Privacy-Preserving Trajectory Data Publishing by Dynamic Anonymization with Bounded Distortion
نویسندگان
چکیده
Publication of trajectory data that contain rich information vehicles in the dimensions time and space (location) enables online monitoring supervision motion offline traffic analysis for various management tasks. However, it also provides security holes privacy breaches as exposing individual’s to public may results attacks threatening safety. Therefore, increased attention has been made recently on protection publishing. existing methods, such generalization via anonymization suppression randomization, achieve by modifying original form a publishable trajectory, which significant distortion hence low utility. In this work, we propose privacy-preserving method called dynamic with bounded distortion. our method, individual trajectories set are mixed localized manner synthetic publishing, can protect location associated individuals ensure guaranteed utility published both individually collectively. Through experiments conducted real Guangzhou City Taxi statistics, evaluate performance proposed compare mainstream methods terms preservation against utilization. The show achieves better utilization than using globally static anonymization, without trading off attacks.
منابع مشابه
Privacy-preserving trajectory data publishing by local suppression
The pervasiveness of location-aware devices has spawned extensive research in trajectory data mining, resulting in many important real-life applications. Yet, the privacy issue in sharing trajectory data among different parties often creates an obstacle for effective data mining. In this paper, we study the challenges of anonymizing trajectory data: high dimensionality, sparseness, and sequenti...
متن کاملData Preserving By Anonymization Techniques for Collaborative Data Publishing
This paper mainly deals with the issue of privacy preserving in data mining while collaborating n number of parties and trying to maintain confidentiality of all data providers details while collaborating their database. Here two type of attacks are addressed “insider attack” and “outsider attack”. In insider attack, the data providers use their own records and try to retrieve other data provid...
متن کاملPrivacy - Preserving Data Publishing
The success of data mining relies on the availability of high quality data. To ensure quality data mining, effective information sharing between organizations becomes a vital requirement in today's society. Since data mining often involves person-specific and sensitive information like medical records, the public has expressed a deep concern about their privacy. Privacy-preserving data publishi...
متن کاملUtility-preserving anonymization for health data publishing
BACKGROUND Publishing raw electronic health records (EHRs) may be considered as a breach of the privacy of individuals because they usually contain sensitive information. A common practice for the privacy-preserving data publishing is to anonymize the data before publishing, and thus satisfy privacy models such as k-anonymity. Among various anonymization techniques, generalization is the most c...
متن کاملTowards Privacy Preserving Data Publishing∗
High quality and useful knowledge is to be found in the integrated data from various organizations, and the discovered knowledge is essential for building intelligent systems such as business analysis and health surveillance. However, concern about breaching privacy is a major obstacle of this process. This project aims to develop new efficient and effective techniques for privacy protection in...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ISPRS international journal of geo-information
سال: 2021
ISSN: ['2220-9964']
DOI: https://doi.org/10.3390/ijgi10020078