[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1007/978-3-540-85654-2_6guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

A Free Terrain Model for Trajectory K---Anonymity

Published: 01 September 2008 Publication History

Abstract

This paper introduces a privacy model for location based services that utilizes collected movement data to identify parts of the user trajectories, where user privacy is at an elevated risk. To protect the privacy of the user, the proposed methodology transforms the original requests into anonymous counterparts by offering trajectory <em>K</em>---anonymity. As a proof of concept, we build a working prototype that implements our solution approach and is used for experimentation and evaluation purposes. Our implementation relies on a spatial DBMS that carries out part of the necessary analysis. Through experiments we demonstrate the effectiveness of our approach to preserve the <em>K</em>---anonymity of the users for as long as the requested services are in progress.

References

[1]
Gidófalvi, G., Pedersen, T.B.: Mining long, sharable patterns in trajectories of moving objects. In: Third Workshop on Spatio-Temporal Database Management (2006)
[2]
Agrawal, R., Srikant, R.: Fast algorithms for mining association rules in large databases. In: 20th International Conference on Very Large Databases, pp. 487-499 (1994)
[3]
Jensen, C.S., Lahrmann, H., Pakalnis, S., Runge, J.: The INFATI data. Time Center TR-79 (2004), http://www.cs.aau.dk/TimeCenter
[4]
Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: First International Conference on Mobile Systems, Applications, and Services, pp. 31-42 (2003)
[5]
Gedik, B., Liu, L.: A customizable K-anonymity model for protecting location privacy. Technical report, Georgia Institute of Technology (April 2004)
[6]
Bettini, C., Wang, X.S., Jajodia, S.: Protecting privacy against location-based personal identification. In: Second VLDB Workshop on Secure Data Management, pp. 185-199 (2005)
[7]
Mokbel, M.F., Chow, C.Y., Aref,W.G.: The new casper: query processing for location services without compromising privacy. In: 32nd International Conference on Very Large Data Bases, pp. 763-774 (2006)

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
DEXA '08: Proceedings of the 19th international conference on Database and Expert Systems Applications
September 2008
850 pages
ISBN:9783540856535

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 01 September 2008

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 01 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2016)Secure Mix-Zones for Privacy Protection of Road Network Location Based Services UsersJournal of Computer Networks and Communications10.1155/2016/38215932016Online publication date: 1-Apr-2016
  • (2012)Utility-guided Clustering-based Transaction Data AnonymizationTransactions on Data Privacy10.5555/2207141.22071435:1(223-251)Online publication date: 1-Apr-2012
  • (2011)Privacy preservation in the dissemination of location dataACM SIGKDD Explorations Newsletter10.1145/2031331.203133413:1(6-18)Online publication date: 31-Aug-2011
  • (2011)PCTAProceedings of the 4th International Workshop on Privacy and Anonymity in the Information Society10.1145/1971690.1971695(1-10)Online publication date: 25-Mar-2011
  • (2010)Providing K-Anonymity in location based servicesACM SIGKDD Explorations Newsletter10.1145/1882471.188247312:1(3-10)Online publication date: 9-Nov-2010
  • (2010)From itemsets through trajectories to location based servicesACM SIGKDD Explorations Newsletter10.1145/1809400.180941111:2(61-62)Online publication date: 27-May-2010
  • (2009)Towards Trajectory AnonymizationTransactions on Data Privacy10.5555/1556406.15564102:1(47-75)Online publication date: 1-Apr-2009
  • (2009)A network aware privacy model for online requests in trajectory dataData & Knowledge Engineering10.1016/j.datak.2008.11.00368:4(431-452)Online publication date: 1-Apr-2009
  • (2008)Towards trajectory anonymizationProceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS10.1145/1503402.1503413(52-61)Online publication date: 4-Nov-2008

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media