An efficient privacy-preserving system for monitoring mobile users

Author(s):  
Gabriel Ghinita ◽  
Razvan Rughinis
Algorithms ◽  
2018 ◽  
Vol 11 (12) ◽  
pp. 207 ◽  
Author(s):  
Elias Dritsas ◽  
Maria Trigka ◽  
Panagiotis Gerolymatos ◽  
Spyros Sioutas 

In the context of this research work, we studied the problem of privacy preserving on spatiotemporal databases. In particular, we investigated the k-anonymity of mobile users based on real trajectory data. The k-anonymity set consists of the k nearest neighbors. We constructed a motion vector of the form (x,y,g,v) where x and y are the spatial coordinates, g is the angle direction, and v is the velocity of mobile users, and studied the problem in four-dimensional space. We followed two approaches. The former applied only k-Nearest Neighbor (k-NN) algorithm on the whole dataset, while the latter combined trajectory clustering, based on K-means, with k-NN. Actually, it applied k-NN inside a cluster of mobile users with similar motion pattern (g,v). We defined a metric, called vulnerability, that measures the rate at which k-NNs are varying. This metric varies from 1 k (high robustness) to 1 (low robustness) and represents the probability the real identity of a mobile user being discovered from a potential attacker. The aim of this work was to prove that, with high probability, the above rate tends to a number very close to 1 k in clustering method, which means that the k-anonymity is highly preserved. Through experiments on real spatial datasets, we evaluated the anonymity robustness, the so-called vulnerability, of the proposed method.


Author(s):  
Elisa Baglioni ◽  
Luca Becchetti ◽  
Lorenzo Bergamini ◽  
Ugo Colesanti ◽  
Luca Filipponi ◽  
...  

2013 ◽  
Vol 40 (1) ◽  
pp. 49-77 ◽  
Author(s):  
L. Becchetti ◽  
L. Bergamini ◽  
U. M. Colesanti ◽  
L. Filipponi ◽  
Ginseppe Persiano ◽  
...  

2018 ◽  
Vol Volume-2 (Issue-3) ◽  
pp. 1191-1195
Author(s):  
Immisetty Radhika ◽  
K. Anuradha ◽  

2016 ◽  
Vol 24 (6) ◽  
pp. 3276-3289 ◽  
Author(s):  
Xinlei Wang ◽  
Amit Pande ◽  
Jindan Zhu ◽  
Prasant Mohapatra

2015 ◽  
Vol 12 (5) ◽  
pp. 152-161 ◽  
Author(s):  
Ning Fei ◽  
Yi Zhuang ◽  
Jingjing Gu ◽  
Jiannong Cao ◽  
Liang Yang

Sign in / Sign up

Export Citation Format

Share Document