Privacy-Preserving Synthetic Location Data in the Real World

被引:10
|
作者
Cunningham, Teddy [1 ]
Cormode, Graham [1 ]
Ferhatosmanoglu, Hakan [1 ]
机构
[1] Univ Warwick, Coventry, W Midlands, England
基金
英国工程与自然科学研究理事会; 欧洲研究理事会;
关键词
Differential Privacy; Location Data Sharing; Synthetic Data;
D O I
10.1145/3469830.3470893
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Sharing sensitive data is vital in enabling many modern data analysis and machine learning tasks. However, current methods for data release are insufficiently accurate or granular to provide meaningful utility, and they carry a high risk of deanonymization or membership inference attacks. In this paper, we propose a differentially private synthetic data generation solution with a focus on the compelling domain of location data. We present two methods with high practical utility for generating synthetic location data from real locations, both of which protect the existence and true location of each individual in the original dataset. Our first, partitioning-based approach introduces a novel method for privately generating point data using kernel density estimation, in addition to employing private adaptations of classic statistical techniques, such as clustering, for private partitioning. Our second, network-based approach incorporates public geographic information, such as the road network of a city, to constrain the bounds of synthetic data points and hence improve the accuracy of the synthetic data. Both methods satisfy the requirements of differential privacy, while also enabling accurate generation of synthetic data that aims to preserve the distribution of the real locations. We conduct experiments using three large-scale location datasets to show that the proposed solutions generate synthetic location data with high utility and strong similarity to the real datasets. We highlight some practical applications for our work by applying our synthetic data to a range of location analytics queries, and we demonstrate that our synthetic data produces near-identical answers to the same queries compared to when real data is used. Our results show that the proposed approaches are practical solutions for sharing and analyzing sensitive location data privately.
引用
收藏
页码:23 / 33
页数:11
相关论文
共 50 条
  • [41] Privacy-Preserving Location-Based Service Scheme for Mobile Sensing Data
    Xie, Qingqing
    Wang, Liangmin
    [J]. SENSORS, 2016, 16 (12)
  • [42] Privacy-Preserving Integration of Medical Data
    Miyaji, Atsuko
    Nakasho, Kazuhisa
    Nishida, Shohei
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2017, 41 (03)
  • [43] PRIVACY-PRESERVING COLLABORATIVE DATA MINING
    Zhan, Justin
    [J]. KMIS 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON KNOWLEDGE MANAGEMENT AND INFORMATION SHARING, 2009, : IS15 - IS15
  • [44] Privacy-preserving Multimedia Data Analysis
    Zhu, Xiaofeng
    Thung, Kim Han
    Kim, Minjeong
    [J]. COMPUTER JOURNAL, 2021, 64 (07): : 991 - 992
  • [45] Privacy-preserving clustering of data streams
    Chao, Ching-Ming
    Chen, Po-Zung
    Sun, Chu-Hao
    [J]. Tamkang Journal of Science and Engineering, 2010, 13 (03): : 349 - 358
  • [46] Privacy-Preserving and Verifiable Data Aggregation
    Tran, Hieu N.
    Deng, Robert H.
    Pang, HweeHwa
    [J]. PROCEEDINGS OF THE SINGAPORE CYBER-SECURITY CONFERENCE (SG-CRC) 2016: CYBER-SECURITY BY DESIGN, 2016, 14 : 115 - 122
  • [47] A scheme for privacy-preserving data dissemination
    Lilien, Leszek
    Bharuava, Bharat
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 2006, 36 (03): : 502 - 506
  • [48] Privacy-Preserving Classification of Data Streams
    Chao, Ching-Ming
    Chen, Po-Zung
    Sun, Chu-Hao
    [J]. JOURNAL OF APPLIED SCIENCE AND ENGINEERING, 2009, 12 (03): : 321 - 330
  • [49] Privacy-Preserving Federated Data Sharing
    Fioretto, Ferdinando
    Van Hentenryck, Pascal
    [J]. AAMAS '19: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON AUTONOMOUS AGENTS AND MULTIAGENT SYSTEMS, 2019, : 638 - 646
  • [50] Privacy-preserving Sensory Data Recovery
    Chen, Cai
    Zhang, Manyuan
    Zhang, Huanzhi
    Huang, Zhenyun
    Li, Yong
    [J]. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1646 - 1650