Abstract

Large-scale spatiotemporal data mining has created valuable insights into managing key areas of society and the economy. It has encouraged data owners to release/publish trajectory datasets. However, the ill-informed publication of such valuable datasets may lead to serious privacy implications for individuals. Moreover, as a major goal of data protection, balancing privacy and utility remains a challenging problem due to the diversity of spatiotemporal data. However, the user dimension was not considered for traditional frameworks, which limits the application at the global level as opposed to the user level. Many researchers overcome this issue by assuming that a user in the dataset generates only one trajectory. Actually, a user always generates multiple and repetitive trajectories during observation. Only considering one trajectory for one user may cause insufficient privacy protection at the trajectory level alone, as a user’s privacy can be manifested in many trajectories collectively. In addition, it demonstrates strong user correlation when using multiple and repetitive trajectories. If not considered, additional information will be lost, and the utility will be decreased. In this article, we propose a novel privacy-preserved trajectory data publishing method, i.e., IDF-OPT, which can reduce global least-information loss and guarantee strong individual privacy. Comprehensive experiments based on an actual trajectory publishing benchmark demonstrate that the proposed method maintains high practicability in trajectory data mining.

Highlights

  • INTRODUCTIONWith the development of information technology and its penetration into daily life, sensor devices connected to the Internet, such as smartphones and wearable devices, are widely used, which results in a vast amounts of personal data with geographic location and time stamps being collected and stored [1]

  • With the development of information technology and its penetration into daily life, sensor devices connected to the Internet, such as smartphones and wearable devices, are widely used, which results in a vast amounts of personal data with geographic location and time stamps being collected and stored [1].Large-scale spatiotemporal datasets with abundant temporal and spatial information provide the basis for the research of trajectory data mining [2], [3]

  • We propose a new privacy-preserved trajectory data publishing framework, i.e., risk-aware individual differential privacy optimization (IDF-OPT)

Read more

Summary

INTRODUCTION

With the development of information technology and its penetration into daily life, sensor devices connected to the Internet, such as smartphones and wearable devices, are widely used, which results in a vast amounts of personal data with geographic location and time stamps being collected and stored [1]. The paper proposes a new privacy preserved trajectory data publishing method via differential privacy, i.e., IDF-OPT It suppresses the high risk trajectory of individuals and adds noises to statistical dataset ensuring the indistinguishability to provide a strong privacy guarantee for each individual. Chen et al [29] grouped sequences with the same prefix into the same branch and proposed a trajectory counting and noise algorithm based on a prefix tree structure This is the first work that uses differential privacy technology to publish a large number of position sequences. Chen et al extended this work using the n-gram model so that the sequences stored in the tree can be of different lengths, and constructed a synthetic dataset based on Markov assumptions [30] He et al took advantage of the novelty of the hierarchical reference system and developed a trajectory publishing system DPT for privacy protection using the position discretization of the hierarchical organizational grid [31]. We summarize the privacy issue of individual trajectory data published in the problem statement

INDIVIDUAL TRAJECTORY DATASET
INDIVIDUAL PRIVACY RISK
ANALYTIC REQUIREMENT
PROBLEM STATEMENT
SKETCH OF IDF-OPT
INDIVIDUAL CORRELATION LEAKAGE MODEL
SANITIZATION ALGORITHM
EXPERIMENT EVALUATION
Findings
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.