Javascript must be enabled to continue!
A Privacy Preservation Model for Dynamic Trajectory Datasets
View through CrossRef
Abstract
Trajectory datasets are proposed to collect the visited location path of users and their visited times.They are generally used in location-awareness applications.Aside from these applications, they are often released to the data analyst with a suitable business reason.Although they are more beneficial, they have several issues that must be considered when they are utilized, e.g., data privacy and data utility.To achieve data privacy and data utility in trajectory datasets, a well-known privacy preservation model, LKC-Privacy, was proposed. That is, before trajectory datasets are utilized, the at most L-size of unique subsequent paths are suppressed to be at least K indistinguishable tuples.Moreover, the protected sensitive values relate to each group of indistinguishable subsequent paths, they must have the confidence of data re-identification to be at most C. Thus, the trajectory datasets are satisfied by LKC-Privacy constraints, they can guarantee that all at most $L$-size of subsequent paths always have at least K - 1 duplicate tuples and every protected sensitive value has the confidence of successful re-identification to be at most C.However, LKC-Privacy is proposed to address privacy violation issues in trajectory datasets that are focused on performing one-time data releases.To the best of our knowledge about trajectory datasets, some trajectory datasets are dynamic, i.e., they allow change when new data is available.Thus, LKC-Privacy could be insufficient to address privacy violation issues in these trajectory datasets.To rid this vulnerability of LKC-Privacy, a new LKC-Privacy is proposed in this work.Moreover, the proposed model is evaluated by extensive experiments. From the experimental results, they show that the proposed privacy preservation model is more effective than LKC-Privacy.
Title: A Privacy Preservation Model for Dynamic Trajectory Datasets
Description:
Abstract
Trajectory datasets are proposed to collect the visited location path of users and their visited times.
They are generally used in location-awareness applications.
Aside from these applications, they are often released to the data analyst with a suitable business reason.
Although they are more beneficial, they have several issues that must be considered when they are utilized, e.
g.
, data privacy and data utility.
To achieve data privacy and data utility in trajectory datasets, a well-known privacy preservation model, LKC-Privacy, was proposed.
That is, before trajectory datasets are utilized, the at most L-size of unique subsequent paths are suppressed to be at least K indistinguishable tuples.
Moreover, the protected sensitive values relate to each group of indistinguishable subsequent paths, they must have the confidence of data re-identification to be at most C.
Thus, the trajectory datasets are satisfied by LKC-Privacy constraints, they can guarantee that all at most $L$-size of subsequent paths always have at least K - 1 duplicate tuples and every protected sensitive value has the confidence of successful re-identification to be at most C.
However, LKC-Privacy is proposed to address privacy violation issues in trajectory datasets that are focused on performing one-time data releases.
To the best of our knowledge about trajectory datasets, some trajectory datasets are dynamic, i.
e.
, they allow change when new data is available.
Thus, LKC-Privacy could be insufficient to address privacy violation issues in these trajectory datasets.
To rid this vulnerability of LKC-Privacy, a new LKC-Privacy is proposed in this work.
Moreover, the proposed model is evaluated by extensive experiments.
From the experimental results, they show that the proposed privacy preservation model is more effective than LKC-Privacy.
Related Results
Privacy Threats and Privacy Preservation in Multiple Data Releases of High-Dimensional Datasets
Privacy Threats and Privacy Preservation in Multiple Data Releases of High-Dimensional Datasets
A major challenge is when datasets are released to be utilized in the outside scope of data-collecting organizations, it is how to balance data utilities and data privacy. To achie...
Privacy Preservation Models for the Independent Data Release of High-Dimensional Datasets
Privacy Preservation Models for the Independent Data Release of High-Dimensional Datasets
Abstract
A major challenge is when datasets are released to utilize in the outside scope of data-collecting organizations, it is how to balance data utilities and data priv...
Privacy and Security for Digital Health: Assessing Risks and Harms to Users
Privacy and Security for Digital Health: Assessing Risks and Harms to Users
Electronic Health (e-Health), such as mobile health (mHealth) and Health Information Systems (HIS), benefits healthcare consumers and professionals. However, it also poses potentia...
Privacy Threats and Privacy Preservation in Multiple Data Releases of High-Dimensional Datasets
Privacy Threats and Privacy Preservation in Multiple Data Releases of High-Dimensional Datasets
Determining how to balance data utilities and data privacy when datasets are released to be utilized outside the scope of data-collecting organizations constitutes a major challeng...
Augmented Differential Privacy Framework for Data Analytics
Augmented Differential Privacy Framework for Data Analytics
Abstract
Differential privacy has emerged as a popular privacy framework for providing privacy preserving noisy query answers based on statistical properties of databases. ...
Aggregate Query Frameworks for Preserving Privacy Data in Big Data Analytics
Aggregate Query Frameworks for Preserving Privacy Data in Big Data Analytics
Abstract
Data utility and data privacy are both serious issues that must be considered when datasets are released to use in big data analytics because they are traded-off i...
Privacy Risk in Recommender Systems
Privacy Risk in Recommender Systems
Nowadays, recommender systems are mostly used in many online applications to filter information and help users in selecting their relevant requirements. It avoids users to become o...
A Privacy Protection Method for Power User Profiles That Integrates Improved Differential Privacy and Secret Sharing
A Privacy Protection Method for Power User Profiles That Integrates Improved Differential Privacy and Secret Sharing
ABSTRACT
In response to the privacy leakage risks inherent in the big data processing of power user personas, propose a collaborative optimiz...

