Search : [ author: 이혁기 ] (2)

Time-series Location Data Collection and Analysis Under Local Differential Privacy

Kijung Jung, Hyukki Lee, Yon Dohn Chung

http://doi.org/10.5626/JOK.2022.49.4.305

As the prevalence of smart devices that can generate location data, the number of location-based services is exploding. Since the user’s location data are sensitive information, if the original data are utilized in their original form, the privacy of individuals could be breached. In this study, we proposed a time-series location data collection and analysis method that satisfies local differential privacy, which is a strong privacy model for the data collection environment and considers the characteristics of time-series location data. In the data collection process, the location of an individual is expressed as a bit array. After that, each bit of the array is perturbed by randomized responses for privacy preservation. In the data analysis process, we analyzed the location frequency using hidden Markov model. Moreover, we performed additional spatiotemporal correlation analysis, which is not possible in the existing analysis methods. To demonstrate the performance of the proposed method, we generated trajectory data based on the Seoul subway and analyzed the results of our method.

Models for Privacy-preserving Data Publishing : A Survey

Jongseon Kim, Kijung Jung, Hyukki Lee, Soohyung Kim, Jong Wook Kim, Yon Dohn Chung

http://doi.org/

In recent years, data are actively exploited in various fields. Hence, there is a strong demand for sharing and publishing data. However, sensitive information regarding people can breach the privacy of an individual. To publish data while protecting an individual’s privacy with minimal information distortion, the privacy- preserving data publishing(PPDP) has been explored. PPDP assumes various attacker models and has been developed according to privacy models which are principles to protect against privacy breaching attacks. In this paper, we first present the concept of privacy breaching attacks. Subsequently, we classify the privacy models according to the privacy breaching attacks. We further clarify the differences and requirements of each privacy model.


Search




Journal of KIISE

  • ISSN : 2383-630X(Print)
  • ISSN : 2383-6296(Electronic)
  • KCI Accredited Journal

Editorial Office

  • Tel. +82-2-588-9240
  • Fax. +82-2-521-1352
  • E-mail. chwoo@kiise.or.kr