Research Poster 24 x 36 - J - PowerPoint PPT Presentation

1 / 1
About This Presentation
Title:

Research Poster 24 x 36 - J

Description:

To order poster prints visit us at www.genigraphics.com ... Pattern Analysis Noman Mohammed, Benjamin C. M. Fung, Mourad Debbabi Concordia University, Montreal, Canada – PowerPoint PPT presentation

Number of Views:38
Avg rating:3.0/5.0
Slides: 2
Provided by: Genigr7
Category:

less

Transcript and Presenter's Notes

Title: Research Poster 24 x 36 - J


1
Walking in the Crowd Anonymizing Trajectory Data
for Pattern Analysis Noman Mohammed, Benjamin C.
M. Fung, Mourad Debbabi Concordia University,
Montreal, Canada
Introduction
Anonymization Algorithm
Empirical Study
  • Privacy Model Let L be the maximum length of
    the background knowledge. Let S be a set of
    sensitive values. A trajectory database T
    satisfies LKC-
  • privacy if and only if for any sequence q with
    qltL, T(q)gtK, where K gt 0 is an integer
    anonymity threshold, and P(sT(q))ltC, where 0 lt
    C lt1 is a real number confidence threshold.
  • Utility Measure We aim at preserving the
    maximal frequent sequences (MFS) because MFS
    often serves as the information basis for
    different primitive data mining tasks on
    sequential data, such as trajectory pattern
    mining 4.
  • Identifying Violating Sequences
  • Any non-empty sequence q with qltL in T is a
    violating sequence if its group T(q) does not
    satisfy both the conditions of LKC-privacy. We
    enumerate all the minimal violating
    sequences(MVS) by our MVS-generator algorithm.
  • Eliminating Violating Sequences
  • Figure 1 depicts both an MVS-tree and an MFS-tree
    generated from Table 1, where minimal violating
    sequences, V (T) b2d3b2c4 b2f6 c4c7 c4e8
    and maximal frequent sequences, U(T) b2c5c7
    b2f6c7 b2c7e8 d3c4f6 f6c7e8 c5f6 c5e8 d3c7
    d3e8 with L 2, K 2,C 50, and K 2.
  • Recently, trajectory data mining has received a
    lot of attention in both the industry and the
    academic research.
  • Publication of these trajectories for data
    analysis purposes threatens individuals' privacy
    since these raw trajectory data provide location
    information that identifies individuals and,
    potentially, their sensitive information.
  • Example Privacy threats of publishing
    trajectory data

Conclusions
We proposed a new LKC-privacy model based on the
assumption that an adversary has limited
background knowledge about the victim. We also
presented an efficient algorithm for achieving
LKC-privacy with the goal of preserving maximal
frequent sequences, which serves as the basis of
many data mining tasks on trajectory data.

References
Figure 1 MVS-tree and MFS-tree for efficient
Score updates
1.O. Abul, F. Bonchi, and M. Nanni. Never walk
alone Uncertainty for anonymity in moving
objects databases. In ICDE, 2008. 2.M. Terrovitis
and N. Mamoulis. Privacy preservation in the
publication of trajectories. In MDM, 2008. 3.R.
Yarovoy, F. Bonchi, L. V. S. Lakshmanan, and W.
H. Wang. Anonymizing moving objects How to
hide a MOB in a crowd? In EDBT, 2009. 4.F.
Giannotti, M. Nanni, D. Pedreschi, and F.
Pinelli. Trajectory pattern mining. In ACM
SIGKDD, 2007.
Table 2 Initial Score
Write a Comment
User Comments (0)
About PowerShow.com