File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Privacy preservation in the publication of trajectories

TitlePrivacy preservation in the publication of trajectories
Authors
Issue Date2008
Citation
Proceedings - Ieee International Conference On Mobile Data Management, 2008, p. 65-72 How to Cite?
AbstractWe study the problem of protecting privacy in the publication of location sequences. Consider a database of trajectories, corresponding to movements of people, captured by their transactions when they use credit or RFID debit cards. We show that, if such trajectories are published exactly (byonly hiding the identities of persons that followed them), there is a high risk of privacy breach by adversaries who hold partial information about them (e.g., shop owners). In particular, we show that one can use partial trajectory knowledge as a quasi-identifier for the remaining locations in the sequence. We device a data suppression technique, which prevents this type of breach, while keeping the posted data as accurate as possible. © 2008 IEEE.
Persistent Identifierhttp://hdl.handle.net/10722/151922
ISSN
References

 

DC FieldValueLanguage
dc.contributor.authorTerrovitis, Men_US
dc.contributor.authorMamoulis, Nen_US
dc.date.accessioned2012-06-26T06:30:49Z-
dc.date.available2012-06-26T06:30:49Z-
dc.date.issued2008en_US
dc.identifier.citationProceedings - Ieee International Conference On Mobile Data Management, 2008, p. 65-72en_US
dc.identifier.issn1551-6245en_US
dc.identifier.urihttp://hdl.handle.net/10722/151922-
dc.description.abstractWe study the problem of protecting privacy in the publication of location sequences. Consider a database of trajectories, corresponding to movements of people, captured by their transactions when they use credit or RFID debit cards. We show that, if such trajectories are published exactly (byonly hiding the identities of persons that followed them), there is a high risk of privacy breach by adversaries who hold partial information about them (e.g., shop owners). In particular, we show that one can use partial trajectory knowledge as a quasi-identifier for the remaining locations in the sequence. We device a data suppression technique, which prevents this type of breach, while keeping the posted data as accurate as possible. © 2008 IEEE.en_US
dc.languageengen_US
dc.relation.ispartofProceedings - IEEE International Conference on Mobile Data Managementen_US
dc.titlePrivacy preservation in the publication of trajectoriesen_US
dc.typeConference_Paperen_US
dc.identifier.emailMamoulis, N:nikos@cs.hku.hken_US
dc.identifier.authorityMamoulis, N=rp00155en_US
dc.description.naturelink_to_subscribed_fulltexten_US
dc.identifier.doi10.1109/MDM.2008.29en_US
dc.identifier.scopuseid_2-s2.0-51349142350en_US
dc.relation.referenceshttp://www.scopus.com/mlt/select.url?eid=2-s2.0-51349142350&selection=ref&src=s&origin=recordpageen_US
dc.identifier.spage65en_US
dc.identifier.epage72en_US
dc.publisher.placeUnited Statesen_US
dc.identifier.scopusauthoridTerrovitis, M=36907107900en_US
dc.identifier.scopusauthoridMamoulis, N=6701782749en_US

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats