Real-World Trajectory Sharing with Local Differential Privacy

被引:20
作者
Cunningham, Teddy [1 ]
Cormode, Graham [1 ]
Ferhatosmanoglu, Hakan [1 ]
Srivastava, Divesh [2 ]
机构
[1] Univ Warwick, Coventry, W Midlands, England
[2] AT&T Chief Data Off, Bedminster, NJ USA
来源
PROCEEDINGS OF THE VLDB ENDOWMENT | 2021年 / 14卷 / 11期
基金
欧洲研究理事会; 英国工程与自然科学研究理事会;
关键词
D O I
10.14778/3476249.3476280
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Sharing trajectories is beneficial for many real-world applications, such as managing disease spread through contact tracing and tailoring public services to a population's travel patterns. However, public concern over privacy and data protection has limited the extent to which this data is shared. Local differential privacy enables data sharing in which users share a perturbed version of their data, but existing mechanisms fail to incorporate user-independent public knowledge (e.g., business locations and opening times, public transport schedules, geo-located tweets). This limitation makes mechanisms too restrictive, gives unrealistic outputs, and ultimately leads to low practical utility. To address these concerns, we propose a local differentially private mechanism that is based on perturbing hierarchically-structured, overlapping n-grams (i.e., contiguous subsequences of length n) of trajectory data. Our mechanism uses a multi-dimensional hierarchy over publicly available external knowledge of real-world places of interest to improve the realism and utility of the perturbed, shared trajectories. Importantly, including real-world public data does not negatively affect privacy or efficiency. Our experiments, using real-world data and a range of queries, each with real-world application analogues, demonstrate the superiority of our approach over a range of alternative methods.
引用
收藏
页码:2283 / 2295
页数:13
相关论文
共 45 条
[1]   A Case Study: Privacy Preserving Release of Spatio-temporal Density in Paris [J].
Acs, Gergely ;
Castelluccia, Claude .
PROCEEDINGS OF THE 20TH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING (KDD'14), 2014, :1679-1688
[2]   Local Differential Privacy on Metric Spaces: optimizing the trade-off with utility [J].
Alvim, Mario S. ;
Chatzikokolakis, Konstantinos ;
Palamidessi, Catuscia ;
Pazii, Anna .
IEEE 31ST COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2018), 2018, :262-267
[3]  
Andres M. E., 2013, ACM CCS, P901
[4]  
Bassily R., 2017, P ADV NEUR INF PROC, P2285
[5]   A Two-Phase Algorithm for Mining Sequential Patterns with Differential Privacy [J].
Bonomi, Luca ;
Xiong, Li .
PROCEEDINGS OF THE 22ND ACM INTERNATIONAL CONFERENCE ON INFORMATION & KNOWLEDGE MANAGEMENT (CIKM'13), 2013, :269-278
[6]   Quantifying Differential Privacy under Temporal Correlations [J].
Cao, Yang ;
Yoshikawa, Masatoshi ;
Xiao, Yonghui ;
Xiong, Li .
2017 IEEE 33RD INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2017), 2017, :821-832
[7]  
Chatzikokolakis Konstantinos, 2013, Privacy Enhancing Technologies.13th International Symposium, PETS 2013. Proceedings: LNCS 7981, P82, DOI 10.1007/978-3-642-39077-7_5
[8]  
Chen R, 2012, P 2012 ACM C COMP CO, P638
[9]  
Chen R, 2016, PROC INT CONF DATA, P289, DOI 10.1109/ICDE.2016.7498248
[10]   Solving Linear Programs in the Current Matrix Multiplication Time [J].
Cohen, Michael B. ;
Lee, Yin Tat ;
Song, Zhao .
PROCEEDINGS OF THE 51ST ANNUAL ACM SIGACT SYMPOSIUM ON THEORY OF COMPUTING (STOC '19), 2019, :938-942