Giannotti F., Bonchi F., Abul O.
Computational Theory and Mathematics Sequential patterns Computer Science Applications Spatiotemporal patterns Information Systems Knowledge hiding Data publishing
The process of discovering relevant patterns holding in a database was first indicated as a threat to database security by O'Leary in [1]. Since then, many different approaches for knowledge hiding have emerged over the years, mainly in the context of association rules and frequent item sets mining. Following many real-world data and application demands, in this paper, we shift the problem of knowledge hiding to contexts where both the data and the extracted knowledge have a sequential structure. We define the problem of hiding sequential patterns and show its NP-hardness. Thus, we devise heuristics and a polynomial sanitization algorithm. Starting from this framework, we specialize it to the more complex case of spatiotemporal patterns extracted from moving objects databases. Finally, we discuss a possible kind of attack to our model, which exploits the knowledge of the underlying road network, and enhance our model to protect from this kind of attack. An exhaustive experiential analysis on real-world data sets shows the effectiveness of our proposal.
Source: IEEE transactions on knowledge and data engineering (Print) 22 (2010): 1709–1723. doi:10.1109/TKDE.2009.213
Publisher: Institute of Electrical and Electronics Engineers,, New York, NY , Stati Uniti d'America
@article{oai:it.cnr:prodotti:185279, title = {Hiding Sequential and Spatiotemporal Patterns}, author = {Giannotti F. and Bonchi F. and Abul O.}, publisher = {Institute of Electrical and Electronics Engineers,, New York, NY , Stati Uniti d'America}, doi = {10.1109/tkde.2009.213}, journal = {IEEE transactions on knowledge and data engineering (Print)}, volume = {22}, pages = {1709–1723}, year = {2010} }