SlideShare une entreprise Scribd logo
1  sur  22
PRESERVING PRIVACY IN SEMANTIC-RICH TRAJECTORIES OF HUMAN MOBILITY Anna Monreale, Roberto Trasarti, Dino Pedreschi, Chiara Renso KDDLab, Pisa  Vania Bogorny Univ. Santa Catarina, Brasile Knowledge Discovery and Delivery Lab (ISTI-CNR  &  Univ. Pisa) www-kdd.isti.cnr.it ANONIMO MEETING, Pisa, 20,21 settembre 2010 SPRINGL 2010, San Jose, November 2, 2010
How the story begins… Semantic trajectories represent the important places visited by people This information can be privacy sensitive! We should find a good generalization of the visited places… preserving semantics! But how? Can we use a taxonomy of places to generalize and find anonymous datasets? Let’s ask help to Anna, Dino and Roberto!
Semantic Trajectories ,[object Object],[object Object],[object Object],[object Object],[object Object]
Semantic Trajectory and Privacy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Semantic Trajectories Analysis and Privacy Issues ,[object Object],[object Object],[object Object]
Semantic Trajectories Analysis and Privacy Issues ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Privacy Framework ,[object Object],[object Object],[object Object],[object Object]
Quasi-identifier and Sensitive stops ,[object Object],[object Object],[object Object],[object Object],[object Object]
Privacy place taxonomy
Privacy Model ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
C-Safe Dataset ,[object Object],[object Object],[object Object],[object Object]
How we can obtain a c-safe dataset? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Example (1): The process Consider the following set of sequences, and m=3 and c=0.45:  S =  { <S1, R2,  H1 , R1,  C1 , S2>  <S3, D1, R1,  C1 , S2> <S1, P3,  C2 , D2, S2>  … }
Example (2) CostQ CostQ  is the number of hops on the tree needed to generalize the sequences of Quasi-identifiers to a common one. Consider the group: <S1, R2,  H1 , R1,  C1 , S2>  <S3, D1, R1,  C1 , S2>  <S1, P3,  C2 , D2, S2> CostQ = 6 + 6  + 6 = 18  <Station,Place,Entertainment,S2  (H1,C1) > <Station,Place,Entertainment,S2  (C1) > <Station,Place,Entertainment,S2  (C2) >
Example (2) CostS CostS is the number of hops on the tree needed to generalize the sequence of Sensible in order to obtain the c-safety. From the generalized group: <Station,Place,Entertainment,S2  (H1,C1) > <Station,Place,Entertainment,S2  (C1) > <Station,Place,Entertainment,S2  (C2) > CostS = 3 The Total Cost of this  group is 21 hops,  which is the lower combination <Station, Place,  H1 , Entertainment,  Clinic , S2 > <Station, Place, Entertainment,  Clinic , S2>  <Station, Place,  Clinic , Entertainment, S2>
Example (4): Why is C-safe ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Experiments ,[object Object],[object Object],[object Object],[object Object],The dataset contains trajectories of 17000 moving cars in Milan, in one week, collected through GPS devices.
Experiments: Quality of the analysis ,[object Object]
Experiments: Coverage Coefficient
Experiments: Quality of the analysis ,[object Object]
Experiments: Distance Coefficient
Conclusions and Future work ,[object Object],[object Object],[object Object],[object Object]

Contenu connexe

Similaire à Preserving Privacy in Semantic-Rich Trajectories of Human Mobility

Square grid points coveraged by
Square grid points coveraged bySquare grid points coveraged by
Square grid points coveraged by
ijcsit
 
Machine Learning Tutorial Part - 2 | Machine Learning Tutorial For Beginners ...
Machine Learning Tutorial Part - 2 | Machine Learning Tutorial For Beginners ...Machine Learning Tutorial Part - 2 | Machine Learning Tutorial For Beginners ...
Machine Learning Tutorial Part - 2 | Machine Learning Tutorial For Beginners ...
Simplilearn
 
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE FOR SECURE CLOUD STORAGE
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE  FOR SECURE CLOUD STORAGEDATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE  FOR SECURE CLOUD STORAGE
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE FOR SECURE CLOUD STORAGE
IJTRET-International Journal of Trendy Research in Engineering and Technology
 
Distance Metric Based Multi-Attribute Seismic Facies Classification to Identi...
Distance Metric Based Multi-Attribute Seismic Facies Classification to Identi...Distance Metric Based Multi-Attribute Seismic Facies Classification to Identi...
Distance Metric Based Multi-Attribute Seismic Facies Classification to Identi...
Pioneer Natural Resources
 

Similaire à Preserving Privacy in Semantic-Rich Trajectories of Human Mobility (20)

International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
Where Next
Where NextWhere Next
Where Next
 
ADAPTIVE CONTOURLET TRANSFORM AND WAVELET TRANSFORM BASED IMAGE STEGANOGRAPHY...
ADAPTIVE CONTOURLET TRANSFORM AND WAVELET TRANSFORM BASED IMAGE STEGANOGRAPHY...ADAPTIVE CONTOURLET TRANSFORM AND WAVELET TRANSFORM BASED IMAGE STEGANOGRAPHY...
ADAPTIVE CONTOURLET TRANSFORM AND WAVELET TRANSFORM BASED IMAGE STEGANOGRAPHY...
 
Square grid points coveraged by
Square grid points coveraged bySquare grid points coveraged by
Square grid points coveraged by
 
IRJET- Clustering the Real Time Moving Object Adjacent Tracking
IRJET-  	  Clustering the Real Time Moving Object Adjacent TrackingIRJET-  	  Clustering the Real Time Moving Object Adjacent Tracking
IRJET- Clustering the Real Time Moving Object Adjacent Tracking
 
Machine Learning Tutorial Part - 2 | Machine Learning Tutorial For Beginners ...
Machine Learning Tutorial Part - 2 | Machine Learning Tutorial For Beginners ...Machine Learning Tutorial Part - 2 | Machine Learning Tutorial For Beginners ...
Machine Learning Tutorial Part - 2 | Machine Learning Tutorial For Beginners ...
 
