio-temporal data to attain k-Anonymity, this study is inclined at exploring the possibilities of enforcing k-Anonymity by adroitly using the temporal domain of a spatio-temporal data. We propose a novel technique to achieve k-Anonymity for moving objects through temporal clustering. Our approach first perturbs and delays a trajectory trace once it arrives at a trusted server. This delay translates into the periodic accumulation of traces. Based on a system specified threshold distance and some newly defined time notions, redundant delayed traces are pruned and then similar traces are clustered. Traces in the same clusters are assigned the same spatial and time value, thus making them quasi-identifiers of the k-Anonymity privacy paradigm. We illustrate through empirical experiments the effectiveness of our technique on a real and synthetic dataset; and show that our approach provides strong privacy through k-Anonymity.