File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1109/MDM.2008.29
- Scopus: eid_2-s2.0-51349142350
- Find via
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: Privacy preservation in the publication of trajectories
Title | Privacy preservation in the publication of trajectories |
---|---|
Authors | |
Issue Date | 2008 |
Citation | Proceedings - Ieee International Conference On Mobile Data Management, 2008, p. 65-72 How to Cite? |
Abstract | We study the problem of protecting privacy in the publication of location sequences. Consider a database of trajectories, corresponding to movements of people, captured by their transactions when they use credit or RFID debit cards. We show that, if such trajectories are published exactly (byonly hiding the identities of persons that followed them), there is a high risk of privacy breach by adversaries who hold partial information about them (e.g., shop owners). In particular, we show that one can use partial trajectory knowledge as a quasi-identifier for the remaining locations in the sequence. We device a data suppression technique, which prevents this type of breach, while keeping the posted data as accurate as possible. © 2008 IEEE. |
Persistent Identifier | http://hdl.handle.net/10722/151922 |
ISSN | 2020 SCImago Journal Rankings: 0.259 |
References |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Terrovitis, M | en_US |
dc.contributor.author | Mamoulis, N | en_US |
dc.date.accessioned | 2012-06-26T06:30:49Z | - |
dc.date.available | 2012-06-26T06:30:49Z | - |
dc.date.issued | 2008 | en_US |
dc.identifier.citation | Proceedings - Ieee International Conference On Mobile Data Management, 2008, p. 65-72 | en_US |
dc.identifier.issn | 1551-6245 | en_US |
dc.identifier.uri | http://hdl.handle.net/10722/151922 | - |
dc.description.abstract | We study the problem of protecting privacy in the publication of location sequences. Consider a database of trajectories, corresponding to movements of people, captured by their transactions when they use credit or RFID debit cards. We show that, if such trajectories are published exactly (byonly hiding the identities of persons that followed them), there is a high risk of privacy breach by adversaries who hold partial information about them (e.g., shop owners). In particular, we show that one can use partial trajectory knowledge as a quasi-identifier for the remaining locations in the sequence. We device a data suppression technique, which prevents this type of breach, while keeping the posted data as accurate as possible. © 2008 IEEE. | en_US |
dc.language | eng | en_US |
dc.relation.ispartof | Proceedings - IEEE International Conference on Mobile Data Management | en_US |
dc.title | Privacy preservation in the publication of trajectories | en_US |
dc.type | Conference_Paper | en_US |
dc.identifier.email | Mamoulis, N:nikos@cs.hku.hk | en_US |
dc.identifier.authority | Mamoulis, N=rp00155 | en_US |
dc.description.nature | link_to_subscribed_fulltext | en_US |
dc.identifier.doi | 10.1109/MDM.2008.29 | en_US |
dc.identifier.scopus | eid_2-s2.0-51349142350 | en_US |
dc.relation.references | http://www.scopus.com/mlt/select.url?eid=2-s2.0-51349142350&selection=ref&src=s&origin=recordpage | en_US |
dc.identifier.spage | 65 | en_US |
dc.identifier.epage | 72 | en_US |
dc.publisher.place | United States | en_US |
dc.identifier.scopusauthorid | Terrovitis, M=36907107900 | en_US |
dc.identifier.scopusauthorid | Mamoulis, N=6701782749 | en_US |
dc.identifier.issnl | 1551-6245 | - |