Access the full text.
Sign up today, get DeepDyve free for 14 days.
F. Giannotti, D. Pedreschi (2008)
Mobility, Data Mining and Privacy: Geographic Knowledge Discovery
Taneli Mielikäinen (2003)
On Inverse Frequent Set Mining
(2008)
Mobility, data mining and privacy
B. Malin (2008)
k-Unlinkability: A privacy protection model for distributed dataData Knowl. Eng., 64
Roman Yarovoy, F. Bonchi, L. Lakshmanan, Wendy Wang (2009)
Anonymizing moving objects: how to hide a MOB in a crowd?
K. LeFevre, D. DeWitt, R. Ramakrishnan (2006)
Mondrian Multidimensional K-Anonymity22nd International Conference on Data Engineering (ICDE'06)
M. Atallah, E. Bertino, A. Elmagarmid, Mohamed Ibrahim, Vassilios Verykios (1999)
Disclosure limitation of sensitive rulesProceedings 1999 Workshop on Knowledge and Data Engineering Exchange (KDEX'99) (Cat. No.PR00453)
Dear Sotiropoulos (2013)
ARTICLE 29 Data Protection Working Party
C. Bettini, S. Mascetti (2006)
Preserving k-anonymity in spatio-temporal datasets and location-based services
Yabo Xu, B. Fung, Ke Wang, A. Fu, J. Pei (2008)
Publishing Sensitive Transactions for Itemset Utility2008 Eighth IEEE International Conference on Data Mining
Osman Abul, F. Bonchi, M. Nanni (2008)
Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases2008 IEEE 24th International Conference on Data Engineering
Elena Dasseni, Vassilios Verykios, A. Elmagarmid, E. Bertino (2001)
Hiding Association Rules by Using Confidence and Support
(2010)
Opinion of the European Data Protection Supervisor on Promoting Trust in the Information Society by Fostering Data Protection and Privacy
J. Pei, Jiawei Han, B. Mortazavi-Asl, Helen Pinto, Qiming Chen, U. Dayal, M. Hsu (2001)
PrefixSpan: Mining Sequential Patterns by Prefix-Projected Growth
(2010)
Preliminary staff report,
F. Giannotti, M. Nanni, Fabio Pinelli, D. Pedreschi (2007)
Trajectory pattern mining
R. Bayardo, R. Agrawal (2005)
Data privacy through optimal k-anonymization21st International Conference on Data Engineering (ICDE'05)
A. Monreale (2011)
Privacy by Design in Data Mining
T Dalenius (1974)
The invasion of privacy problem and statistics production—an overviewStat Tidskrift, 12
Osman Abul, M. Atzori, F. Bonchi, F. Giannotti (2007)
Hiding Sequences2007 IEEE 23rd International Conference on Data Engineering Workshop
A. Meyerson, Ryan Williams (2004)
On the complexity of optimal K-anonymity
R. Agrawal, R. Srikant (1995)
Mining sequential patternsProceedings of the Eleventh International Conference on Data Engineering
P. Samarati, L. Sweeney (1998)
Generalizing data to provide anonymity when disclosing information (abstract)
M. Nanni (2005)
Speeding-Up Hierarchical Agglomerative Clustering in Presence of Expensive Metrics
Massimo Barbaro (2006)
A Face Is Exposed for AOL Searcher No
Gabriel Ghinita, Yufei Tao, Panos Kalnis (2008)
On the Anonymization of Sparse High-Dimensional Data2008 IEEE 24th International Conference on Data Engineering
Y. Saygin, Vassilios Verykios, Chris Clifton (2001)
Using unknowns to prevent discovery of association rulesSIGMOD Rec., 30
P. Samarati, L. Sweeney (1998)
Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression
Osman Abul, Maurizio Atzori, Francesco Bonchi, F. Giannotti (2007)
Hiding Sensitive Trajectory PatternsSeventh IEEE International Conference on Data Mining Workshops (ICDMW 2007)
S. Mascetti, C. Bettini, X. Wang, S. Jajodia (2006)
k-Anonymity in Databases with Timestamped DataThirteenth International Symposium on Temporal Representation and Reasoning (TIME'06)
R. Agrawal, R. Srikant (2000)
Privacy-preserving data mining
Manolis Terrovitis, N. Mamoulis (2008)
Privacy Preservation in the Publication of TrajectoriesThe Ninth International Conference on Mobile Data Management (mdm 2008)
(2008)
editors
Ashwin Machanavajjhala, J. Gehrke, Daniel Kifer, Muthuramakrishnan Venkitasubramaniam (2006)
L-diversity: privacy beyond k-anonymity22nd International Conference on Data Engineering (ICDE'06)
(2007)
Perturbation-driven anonymization of trajectories Technical Report 2007-TR-017
Preliminary staff report, protecting consumer privacy in an era of rapid change: A proposed framework for business and policy makers
C. Aggarwal, Philip Yu (2008)
A framework for condensation-based anonymization of string dataData Mining and Knowledge Discovery, 16
F. Bonchi, Y. Saygin, Vassilios Verykios, M. Atzori, A. Gkoulalas-Divanis, Selim Kaya, E. Savaş (2008)
Privacy in Spatiotemporal Data Mining
L. Sweeney (2001)
Computational disclosure control: a primer on data privacy protection
Anonymity Preserving
The increasing availability of personal data of a sequential nature, such as time-stamped transaction or location data, enables increasingly sophisticated sequential pattern mining techniques. However, privacy is at risk if it is possible to reconstruct the identity of individuals from sequential data. Therefore, it is important to develop privacy-preserving techniques that support publishing of really anonymous data, without altering the analysis results significantly. In this paper we propose to apply the Privacy-by-design paradigm for designing a technological framework to counter the threats of undesirable, unlawful effects of privacy violation on sequence data, without obstructing the knowledge discovery opportunities of data mining technologies. First, we introduce a k-anonymity framework for sequence data, by defining the sequence linking attack model and its associated countermeasure, a k-anonymity notion for sequence datasets, which provides a formal protection against the attack. Second, we instantiate this framework and provide a specific method for constructing the k-anonymous version of a sequence dataset, which preserves the results of sequential pattern mining, together with several basic statistics and other analytical properties of the original data, including the clustering structure. A comprehensive experimental study on realistic datasets of process-logs, web-logs and GPS tracks is carried out, which empirically shows how, in our proposed method, the protection of privacy meets analytical utility.
Artificial Intelligence and Law – Springer Journals
Published: Feb 13, 2014
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.