2010
Conference article  Open Access

Preserving privacy in semantic-rich trajectories of human mobility

Monreale A., Trasarti R., Renso C., Pedreschi D., Bogorny V.

68U99  Database Applications. Data mining  Privacy semantic trajectories 

The increasing abundance of data about the trajectories of personal movement is opening up new opportunities for an- alyzing and mining human mobility, but new risks emerge since it opens new ways of intruding into personal privacy. Representing the personal movements as sequences of places visited by a person during her/his movements - semantic trajectory - poses even greater privacy threats w.r.t. raw geometric location data. In this paper we propose a pri- vacy model defining the attack model of semantic trajectory linking, together with a privacy notion, called c-safety. This method provides an upper bound to the probability of in- ferring that a given person, observed in a sequence of non- sensitive places, has also stopped in any sensitive location. Coherently with the privacy model, we propose an algorithm for transforming any dataset of semantic trajectories into a c-safe one. We report a study on a real-life GPS trajec- tory dataset to show how our algorithm preserves interesting quality/utility measures of the original trajectories, such as sequential pattern mining results.

Source: 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, pp. 47, San Jose, CA, USA, 3-5 November 2010

Publisher: ACM Press, New York, USA


Metrics



Back to previous page
BibTeX entry
@inproceedings{oai:it.cnr:prodotti:92106,
	title = {Preserving privacy in semantic-rich trajectories of human mobility},
	author = {Monreale A. and Trasarti R. and Renso C. and Pedreschi D. and Bogorny V.},
	publisher = {ACM Press, New York, USA},
	doi = {10.1145/1868470.1868481},
	booktitle = {3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, pp. 47, San Jose, CA, USA, 3-5 November 2010},
	year = {2010}
}