Preserving privacy for moving objects data mining
The prevalence of mobile devices with geopositioning capability has resulted in the rapid growth in the amount of moving object trajectories. These data have been collected and analyzed for both commercial (e.g., recommendation system) and security (e.g. surveillance and monitoring system) purposes....
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2013
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/103169 http://hdl.handle.net/10220/16905 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-103169 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1031692020-05-28T07:18:32Z Preserving privacy for moving objects data mining Ho, Shen-Shyang. School of Computer Engineering IEEE International Conference on Intelligence and Security Informatics (2012 : Arlington, Virginia, US) DRNTU::Engineering::Computer science and engineering The prevalence of mobile devices with geopositioning capability has resulted in the rapid growth in the amount of moving object trajectories. These data have been collected and analyzed for both commercial (e.g., recommendation system) and security (e.g. surveillance and monitoring system) purposes. One needs to ensure the privacy of these raw trajectory data and the derived knowledge by not disclosing or releasing them to adversary. In this paper, we propose a practical implementation of a (ε; δ)-differentially private mechanism for moving objects data mining; in particular, we apply it to the frequent location pattern mining algorithm. Experimental results on the real-world GeoLife dataset are used to compare the performance of the (ε; δ)-differential privacy mechanism with the standard ε-differential privacy mechanism. 2013-10-25T03:39:17Z 2019-12-06T21:06:44Z 2013-10-25T03:39:17Z 2019-12-06T21:06:44Z 2012 2012 Conference Paper Ho, S. S. (2012). Preserving privacy for moving objects data mining. 2012 IEEE International Conference on Intelligence and Security Informatics, 135-137. https://hdl.handle.net/10356/103169 http://hdl.handle.net/10220/16905 10.1109/ISI.2012.6284198 en © 2012 IEEE. |
institution |
Nanyang Technological University |
building |
NTU Library |
country |
Singapore |
collection |
DR-NTU |
language |
English |
topic |
DRNTU::Engineering::Computer science and engineering |
spellingShingle |
DRNTU::Engineering::Computer science and engineering Ho, Shen-Shyang. Preserving privacy for moving objects data mining |
description |
The prevalence of mobile devices with geopositioning capability has resulted in the rapid growth in the amount of moving object trajectories. These data have been collected and analyzed for both commercial (e.g., recommendation system) and security (e.g. surveillance and monitoring system) purposes. One needs to ensure the privacy of these raw trajectory data and the derived knowledge by not disclosing or releasing them to adversary. In this paper, we propose a practical implementation of a (ε; δ)-differentially private mechanism for moving objects data mining; in particular, we apply it to the frequent location pattern mining algorithm. Experimental results on the real-world GeoLife dataset are used to compare the performance of the (ε; δ)-differential privacy mechanism with the standard ε-differential privacy mechanism. |
author2 |
School of Computer Engineering |
author_facet |
School of Computer Engineering Ho, Shen-Shyang. |
format |
Conference or Workshop Item |
author |
Ho, Shen-Shyang. |
author_sort |
Ho, Shen-Shyang. |
title |
Preserving privacy for moving objects data mining |
title_short |
Preserving privacy for moving objects data mining |
title_full |
Preserving privacy for moving objects data mining |
title_fullStr |
Preserving privacy for moving objects data mining |
title_full_unstemmed |
Preserving privacy for moving objects data mining |
title_sort |
preserving privacy for moving objects data mining |
publishDate |
2013 |
url |
https://hdl.handle.net/10356/103169 http://hdl.handle.net/10220/16905 |
_version_ |
1681056593127407616 |