2019
DOI: 10.48550/arxiv.1903.12211
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Privacy in trajectory micro-data publishing : a survey

Marco Fiore,
Panagiota Katsikouli,
Elli Zavou
et al.

Abstract: We survey the literature on the privacy of trajectory micro-data, i.e., spatiotemporal information about the mobility of individuals, whose collection is becoming increasingly simple and frequent thanks to emerging information and communication technologies. The focus of our review is on privacy-preserving data publishing (PPDP), i.e., the publication of databases of trajectory microdata that preserve the privacy of the monitored individuals. We classify and present the literature of attacks against trajectory… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 79 publications
0
5
0
Order By: Relevance
“…3 https://www.cprd.com/content/synthetic-data#CPRD%20cardiovascular%20disease%20synthetic%20dataset. 4 https://www.cprd.com/content/synthetic-data#CPRD%20COVID-19%20symptoms%20and%20risk%20factors%20synthetic%20dataset. 5 For access to code and details about the R package bnlearn: https://cran.r-project.org/web/packages/bnlearn/index.html.…”
Section: Generative Modelsmentioning
confidence: 99%
See 1 more Smart Citation
“…3 https://www.cprd.com/content/synthetic-data#CPRD%20cardiovascular%20disease%20synthetic%20dataset. 4 https://www.cprd.com/content/synthetic-data#CPRD%20COVID-19%20symptoms%20and%20risk%20factors%20synthetic%20dataset. 5 For access to code and details about the R package bnlearn: https://cran.r-project.org/web/packages/bnlearn/index.html.…”
Section: Generative Modelsmentioning
confidence: 99%
“…Despite several safeguards that are put into place to ensure data privacy, linked datasets hold the additional risk of a potential “linkage attack” which refers to the attempt of an adversary to re-identify individuals in the linked data by using side information owned by the adversary. This information could be obtained by directly observing target individuals, mining suitable open data or gaining access to the original data through data breaches [ 4 ]. Hence, in the UK and elsewhere, measures to protect the confidentiality of data fall under the “Five safes” framework: safe data, safe people, safe projects, safe outputs, and safe settings [ 5 ].…”
Section: Introductionmentioning
confidence: 99%
“…While other surveys on trajectory privacy have been published already, they are either vertical (e.g., focusing on wireless sensor networks [21], opportunistic mobile networks [22], and automotive applications [23]), or lacking of a systematic categorization and evaluation of utility and privacy metrics (e.g., [24], [25], [26]), or have been published before well-known recent results (e.g., [27]). Overall, the main contributions of this paper are as follows:…”
Section: Positioning and Contributionsmentioning
confidence: 99%
“…Intuitively, the access to a trajectory dataset should not reveal too much additional information to what is already known by the adversary. Probabilistic attacks can be considered as a generalization of attribute linkage [26], since their goal is not to infer a specific sensitive attribute, but rather to increase the generic knowledge of an adversary. For instance, given some locations known by an adversary, while linkage attacks focus on specific sensitive data, a successful probabilistic attack can reveal the entire trajectory of an individual (as in record linkage) as well as the sensitive attributes related to that trajectory (as in attribute linkage).…”
Section: Probabilistic Modelsmentioning
confidence: 99%
“…Although a plethora of different anonymization techniques have been proposed for location data (for a very thorough survey see [19]), they all suffer from either weak utility, or weak privacy guarantees, or they are not scalable to large datasets. Indeed, location data are inherently high-dimensional and often sparse, which makes an individual's location trajectory unique even in very large populations 3 .…”
Section: Introductionmentioning
confidence: 99%