Please use this identifier to cite or link to this item:
https://doi.org/10.1007/978-3-642-40285-2_31
DC Field | Value | |
---|---|---|
dc.title | Publishing trajectory with differential privacy: A priori vs. a posteriori sampling mechanisms | |
dc.contributor.author | Shao, D. | |
dc.contributor.author | Jiang, K. | |
dc.contributor.author | Kister, T. | |
dc.contributor.author | Bressan, S. | |
dc.contributor.author | Tan, K.-L. | |
dc.date.accessioned | 2014-07-04T03:14:49Z | |
dc.date.available | 2014-07-04T03:14:49Z | |
dc.date.issued | 2013 | |
dc.identifier.citation | Shao, D.,Jiang, K.,Kister, T.,Bressan, S.,Tan, K.-L. (2013). Publishing trajectory with differential privacy: A priori vs. a posteriori sampling mechanisms. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 8055 LNCS (PART 1) : 357-365. ScholarBank@NUS Repository. <a href="https://doi.org/10.1007/978-3-642-40285-2_31" target="_blank">https://doi.org/10.1007/978-3-642-40285-2_31</a> | |
dc.identifier.isbn | 9783642402845 | |
dc.identifier.issn | 03029743 | |
dc.identifier.uri | http://scholarbank.nus.edu.sg/handle/10635/78308 | |
dc.description.abstract | It is now possible to collect and share trajectory data for any ship in the world by various means such as satellite and VHF systems. However, the publication of such data also creates new risks for privacy breach with consequences on the security and liability of the stakeholders. Thus, there is an urgent need to develop methods for preserving the privacy of published trajectory data. In this paper, we propose and comparatively investigate two mechanisms for the publication of the trajectory of individual ships under differential privacy guarantees. Traditionally, privacy and differential privacy is achieved by perturbation of the result or the data according to the sensitivity of the query. Our approach, instead, combines sampling and interpolation. We present and compare two techniques in which we sample and interpolate (a priori) and interpolate and sample (a posteriori), respectively. We show that both techniques achieve a (0, δ) form of differential privacy. We analytically and empirically, with real ship trajectories, study the privacy guarantee and utility of the methods. © 2013 Springer-Verlag. | |
dc.description.uri | http://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.1007/978-3-642-40285-2_31 | |
dc.source | Scopus | |
dc.type | Conference Paper | |
dc.contributor.department | COMPUTER SCIENCE | |
dc.description.doi | 10.1007/978-3-642-40285-2_31 | |
dc.description.sourcetitle | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | |
dc.description.volume | 8055 LNCS | |
dc.description.issue | PART 1 | |
dc.description.page | 357-365 | |
dc.identifier.isiut | NOT_IN_WOS | |
Appears in Collections: | Staff Publications |
Show simple item record
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.