Please use this identifier to cite or link to this item:
http://hdl.handle.net/10609/150365
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Romero-Tris, Cristina | - |
dc.contributor.author | Megias, David | - |
dc.date.accessioned | 2024-05-28T21:47:17Z | - |
dc.date.available | 2024-05-28T21:47:17Z | - |
dc.date.issued | 2018-10-02 | - |
dc.identifier.citation | Romero-Tris, C. [Cristina], Megías, D. [David] (2018). Protecting privacy in trajectories with a user-centric approach. ACM Transactions on Knowledge Discovery from Data, 12(6), 1-27. doi: 10.1145/3233185 | - |
dc.identifier.issn | 1556-4681MIAR | - |
dc.identifier.uri | http://hdl.handle.net/10609/150365 | - |
dc.description.abstract | The increased use of location-aware devices, such as smartphones, generates a large amount of trajectory data. These data can be useful in several domains, like marketing, path modeling, localization of an epidemic focus, etc. Nevertheless, since trajectory information contains personal mobility data, improper use or publication of trajectory data can threaten users’ privacy. It may reveal sensitive details like habits of behavior, religious beliefs, and sexual preferences. „erefore, many users might be unwilling to share their trajectory data without a previous anonymization process. Currently, several proposals to address this problem can be found in the literature. „ese solutions focus on anonymizing data before its publication, i.e., when they are already stored in the server database. Nevertheless, we argue that this approach gives the user no control about the information she shares. For this reason, we propose anonymizing data in the users’ mobile devices, before they are sent to a third party. This paper extends our previous work which was, to the best of our knowledge, the ÿrst one to anonymize data at the client side, allowing users to select the amount and accuracy of shared data. In this paper, we describe an improved version of the protocol, and we include the implementation together with an analysis of the results obtained after the simulation with real trajectory data. | en |
dc.format.mimetype | application/pdf | ca |
dc.language.iso | eng | ca |
dc.publisher | Association for Computing Machinery (ACM) | ca |
dc.relation.ispartof | ACM Transactions on Knowledge Discovery from Data, 2018, 12(6) | ca |
dc.relation.uri | https://doi.org/10.1145/3233185 | - |
dc.rights | © Association for Computing Machinery (ACM) | - |
dc.subject | trajectory anonymization | en |
dc.subject | user-centric protocol | en |
dc.subject | privacy | en |
dc.title | Protecting privacy in trajectories with a user-centric approach | ca |
dc.type | info:eu-repo/semantics/article | ca |
dc.rights.accessRights | info:eu-repo/semantics/openAccess | - |
dc.identifier.doi | https://doi.org/10.1145/3233185 | - |
dc.gir.id | AR/0000006482 | - |
dc.relation.projectID | info:eu-repo/grantAgreement/MINECO/2014/TIN2014-57364-C2-2-R | - |
dc.type.version | info:eu-repo/semantics/acceptedVersion | - |
Appears in Collections: | Articles cientÍfics Articles |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
RomeroTris_ACMTKDD_Protecting.pdf | 943,85 kB | Adobe PDF | View/Open |
Share:
Items in repository are protected by copyright, with all rights reserved, unless otherwise indicated.