1 / 1

Walking in the Crowd: Anonymizing Trajectory Data for Pattern Analysis

Walking in the Crowd: Anonymizing Trajectory Data for Pattern Analysis Noman Mohammed, Benjamin C. M. Fung, Mourad Debbabi Concordia University, Montreal, Canada. Introduction. Anonymization Algorithm. Empirical Study.

Télécharger la présentation

Walking in the Crowd: Anonymizing Trajectory Data for Pattern Analysis

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Walking in the Crowd: Anonymizing Trajectory Data for Pattern Analysis Noman Mohammed, Benjamin C. M. Fung, Mourad Debbabi Concordia University, Montreal, Canada Introduction Anonymization Algorithm Empirical Study • Privacy Model: Let L be the maximum length of the background knowledge. Let S be a set of sensitive values. A trajectory database T satisfies LKC- • privacy if and only if for any sequence q with |q|<=L, |T(q)|>=K, where K > 0 is an integer anonymity threshold, and P(s|T(q))<=C, where 0 < C <=1 is a real number confidence threshold. • Utility Measure: We aim at preserving the maximal frequent sequences (MFS) because MFS often serves as the information basis for different primitive data mining tasks on sequential data, such as trajectory pattern mining [4]. • Identifying Violating Sequences: • Any non-empty sequence q with |q|<=L in T is a violating sequence if its group T(q) does not satisfy both the conditions of LKC-privacy. We enumerate all the minimal violating sequences(MVS) by our MVS-generator algorithm. • Eliminating Violating Sequences: • Figure 1 depicts both an MVS-tree and an MFS-tree generated from Table 1, where minimal violating sequences, V (T) = {b2d3;b2c4; b2f6; c4c7; c4e8} and maximal frequent sequences, U(T) = {b2c5c7; b2f6c7; b2c7e8; d3c4f6; f6c7e8; c5f6; c5e8; d3c7; d3e8} with L = 2, K = 2,C = 50%, and K’ = 2. • Recently, trajectory data mining has received a lot of attention in both the industry and the academic research. • Publication of these trajectories for data analysis purposes threatens individuals' privacy since these raw trajectory data provide location information that identifies individuals and, potentially, their sensitive information. • Example: Privacy threats of publishing trajectory data • Identity linkage: ID#1 is the only record that contains b2 and d3. Sensitive value (AIDS in this case) is easily identifiable. • Attribute linkage: Two out of the three records (ID#1,7,8) containing b2 and f6 have sensitive value AIDS, the adversary can infer that the victim has AIDS with 2/3 = 67% confidence. Conclusions We proposed a new LKC-privacy model based on the assumption that an adversary has limited background knowledge about the victim. We also presented an efficient algorithm for achieving LKC-privacy with the goal of preserving maximal frequent sequences, which serves as the basis of many data mining tasks on trajectory data. References Figure 1: MVS-tree and MFS-tree for efficient Score updates 1.O. Abul, F. Bonchi, and M. Nanni. Never walk alone: Uncertainty for anonymity in moving objects databases. In ICDE, 2008. 2.M. Terrovitis and N. Mamoulis. Privacy preservation in the publication of trajectories. In MDM, 2008. 3.R. Yarovoy, F. Bonchi, L. V. S. Lakshmanan, and W. H. Wang. Anonymizing moving objects: How to hide a MOB in a crowd? In EDBT, 2009. 4.F. Giannotti, M. Nanni, D. Pedreschi, and F. Pinelli. Trajectory pattern mining. In ACM SIGKDD, 2007. Table 2: Initial Score

More Related