2008 IEEE 24th International Conference on Data Engineering 2008
DOI: 10.1109/icde.2008.4497446
|View full text |Cite
|
Sign up to set email alerts
|

Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases

Abstract: Abstract-Preserving individual privacy when publishing data is a problem that is receiving increasing attention. According to the k-anonymity principle, each release of data must be such that each individual is indistinguishable from at least k − 1 other individuals. In this paper we study the problem of anonymity preserving data publishing in moving objects databases. We propose a novel concept of k-anonymity based on co-localization that exploits the inherent uncertainty of the moving object's whereabouts. D… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
370
0
1

Year Published

2009
2009
2023
2023

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 409 publications
(371 citation statements)
references
References 31 publications
0
370
0
1
Order By: Relevance
“…Consequently, several anonymity notions and methods for trajectories have been proposed [21,20,22,7,37,6,1,33,43,31,34,47,32,2,23,24]. Among those works, we next review the ones that are most similar to our approach, and we highlight our comparative advantages.…”
Section: Trajectory Anonymizationmentioning
confidence: 99%
See 4 more Smart Citations
“…Consequently, several anonymity notions and methods for trajectories have been proposed [21,20,22,7,37,6,1,33,43,31,34,47,32,2,23,24]. Among those works, we next review the ones that are most similar to our approach, and we highlight our comparative advantages.…”
Section: Trajectory Anonymizationmentioning
confidence: 99%
“…We theoretically and experimentally compare our first heuristic with a recent trajectory anonymization method called (k, δ)-anonymity [1] also aimed at trajectory k-anonymity without reachability constraints. Theoretical results show that the privacy preservation of our first method is the same as that of (k, δ)-anonymity but dealing with trajectories not having the same time span.…”
Section: Contribution and Plan Of This Articlementioning
confidence: 99%
See 3 more Smart Citations