1 / 28

Csci 8735: Advanced DBMS Spring 2011

Csci 8735: Advanced DBMS Spring 2011. Paper presentation by Vivek. Privacy-Preserving Data Mining on Moving Object Trajectories Gyözö Gidófalvi , Xuegang Huang, Torben Bach Pedersen MDM 2007: 60-68. Previously in this course…. “ Personalized Web search with location preferences”

balin
Download Presentation

Csci 8735: Advanced DBMS Spring 2011

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Csci 8735: Advanced DBMSSpring 2011 Paper presentation by Vivek

  2. Privacy-Preserving Data Mining on Moving Object Trajectories GyözöGidófalvi, Xuegang Huang, Torben Bach Pedersen MDM 2007: 60-68

  3. Previously in this course… “Personalized Web search with location preferences” “Location recommendation for location-based social networks” “GeoLife: A Collaborative Social Networking Service among User, Location and Trajectory”

  4. PRIVACY?

  5. Why is addressing privacy important? Duh!?

  6. Obvious reason: Potential threats (based on history, ability to find home address) Facebook privacy concerns

  7. Motivation Privacy has not always been addressed when dealing with moving object trajectories “Challenge of obtaining detailed, accurate patterns from anonymized location and trajectory data”

  8. What is this paper all about? How can we collect trajectory data without compromising user’s privacy while still allowing effective data mining?

  9. Contributions • Anonymization model for preserving location privacy • Grid-based framework for data collection and mining • Client-server architecture that implements above • Techniques for solving dense spatio-temporal areas and finding frequent routes (classic data mining tasks)

  10. Existing privacy protection Trusted middleware (anonymizer), encloses query location in a “cloaking” rectangle that includes location of k-1 other users (k-anonymity)

  11. k-anonymity

  12. Enable privacy on the client!

  13. Reduce the probability of finding user’s location!

  14. Spatio-Temporal Anonymization • “Anonymize the trajectory by reducing the spatio-temporal resolution of the 2D space” • Anonymization rectangle satisfying (areasize, maxLocProb) is (R, ts, te) • Can we enclose the whole trajectory in one rectangle? • Proposal: Provide anonymized trajectory by cutting it into pieces and enclosing each in R

  15. How do we anonymize trajectory data?

  16. Practical “Cut-Enclose” implementation • Split the whole trajectory into set of polylines • Time delay factor

  17. Non-deterministic approach

  18. Non deterministic way of constructing anonymization rectangles will lead to loss of privacy!

  19. Grid-based solution • Deterministic way to anonymize location, avoiding “overlapping” scenario • Build the rectangle based on a single, predefined 2D grid

  20. Grid-based solution continued… (a,t1), (b,t2)…(h,t7) => (p4,t1,t3), (p5,t4,t5), (p2,t6,t7)

  21. Common Regular Partitioning • Individual Regular Partitioning • Individual Irregular Partitioning

  22. Grid-based system

  23. Finding dense spatio-temporal areas Dense ST-area query D = {ci: ci.count >=min_count ^ ci.prob >=min_prob}

  24. We now have a way to anonymize trajectory data! We also know how to mine data!

  25. But…

  26. What is the cost of modifying existing data mining algorithms to work with anonymized data instead of “actual” data?

  27. References and other papers • Protecting moving trajectories with dummies • Generalized based approach towards trajectory anonymization • Uncertainty-aware path cloaking algorithm • Privacy in Location-based Services: A System Architecture Perspective

  28. SAY YES TO PRIVACY

More Related