Anonymization of moving objects databases by clustering and perturbation

Information Systems - Tập 35 Số 8 - Trang 884-910 - 2010
Osman Abul1, Francesco Bonchi2, Mirco Nanni3
1Department of Computer Engineering, TOBB University of Economics and Technology, Sogutozu, Ankara, Turkey
2Yahoo! Research, Avinguda Diagonal 177, 08018 Barcelona, Spain#TAB#
3Pisa KDD Laboratory, ISTI – CNR, Area della Ricerca di Pisa, Via Giuseppe Moruzzi, 1, 56124 Pisa, Italy

Tóm tắt

Từ khóa


Tài liệu tham khảo

P. Samarati, L. Sweeney, Generalizing data to provide anonymity when disclosing information (abstract), in: Proceedings of the 17th ACM Symposium on Principles of Database Systems (PODS’98), 1998.

O. Abul, F. Bonchi, M. Nanni, Never Walk Alone: uncertainty for anonymity in moving objects databases, in: Proceedings of the 24nd IEEE International Conference on Data Engineering (ICDE’08), 2008.

L. Chen, M.T. Özsu, V. Oria, Robust and fast similarity search for moving object trajectories, in: Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data (SIGMOD’05), 2005.

C. Bettini, X.S. Wang, S. Jajodia, Protecting privacy against location-based personal identification, in: Proceedings of the Second VLDB Workshop on Secure Data Management (SDM’05), 2005.

O. Wolfson, S. Chamberlain, S. Dao, L. Jiang, G. Mendez, Cost and imprecision in modeling the position of moving objects, in: Proceedings of the 14th IEEE International Conference on Data Engineering (ICDE’98), 1998.

Trajcevski, 2004, Managing uncertainty in moving objects databases, ACM Transactions on Database Systems, 29, 463, 10.1145/1016028.1016030

D. Pfoser, C.S. Jensen, Capturing the uncertainty of moving-object representations, in: Proceedings of the 6th International Symposium on Advances in Spatial Databases (SSD’99), 1999.

Wolfson, 1999, Updating and querying databases that track mobile units, Distributed and Parallel Databases, 7, 257, 10.1023/A:1008782710752

A. Jain, E.Y. Chang, Y.-F. Wang, Adaptive stream resource management using Kalman filters, in: Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data (SIGMOD’04), 2004.

O. Abul, F. Bonchi, M. Nanni, Never Walk Alone: trajectory anonymity via clustering, Technical Report ISTI-007/2007, ISTI-C.N.R., 2007.

A. Machanavajjhala, J. Gehrke, D. Kifer, M. Venkitasubramaniam, l-diversity: privacy beyond k-anonymity, in: Proceedings of the 22nd IEEE International Conference on Data Engineering (ICDE’06), 2006.

G. Aggarwal, T. Feder, K. Kenthapadi, R. Motwani, R. Panigrahy, D. Thomas, A. Zhu, Anonymizing tables, in: Proceedings of the 10th International Conference on Database Theory (ICDT’05), 2005.

A. Meyerson, R. Willliams, On the complexity of optimal k-anonymity, in: Proceedings of the 23rd ACM Symposium on Principles of Database Systems (PODS’04), 2004.

K. LeFevre, D.J. DeWitt, R. Ramakrishnan, Incognito: efficient full-domain k-anonymity, in: Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data (SIGMOD’05), 2005.

R. Bayardo, R. Agrawal, Data privacy through optimal k-anonymity, in: Proceedings of the 21st IEEE International Conference on Data Engineering (ICDE’05), 2005.

K. LeFevre, D.J. DeWitt, R. Ramakrishnan, Mondrian multidimensional k-anonymity, in: Proceedings of the 22nd IEEE International Conference on Data Engineering (ICDE’06), 2006.

Atzori, 2008, Anonymity preserving pattern discovery, VLDB Journal, 17, 703, 10.1007/s00778-006-0034-x

M. Gruteser, D. Grunwald, Anonymous usage of location-based services through spatial and temporal cloaking, in: Proceedings of the First International Conference on Mobile Systems, Applications, and Services (MobiSys 2003), 2003.

B. Gedik, L. Liu, Location privacy in mobile systems: a personalized anonymization model, in: Proceedings of the 25th International Conference on Distributed Computing Systems (ICDCS’05), 2005.

H. Kido, Y. Yanagisawa, T. Satoh, Protection of location privacy using dummies for location-based services, in: Proceedings of the 21st IEEE International Conference on Data Engineering (ICDE’05), 2005.

A.R. Beresford, F. Stajano, Mix zones: user privacy in location-aware services, in: Proceedings of the Second IEEE Conference on Pervasive Computing and Communications Workshops (PERCOM’04), 2004.

Gruteser, 2004, Protecting privacy in continuous location-tracking applications, IEEE Security & Privacy Magazine, 2, 28, 10.1109/MSECP.2004.1281242

B. Hoh, M. Gruteser, H. Xiong, A. Alrabady, Preserving privacy in gps traces via uncertainty-aware path cloaking, in: Proceedings of the 2007 ACM Conference on Computer and Communications Security, (CCS’07), 2007.

B. Hoh, M. Gruteser, R. Herring, J. Ban, D. Work, J.C. Herrera, A.M. Bayen, M. Annavaram, Q. Jacobson, Virtual trip lines for distributed privacy-preserving traffic monitoring, in: Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services (MobiSys 2008), 2008.

Güting, 2005

G. Kollios, D. Gunopulos, V.J. Tsotras, On indexing mobile objects, in: Proceedings of the 18th ACM Symposium on Principles of Database Systems (PODS’99), 1999.

