http://www.cnr.it/ontology/cnr/individuo/prodotto/ID91626
Hiding sensitive trajectory patterns (Contributo in atti di convegno)
- Type
- Label
- Hiding sensitive trajectory patterns (Contributo in atti di convegno) (literal)
- Anno
- 2007-01-01T00:00:00+01:00 (literal)
- Alternative label
Abul O.; Atzori M.; Bonchi F.; Giannotti F. (2007)
Hiding sensitive trajectory patterns
in 6th International Workshop on Privacy Aspects of Data Mining. In conjunction with 2007 IEEE International Conference on Data Mining (ICDM 2007), Omaha, Nebraska, USA
(literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#autori
- Abul O.; Atzori M.; Bonchi F.; Giannotti F. (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#note
- In: 6th International Workshop on Privacy Aspects of Data Mining. In conjunction with 2007 IEEE International Conference on Data Mining (ICDM 2007) (Omaha, Nebraska, USA, 28 Ottobre 2007). Proceedings, pp. CD - ROM. IEEE Computer Society Press, 2007. (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#descrizioneSinteticaDelProdotto
- ABSTRACT: Spatio-temporal traces left behind by moving individuals are increasingly available. On the one hand, mining this kind of data is expected to produce interesting behavioral knowledge enabling novel classes of mobility applications; but on the other hand, due to the peculiar nature of position data, mining it creates important privacy concerns. Thus, studying privacy preserving data mining methods for moving object data is interesting and challenging. In this paper, we address the problem of hiding sensitive trajectory patterns from moving objects databases. The aim is to modify the database such that a given set of sensitive trajectory patterns can no longer be extracted, while the others are preserved as much as possible. We provide the formal problem statement and show that it is NP-hard; so we devise heuristics and a polynomial sanitization algorithm. We discuss a possible attack to our model, that exploits the knowledge of the underlying road network, and we enhance our model to protect from this kind of attacks. Experimental results show the effectiveness of our proposal. (literal)
- Note
- ISI Web of Science (WOS) (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#affiliazioni
- Computer Engineering Department, TOBB University of Economics and Technology, Ankara, Turkey (literal)
- Titolo
- Hiding sensitive trajectory patterns (literal)
- Prodotto di
- Autore CNR
- Insieme di parole chiave
Incoming links:
- Autore CNR di
- Prodotto
- Insieme di parole chiave di