IDEAS home Printed from https://ideas.repec.org/a/igg/jdwm00/v15y2019i3p63-89.html
   My bibliography  Save this article

A Method of Sanitizing Privacy-Sensitive Sequence Pattern Networks Mined From Trajectories Released

Author

Listed:
  • Haitao Zhang

    (Nanjing University of Posts and Telecommunications, Nanjing, China)

  • Yunhong Zhu

    (Nanjing University of Posts and Telecommunications, Nanjing, China)

Abstract

Mobility patterns mined from released trajectories can help to allocate resources and provide personalized services, although these also pose a threat to personal location privacy. As the existing sanitization methods cannot deal with the problems of location privacy inference attacks based on privacy-sensitive sequence pattern networks, the authors proposed a method of sanitizing the privacy-sensitive sequence pattern networks mined from trajectories released by identifying and removing influential nodes from the networks. The authors conducted extensive experiments and the results were shown that by adjusting the parameter of the proportional factors, the proposed method can thoroughly sanitize privacy-sensitive sequence pattern networks and achieve the optimal values for security degree and connectivity degree measurements. In addition, the performance of the proposed method was shown to be stable for multiple networks with basically the same privacy-sensitive node ratio and be scalable for batches of networks with different sensitive nodes ratios.

Suggested Citation

  • Haitao Zhang & Yunhong Zhu, 2019. "A Method of Sanitizing Privacy-Sensitive Sequence Pattern Networks Mined From Trajectories Released," International Journal of Data Warehousing and Mining (IJDWM), IGI Global, vol. 15(3), pages 63-89, July.
  • Handle: RePEc:igg:jdwm00:v:15:y:2019:i:3:p:63-89
    as

    Download full text from publisher

    File URL: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJDWM.2019070104
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Haitao Zhang & Chenxue Wu & Zewei Chen & Zhao Liu & Yunhong Zhu, 2017. "A novel on-line spatial-temporal k-anonymity method for location privacy protection from sequence rules-based inference attacks," PLOS ONE, Public Library of Science, vol. 12(8), pages 1-32, August.
    2. Gao, Yan-Li & Chen, Shi-Ming & Nie, Sen & Ma, Fei & Guan, Jun-Jie, 2018. "Robustness analysis of interdependent networks under multiple-attacking strategies," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 496(C), pages 495-504.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Zhou, Lin & Qi, Xiaogang & Liu, Lifang, 2023. "Robustness of networks with dependency groups considering fluctuating loads and recovery behaviors," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 613(C).
    2. Fang Zhou & Xiang He & Yongbo Yuan & Mingyuan Zhang, 2020. "Influence of Interlink Topology on Multilayer Network Robustness," Sustainability, MDPI, vol. 12(3), pages 1-19, February.
    3. Zhou, Lili & Yin, Jun & Tan, Fei & Liao, Haibin, 2023. "Robustness analysis of edge-coupled interdependent networks under different attack strategies," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 632(P1).
    4. Gao, Xingle & Peng, Minfang & Tse, Chi K., 2022. "Robustness analysis of cyber-coupled power systems with considerations of interdependence of structures, operations and dynamic behaviors," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 596(C).
    5. Zhang, Kaimin & Bai, Libiao & Xie, Xiaoyan & Wang, Chenshuo, 2023. "Modeling of risk cascading propagation in project portfolio network," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 612(C).
    6. Zhao, Yanyan & Zhou, Jie & Zou, Yong & Guan, Shuguang & Gao, Yanli, 2022. "Characteristics of edge-based interdependent networks," Chaos, Solitons & Fractals, Elsevier, vol. 156(C).
    7. Gao, Xingle & Peng, Minfang & Tse, Chi K., 2021. "Impact of wind power uncertainty on cascading failure in cyber–physical power systems," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 583(C).
    8. Yin, Rong-Rong & Yuan, Huaili & Wang, Jing & Zhao, Ning & Liu, Lei, 2021. "Modeling and analyzing cascading dynamics of the urban road traffic network," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 566(C).
    9. Hao, Yucheng & Jia, Limin & Wang, Yanhui, 2020. "Edge attack strategies in interdependent scale-free networks," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 540(C).
    10. Shen, Yi & Ren, Gang & Zhang, Ning & Song, Guohao & Wang, Qin & Ran, Bin, 2020. "Effects of mutual traffic redistribution on robustness of interdependent networks to cascading failures under fluctuant load," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 560(C).

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:igg:jdwm00:v:15:y:2019:i:3:p:63-89. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Journal Editor (email available below). General contact details of provider: https://www.igi-global.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.