Empreu aquest identificador per citar o enllaçar aquest ítem: http://hdl.handle.net/10609/150365
Registre complet de metadades
Camp DCValorLlengua/Idioma
dc.contributor.authorRomero-Tris, Cristina-
dc.contributor.authorMegias, David-
dc.date.accessioned2024-05-28T21:47:17Z-
dc.date.available2024-05-28T21:47:17Z-
dc.date.issued2018-10-02-
dc.identifier.citationRomero-Tris, C. [Cristina], Megías, D. [David] (2018). Protecting privacy in trajectories with a user-centric approach. ACM Transactions on Knowledge Discovery from Data, 12(6), 1-27. doi: 10.1145/3233185-
dc.identifier.issn1556-4681MIAR
-
dc.identifier.urihttp://hdl.handle.net/10609/150365-
dc.description.abstractThe increased use of location-aware devices, such as smartphones, generates a large amount of trajectory data. These data can be useful in several domains, like marketing, path modeling, localization of an epidemic focus, etc. Nevertheless, since trajectory information contains personal mobility data, improper use or publication of trajectory data can threaten users’ privacy. It may reveal sensitive details like habits of behavior, religious beliefs, and sexual preferences. „erefore, many users might be unwilling to share their trajectory data without a previous anonymization process. Currently, several proposals to address this problem can be found in the literature. „ese solutions focus on anonymizing data before its publication, i.e., when they are already stored in the server database. Nevertheless, we argue that this approach gives the user no control about the information she shares. For this reason, we propose anonymizing data in the users’ mobile devices, before they are sent to a third party. This paper extends our previous work which was, to the best of our knowledge, the ÿrst one to anonymize data at the client side, allowing users to select the amount and accuracy of shared data. In this paper, we describe an improved version of the protocol, and we include the implementation together with an analysis of the results obtained after the simulation with real trajectory data.en
dc.format.mimetypeapplication/pdfca
dc.language.isoengca
dc.publisherAssociation for Computing Machinery (ACM)ca
dc.relation.ispartofACM Transactions on Knowledge Discovery from Data, 2018, 12(6)ca
dc.relation.urihttps://doi.org/10.1145/3233185-
dc.rights© Association for Computing Machinery (ACM)-
dc.subjecttrajectory anonymizationen
dc.subjectuser-centric protocolen
dc.subjectprivacyen
dc.titleProtecting privacy in trajectories with a user-centric approachca
dc.typeinfo:eu-repo/semantics/articleca
dc.rights.accessRightsinfo:eu-repo/semantics/openAccess-
dc.identifier.doihttps://doi.org/10.1145/3233185-
dc.gir.idAR/0000006482-
dc.relation.projectIDinfo:eu-repo/grantAgreement/MINECO/2014/TIN2014-57364-C2-2-R-
dc.type.versioninfo:eu-repo/semantics/acceptedVersion-
Apareix a les col·leccions:Articles cientÍfics
Articles

Arxius per aquest ítem:
Arxiu Descripció MidaFormat 
RomeroTris_ACMTKDD_Protecting.pdf943,85 kBAdobe PDFThumbnail
Veure/Obrir
Comparteix:
Exporta:
Consulta les estadístiques

Els ítems del Repositori es troben protegits per copyright, amb tots els drets reservats, sempre i quan no s’indiqui el contrari.