Serviços Personalizados
Journal
Artigo
Indicadores
- Citado por SciELO
- Acessos
Links relacionados
- Similares em SciELO
Compartilhar
Polibits
versão On-line ISSN 1870-9044
Polibits no.46 México Jul./Dez. 2012
Anonymizing but Deteriorating Location Databases
Tran Khanh Dang1 and Tuan Anh Truong2
1 Faculty of Computer Science & Engineering, HCMC University of Technology, VNUHCM, Ho Chi Minh City, Vietnam (email: khanh@cse.hcmut.edu.vn).
2 Department of Information Engineering and Computer Science, University of Trento, Italy (email: anhtt@cse.hcmut.edu.vn).
Manuscript received March 14, 2012.
Manuscript accepted for publication December 12, 2012.
Abstract
The tremendous development of locationbased services and mobile devices has led to an increase in location databases. Through the data mining process, valuable information can be discovered from such location databases. However, the malicious data miner or attackers may also extract private and sensitive information about the user, and this can create threats against the user location privacy. Therefore, location privacy protection becomes a key factor to the success in privacy protection for the users of locationbased services. In this paper, we propose a novel approach as well as an algorithm to guarantee kanonymity in a location database. The algorithm will maintain the association rules that have significance for the data mining process. Moreover, there may appear new significant association rules created after anonymization, they maybe affect the data mining result. Therefore, the algorithm also considers excluding new significant association rules that are created during the run of the algorithm. Theoretical analyses and experimental results with realworld datasets will confirm the practical value of our newly proposed approach.
Key words: kanonymity, location databases, data mining, privacy protection.
DESCARGAR ARTÍCULO EN FORMATO PDF
REFERENCES
[1] Sergio, M., Claudio, B., Wang, S.X. and Sushil, J.: kanonymity in Databases with Time Stamped Data. In: 13th International Symposium on Temporal Representation and Reasoning, pp. 177186, IEEE Press, Budapest, Hungary (2006). [ Links ]
[2] Truong, T.A., Truong, Q.C. and Dang, T.K.: An Adaptive Gridbased Approach to Location Privacy Preservation. In: 2nd Asian Conference on Intelligent Information and Database Systems, pp. 133144, Springer Verlag, Vietnam (2010) [ Links ]
[3] Truong, Q.C., Truong, T.A. and Dang, T.K.: The Memorizing Algorithm: Protecting User Privacy in LocationBased Services using Historical Services Information. In: International Journal of Mobile Computing and Multimedia Comm., 2(4), pp. 6586, IGIGlobal (2010) [ Links ]
[4] Dang, T.K, Kueng, J., Huynh, V.Q.P: Protecting User Privacy while Discovering and Maintaining Association Rules. In: 4th IFIP International Conference on New Technologies, Mobility and Security, IEEE Computer Society, Paris, France (2011) [ Links ]
[5] Ciriani, V., De Capitani di Vimercati, S., Foresti, S. and Samarati, P.: kAnonymous Data Mining: A Survey. In: Michael, G., Sushil, J. (eds.), Handbook of Database Security Applications and Trends, pp. 105136, Springer Science, LLC (2008) [ Links ]
[6] Sweeney, L.: Achieving kanonymity Privacy Protection using Generalization and Suppression. In: International Journal of Uncertainty, Fuzziness and Knowledgebased Systems, 10(5), pp. 571588, World Scientific (2002) [ Links ]
[7] Samarati, P. and Sweeney, L.: Protecting Privacy When Disclosing Information: kanonymity and its Enforcement through Generalization and Suppression. Technical Report SRICSL9804, Computer Science Laboratory, SRI International (1998) [ Links ]
[8] Gedik, B. and Ling, L.: Protecting Location Privacy with Personalized kAnonymity: Architecture and Algorithms. In: IEEE Trans. on Mobile Computing, 7(1), pp. 118 (2008) [ Links ]
