Privacy-preserving trajectory data publishing by local suppression

被引:163
作者
Chen, Rui [1 ]
Fung, Benjamin C. M. [1 ]
Mohammed, Noman [1 ]
Desai, Bipin C. [1 ]
Wang, Ke [2 ]
机构
[1] Concordia Univ, Montreal, PQ H3G 1M8, Canada
[2] Simon Fraser Univ, Burnaby, BC V5A 1S6, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Privacy preservation; Trajectory data; Local suppression; Frequent sequence;
D O I
10.1016/j.ins.2011.07.035
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The pervasiveness of location-aware devices has spawned extensive research in trajectory data mining, resulting in many important real-life applications. Yet, the privacy issue in sharing trajectory data among different parties often creates an obstacle for effective data mining. In this paper, we study the challenges of anonymizing trajectory data: high dimensionality, sparseness, and sequentiality. Employing traditional privacy models and anonymization methods often leads to low data utility in the resulting data and ineffective data mining. In addressing these challenges, this is the first paper to introduce local suppression to achieve a tailored privacy model for trajectory data anonymization. The framework allows the adoption of various data utility metrics for different data mining tasks. As an illustration, we aim at preserving both instances of location-time doublets and frequent sequences in a trajectory database, both being the foundation of many trajectory data mining tasks. Our experiments on both synthetic and real-life data sets suggest that the framework is effective and efficient to overcome the challenges in trajectory data anonymization. In particular, compared with the previous works in the literature, our proposed local suppression method can significantly improve the data utility in anonymous trajectory data. (C) 2011 Elsevier Inc. All rights reserved.
引用
收藏
页码:83 / 97
页数:15
相关论文
共 40 条
  • [1] Abul O, 2008, PROC INT CONF DATA, P376, DOI 10.1109/ICDE.2008.4497446
  • [2] Aggarwal CC, 2004, LECT NOTES COMPUT SC, V2992, P183
  • [3] [Anonymous], 2005, VLDB, DOI DOI 10.5555/1083592.1083696
  • [4] MAFIA: A maximal frequent itemset algorithm for transactional databases
    Burdick, D
    Calimlim, M
    Gehrke, J
    [J]. 17TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, PROCEEDINGS, 2001, : 443 - 452
  • [5] Dwork C, 2006, LECT NOTES COMPUT SC, V4052, P1
  • [6] Fung B.C.M., 2009, P ACM SAC, P1528
  • [7] FUNG BCM, 2009, P 3 ANN IEEE INT C R, P200
  • [8] Anonymizing classification data for privacy preservation
    Fung, Benjamin C. M.
    Wang, Ke
    Yu, Philip S.
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2007, 19 (05) : 711 - 725
  • [9] Privacy-Preserving Data Publishing: A Survey of Recent Developments
    Fung, Benjamin C. M.
    Wang, Ke
    Chen, Rui
    Yu, Philip S.
    [J]. ACM COMPUTING SURVEYS, 2010, 42 (04)
  • [10] On the anonymization of sparse high-dimensional data
    Ghinita, Gabriel
    Tao, Yufei
    Kalnis, Panos
    [J]. 2008 IEEE 24TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, VOLS 1-3, 2008, : 715 - +