P.K. Agarwal, L. Arge, J. Erickson, Indexing moving points, in: Proceedings of the 19th ACM Symposium on Principles of Database Systems (PODS’00), 2000.

Hadjieleftheriou, 2006, Indexing spatiotemporal archives, VLDB Journal, 15, 143, 10.1007/s00778-004-0151-3

A.P. Sistla, O. Wolfson, S. Chamberlain, S. Dao, Modeling and querying moving objects, in: Proceedings of the 13th IEEE International Conference on Data Engineering (ICDE’97), 1997.

D. Pfoser, C.S. Jensen, Y. Theodoridis, Novel approaches in query processing for moving object trajectories, in: Proceedings of the 26th International Conference on Very Large Databases (VLDB’00), 2000.

Güting, 2000, A foundation for representing and querying moving objects, ACM Transactions on Database Systems, 25, 1, 10.1145/352958.352963

M. Terrovitis, N. Mamoulis, Privacy preservation in the publication of trajectories, in: Proceedings of the 9th International Conference on Mobile Data Management (MDM’08), 2008.

E. Nergiz, M. Atzori, Y. Saygin, Towards trajectory anonymization: a generalization-based approach, in: Proceedings of ACM GIS Workshop on Security and Privacy in GIS and LBS, 2008.

R. Yarovoy, F. Bonchi, L.V.S. Lakshmanan, W.H. Wang, Anonymizing moving objects: How to hide a MOB in a crowd? in: Proceedings of the 12th International Conference on Extending Database Technology (EDBT’09), 2009.

C.C. Aggarwal, P.S. Yu, A condensation approach to privacy preserving data mining, in: Proceedings of the 9th International Conference on Extending Database Technology, (EDBT’04), 2004.

C.C. Aggarwal, P.S. Yu, On anonymization of string data, in: Proceedings of the 2007 SIAM International Conference on Data Mining, 2007.

Domingo-Ferrer, 2005, Ordinal, continuous and heterogeneous-anonymity through microaggregation, Data Mining and Knowledge Discovery, 11, 195, 10.1007/s10618-005-0007-5

D. Defays, P. Nanopoulos, Panels of enterprises and confidentiality: the small aggregates method, in: Proceedings of 92 Symposium on Design and Analysis of Longitudinal Surveys, Ottawa, Statistics Canada, 1993, pp. 195–204.

Domingo-Ferrer, 2002, Practical data-oriented microaggregation for statistical disclosure control, IEEE Transactions on Knowledge and Data Engineering, 14, 189, 10.1109/69.979982

V. Torra, Microaggregation for categorical variables: a median based approach, in: Privacy in Statistical Databases, Lecture Notes in Computer Science, vol. 3050, Springer, 2004, pp. 162–174.

G. Aggarwal, T. Feder, K. Kenthapadi, S. Khuller, R. Panigrahy, D. Thomas, A. Zhu, Achieving anonymity via clustering, in: Proceedings of the 25th ACM Symposium on Principles of Database Systems (PODS’06), 2006.

J. Li, R.C.-W. Wong, A.W.-C. Fu, J. Pei, Achieving k-anonymity by clustering in attribute hierarchical structures, in: Proceedings of the 8th International Conference on Data Warehousing and Knowledge Discovery (DaWaK’06), 2006.

J.-W. Byun, A. Kamra, E. Bertino, N. Li, Efficient k-anonymization using clustering techniques, in: Proceedings of the 12th International Conference Database Systems for Advanced Applications, (DASFAA’07), 2007.

B.-K. Yi, C. Faloutsos, Fast time sequence indexing for arbitrary lp norms, in: Proceedings of the 26th International Conference on Very Large Databases (VLDB’00), 2000.

E.J. Keogh, Exact indexing of dynamic time warping, in: Proceedings of the 28th International Conference on Very Large Databases (VLDB’02), 2002.

M. Vlachos, D. Gunopulos, G. Kollios, Discovering similar multidimensional trajectories, in: Proceedings of the 18th IEEE International Conference on Data Engineering (ICDE’02), 2002.

L. Chen, R.T. Ng, On the marriage of lp-norms and edit distance, in: Proceedings of the 30th International Conference on Very Large Databases (VLDB’04), 2004.

L. Sweeney, k-Anonymity privacy protection using generalization and suppression, International Journal on Uncertainty Fuzziness and Knowledge-based Systems 10 (5).

C.C. Aggarwal, On k-anonymity and the curse of dimensionality, in: Proceedings of the 31st International Conference on Very Large Databases (VLDB’05), 2005.

E. Frentzos, K. Gratsias, N. Pelekis, Y. Theodoridis, Nearest neighbor search on moving object trajectories, in: Proceedings of the 9th International Symposium on Advances in Spatial and Temporal Databases (SSTD’05), 2005.

Domingo-Ferrer, 2002, Practical data-oriented microaggregation for statistical disclosure control, IEEE Transactions on Knowledge and Data Engineering, 14, 189, 10.1109/69.979982

Brinkhoff, 2003, Generating traffic data, IEEE Data Engineering Bulletin, 26, 19

van Rijsbergen, 1979

Mouratidis, 2010, Anonymous query processing in road networks, IEEE Transactions on Knowledge and Data Engineering, 22, 2, 10.1109/TKDE.2009.48

Wang, 2009, Privacy-aware mobile services over road networks, PVLDB, 2, 1042

O. Abul, F. Bonchi, F. Giannotti, Hiding sequential and spatio-temporal patterns, IEEE Transactions on Knowledge and Data Engineering, 2009, accepted for publication.