[9] Gruteser, M. and Grunwald, D.: Anonymous Usage of LocationBased Services through Spatial and Temporal Cloaking. In: ACM International Conference Mobile Systems, Applications, and Services, pp 3142, ACM New York, USA (2003) [ Links ]
[10] Bettini, C., Mascetti, S. and Wang, X.S.: Privacy Protection through Anonymity in Locationbased Services. In: Michael, G., Sushil, J. (eds.), Handbook of Database Security Applications and Trends, pp. 509530, Springer Science, LLC (2008) [ Links ]
[11] To, Q.C., Dang, T.K., Kueng, J.: A Hilbertbased Framework for Preserving Privacy in Locationbased Services. Intl. Journal of Intelligent Information and Database Systems (IJIIDS), Inderscience Publisher, ISSN 17515858 (2012) (to appear) [ Links ]
[12] Cuellar, J.R.: Location Information Privacy. In: B. Srikaya (Ed.), Geographic Location in the Internet, pp. 179208, Kluwer Academic Publishers (2002) [ Links ]
[13] Gidófalvi, G., Huang, X. and Pedersen, T.B: PrivacyPreserving Data Mining on Moving Object Trajectories. In: 8th International Conference on Mobile Data Management, pp. 6068, Mannheim, Germany (2007) [ Links ]
[14] Bettini, C., Wang, X. and Jajodia, S.: Protecting Privacy against Locationbased Personal Identification. In: 2nd VLDB Workshop on Secure Data Management, pp. 185199, Trondheim, Norway (2005) [ Links ]
[15] Ardagna, C.A., Cremonini, M., Vimercati, S.D.C. and Samarati, P.: Privacyenhanced Locationbased Access Control. In: Michael, G., Sushil, J. (eds.), Handbook of Database Security Applications and Trends, pp. 531552, Springer Science, LLC (2008) [ Links ]
[16] Zheng, Y., Li, Q., Chen, Y. and Xie, X.: Understanding Mobility Based on GPS Data. In: ACM conference on Ubiquitous Computing, pp. 312321, ACM Press, Seoul, Korea (2008) [ Links ]
[17] Zheng, Y., Zhang, L., Xie, X. and Ma, W.Y.: Mining Interesting Locations and Travel Sequences from GPS Trajectories. In: International conference on World Wild Web, pp. 791800, ACM Press, Madrid, Spain (2009) [ Links ]
[18] Newman, D.J., Hettich, S., Blake, C.L. and Merz, C.J.: UCI Repository of Machine Learning Databases, available at www.ics.uci.edu/mlearn/MLRepository.html, University of California, Irvine (1998) [ Links ]
[19] Jun, L.L. and Meng, C.W.: An Efficient Clustering Method for kanonymization. In: the 2008 International Workshop on Privacy and Anonymity in Information Society, pp. 4650, ACM New York, Nantes, France (2008) [ Links ]
[20] Li, J., Wong, R.C.W., Fu, A.W.C and Pei, J.: Achieving kAnonymity by Clustering in Attribute Hierarchical Structures. In: Tjoa, A.M., Trujillo, J. (eds.) Data Warehousing and Knowledge Discovery, LNCS 4081, pp. 405416, Springer Verlag, Heidelberg (2006) [ Links ]
[21] Huynh, V.Q.P. and Dang, T.K.: eM2: An Efficient Member Migration Algorithm for Ensuring kAnonymity and Mitigating Information Loss. In: 7th VLDB Workshop on Secure Data Management, pp. 2640, Springer Verlag, Singapore (2010) [ Links ]
[22] To, Q.C., Dang, T.K., Kueng, J.: OSTtree: An Access Method for Obfuscating SpatioTemporal Data in Location Based Services. In: 4th IFIP International Conference on New Technologies, Mobility and Security, IEEE Computer Society, Paris, France (2011) [ Links ]
[23] To, Q.C., Dang, T.K., Kueng, J.: BobTree: An Efficient B+Tree Based Index Structure for Geographicaware Obfuscation. In: 3rd Asian Conference on Intelligent Information and Database Systems, LNAI 6591, pp. 109118, Springer Verlag, Korea (2011) [ Links ]
[24] To, Q.C., Dang, T.K., Kueng, J.: A Hilbertbased Framework for Preserving Privacy in Locationbased Services. In: International Journal of Intelligent Information and Database Systems, Inderscience Publisher (2013, to appear) [ Links ]
[25] Le, T.B.T, Dang, T.K.: Semantic BobTree: A New Obfuscation Technique for Location Privacy Protection. In: 10th International Conference on Advances in Mobile Computing & Multimedia, ACM, Bali, Indonesia (2012) [ Links ]