Please use this identifier to cite or link to this item:
Title: Hiding sensitive trajectory patterns
Authors: Abul, Osman
Atzori M.
Bonchi F.
Giannotti F.
Issue Date: 2007
Source: 17th IEEE International Conference on Data Mining Workshops, ICDM Workshops 2007, 28 October 2007 through 31 October 2007, Omaha, NE, 73001
Abstract: Spatio-temporal traces left behind by moving individuals are increasingly available. On the one hand, mining this kind of data is expected to produce interesting behavioral knowledge enabling novel classes of mobility applications; but on the other hand, due to the peculiar nature of position data, mining it creates important privacy concerns. Thus, studying privacy preserving data mining methods for moving object data is interesting and challenging. In this paper, we address the problem of hiding sensitive trajectory patterns from moving objects databases. The aim is to modify the database such that a given set of sensitive trajectory patterns can no longer be extracted, while the others are preserved as much as possible. We provide the formal problem statement and show that it is NP-hard; so we devise heuristics and a polynomial sanitization algorithm. We discuss a possible attack to our model, that exploits the knowledge of the underlying road network, and we enhance our model to protect from this kind of attacks. Experimental results show the effectiveness of our proposal. © 2007 IEEE.
ISBN: 0769530192; 9780769530192
ISSN: 1550-4786
Appears in Collections:Bilgisayar Mühendisliği Bölümü / Department of Computer Engineering
Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection

Show full item record

CORE Recommender


checked on Sep 23, 2022

Page view(s)

checked on Dec 26, 2022

Google ScholarTM



Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.