Final Report-1-(1)
Final Report-1-(1)Final Report-1-(1)
Final Report-1-(1)
 
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE FOR SECURE CLOUD STORAGE
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE  FOR SECURE CLOUD STORAGEDATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE  FOR SECURE CLOUD STORAGE
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE FOR SECURE CLOUD STORAGE
 
Evaluation of Uncertain Location
Evaluation of Uncertain Location Evaluation of Uncertain Location
Evaluation of Uncertain Location
 
50120130405020
5012013040502050120130405020
50120130405020
 
An Aggregate Location Monitoring System Of Privacy Preserving In Authenticati...
An Aggregate Location Monitoring System Of Privacy Preserving In Authenticati...An Aggregate Location Monitoring System Of Privacy Preserving In Authenticati...
An Aggregate Location Monitoring System Of Privacy Preserving In Authenticati...
 
EVALUATING THE OPTIMAL PLACEMENT OF BINARY SENSORS
EVALUATING THE OPTIMAL PLACEMENT OF BINARY SENSORSEVALUATING THE OPTIMAL PLACEMENT OF BINARY SENSORS
EVALUATING THE OPTIMAL PLACEMENT OF BINARY SENSORS
 
Recommendation system using collaborative deep learning
Recommendation system using collaborative deep learningRecommendation system using collaborative deep learning
Recommendation system using collaborative deep learning
 
Ijcatr04041022
Ijcatr04041022Ijcatr04041022
Ijcatr04041022
 
Distance Metric Based Multi-Attribute Seismic Facies Classification to Identi...
Distance Metric Based Multi-Attribute Seismic Facies Classification to Identi...Distance Metric Based Multi-Attribute Seismic Facies Classification to Identi...
Distance Metric Based Multi-Attribute Seismic Facies Classification to Identi...
 
Information Spread in the Context of Evacuation Optimization
Information Spread in the Context of Evacuation OptimizationInformation Spread in the Context of Evacuation Optimization
Information Spread in the Context of Evacuation Optimization
 
Direct use of hydroclimatic information for reservoir operation
Direct use of hydroclimatic information for reservoir operationDirect use of hydroclimatic information for reservoir operation
Direct use of hydroclimatic information for reservoir operation
 
Ijetcas14 467
Ijetcas14 467Ijetcas14 467
Ijetcas14 467
 
Dealing with the need for Infrastructural Support in Ambient Intelligence
Dealing with the need for Infrastructural Support in Ambient IntelligenceDealing with the need for Infrastructural Support in Ambient Intelligence
Dealing with the need for Infrastructural Support in Ambient Intelligence
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 

Plus de Roberto Trasarti (6)

Roberto Trasarti PhD Thesis
Roberto Trasarti PhD ThesisRoberto Trasarti PhD Thesis
Roberto Trasarti PhD Thesis
 
Athena
AthenaAthena
Athena
 
K-BestMatch
K-BestMatchK-BestMatch
K-BestMatch
 
Daedalus
DaedalusDaedalus
Daedalus
 
Sma
SmaSma
Sma
 
ConQueSt
ConQueStConQueSt
ConQueSt
 

Preserving Privacy in Semantic-Rich Trajectories of Human Mobility

  • 1. PRESERVING PRIVACY IN SEMANTIC-RICH TRAJECTORIES OF HUMAN MOBILITY Anna Monreale, Roberto Trasarti, Dino Pedreschi, Chiara Renso KDDLab, Pisa Vania Bogorny Univ. Santa Catarina, Brasile Knowledge Discovery and Delivery Lab (ISTI-CNR & Univ. Pisa) www-kdd.isti.cnr.it ANONIMO MEETING, Pisa, 20,21 settembre 2010 SPRINGL 2010, San Jose, November 2, 2010
  • 2. How the story begins… Semantic trajectories represent the important places visited by people This information can be privacy sensitive! We should find a good generalization of the visited places… preserving semantics! But how? Can we use a taxonomy of places to generalize and find anonymous datasets? Let’s ask help to Anna, Dino and Roberto!
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 10.
  • 11.
  • 12.
  • 13. Example (1): The process Consider the following set of sequences, and m=3 and c=0.45: S = { <S1, R2, H1 , R1, C1 , S2> <S3, D1, R1, C1 , S2> <S1, P3, C2 , D2, S2> … }
  • 14. Example (2) CostQ CostQ is the number of hops on the tree needed to generalize the sequences of Quasi-identifiers to a common one. Consider the group: <S1, R2, H1 , R1, C1 , S2> <S3, D1, R1, C1 , S2> <S1, P3, C2 , D2, S2> CostQ = 6 + 6 + 6 = 18 <Station,Place,Entertainment,S2 (H1,C1) > <Station,Place,Entertainment,S2 (C1) > <Station,Place,Entertainment,S2 (C2) >
  • 15. Example (2) CostS CostS is the number of hops on the tree needed to generalize the sequence of Sensible in order to obtain the c-safety. From the generalized group: <Station,Place,Entertainment,S2 (H1,C1) > <Station,Place,Entertainment,S2 (C1) > <Station,Place,Entertainment,S2 (C2) > CostS = 3 The Total Cost of this group is 21 hops, which is the lower combination <Station, Place, H1 , Entertainment, Clinic , S2 > <Station, Place, Entertainment, Clinic , S2> <Station, Place, Clinic , Entertainment, S2>
  • 16.
  • 17.
  • 18.
  • 20.
  • 22.