Generalizing data to provide anonymity when disclosing information (abstract)
PODS '98 Proceedings of the seventeenth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems
MAFIA: A Maximal Frequent Itemset Algorithm for Transactional Databases
Proceedings of the 17th International Conference on Data Engineering
On k-anonymity and the curse of dimensionality
VLDB '05 Proceedings of the 31st international conference on Very large data bases
Mondrian Multidimensional K-Anonymity
ICDE '06 Proceedings of the 22nd International Conference on Data Engineering
RFID Patient Tagging and Database System
ICNICONSMCL '06 Proceedings of the International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies
Personalized privacy preservation
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
L-diversity: Privacy beyond k-anonymity
ACM Transactions on Knowledge Discovery from Data (TKDD)
Handicapping attacker's confidence: an alternative to k-anonymization
Knowledge and Information Systems
Trajectory clustering: a partition-and-group framework
Proceedings of the 2007 ACM SIGMOD international conference on Management of data
Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining
Privacy Preservation in the Publication of Trajectories
MDM '08 Proceedings of the The Ninth International Conference on Mobile Data Management
Anonymizing transaction databases for publication
Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining
Privacy-preserving anonymization of set-valued data
Proceedings of the VLDB Endowment
TraClass: trajectory classification using hierarchical region-based and trajectory-based clustering
Proceedings of the VLDB Endowment
Publishing Sensitive Transactions for Itemset Utility
ICDM '08 Proceedings of the 2008 Eighth IEEE International Conference on Data Mining
Anonymizing moving objects: how to hide a MOB in a crowd?
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
Privacy protection for RFID data
Proceedings of the 2009 ACM symposium on Applied Computing
On the Anonymization of Sparse High-Dimensional Data
ICDE '08 Proceedings of the 2008 IEEE 24th International Conference on Data Engineering
Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases
ICDE '08 Proceedings of the 2008 IEEE 24th International Conference on Data Engineering
Injector: Mining Background Knowledge for Data Anonymization
ICDE '08 Proceedings of the 2008 IEEE 24th International Conference on Data Engineering
On the tradeoff between privacy and utility in data publishing
Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining
Anonymizing healthcare data: a case study on the blood transfusion service
Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining
(α, k)-anonymous data publishing
Journal of Intelligent Information Systems
Walking in the crowd: anonymizing trajectory data for pattern analysis
Proceedings of the 18th ACM conference on Information and knowledge management
Anonymization of set-valued data via top-down, local generalization
Proceedings of the VLDB Endowment
Efficient Multidimensional Suppression for K-Anonymity
IEEE Transactions on Knowledge and Data Engineering
Privacy-preserving data publishing: A survey of recent developments
ACM Computing Surveys (CSUR)
Traffic density-based discovery of hot routes in road networks
SSTD'07 Proceedings of the 10th international conference on Advances in spatial and temporal databases
Privacy-preserving data mining: A feature set partitioning approach
Information Sciences: an International Journal
ICALP'06 Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part II
Motion-Alert: automatic anomaly detection in massive moving objects
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
Differentially private transit data publication: a case study on the montreal transportation system
Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining
Differentially private sequential data publication via variable-length n-grams
Proceedings of the 2012 ACM conference on Computer and communications security
Editorial: Guest editorial: Special issue on data mining for information security
Information Sciences: an International Journal
A two-phase algorithm for mining sequential patterns with differential privacy
Proceedings of the 22nd ACM international conference on Conference on information & knowledge management
Efficient Time-Stamped Event Sequence Anonymization
ACM Transactions on the Web (TWEB)
Hi-index | 0.07 |
The pervasiveness of location-aware devices has spawned extensive research in trajectory data mining, resulting in many important real-life applications. Yet, the privacy issue in sharing trajectory data among different parties often creates an obstacle for effective data mining. In this paper, we study the challenges of anonymizing trajectory data: high dimensionality, sparseness, and sequentiality. Employing traditional privacy models and anonymization methods often leads to low data utility in the resulting data and ineffective data mining. In addressing these challenges, this is the first paper to introduce local suppression to achieve a tailored privacy model for trajectory data anonymization. The framework allows the adoption of various data utility metrics for different data mining tasks. As an illustration, we aim at preserving both instances of location-time doublets and frequent sequences in a trajectory database, both being the foundation of many trajectory data mining tasks. Our experiments on both synthetic and real-life data sets suggest that the framework is effective and efficient to overcome the challenges in trajectory data anonymization. In particular, compared with the previous works in the literature, our proposed local suppression method can significantly improve the data utility in anonymous trajectory data.