Please use this identifier to cite or link to this item: http://cmuir.cmu.ac.th/jspui/handle/6653943832/58553
Full metadata record
DC FieldValueLanguage
dc.contributor.authorNattapon Harnsamuten_US
dc.contributor.authorJuggapong Natwichaien_US
dc.contributor.authorSurapon Riyanaen_US
dc.date.accessioned2018-09-05T04:26:12Z-
dc.date.available2018-09-05T04:26:12Z-
dc.date.issued2018-01-01en_US
dc.identifier.issn16113349en_US
dc.identifier.issn03029743en_US
dc.identifier.other2-s2.0-85047948451en_US
dc.identifier.other10.1007/978-3-319-92013-9_2en_US
dc.identifier.urihttps://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85047948451&origin=inwarden_US
dc.identifier.urihttp://cmuir.cmu.ac.th/jspui/handle/6653943832/58553-
dc.description.abstract© Springer International Publishing AG, part of Springer Nature 2018. With the increasing of location-aware devices, it is easy to collect the trajectory of a person which can be represented as a sequence of visited locations with regard to timestamps. For some applications such as traffic management and location-based advertising, the trajectory data may need to be published with other private information. However, revealing the private trajectory and sensitive information of user poses privacy concerns especially when an adversary has the background knowledge of target user, i.e., partial trajectory information. In general, data transformation is needed to ensure privacy preservation before data releasing. Not only the privacy has to be preserved, but also the data quality issue must be addressed, i.e., the impact on data quality after the transformation should be minimized. LKC-privacy model is a well-known model to anonymize the trajectory data that are published with the sensitive information. However, computing the optimal LKC-privacy solution on trajectory data by the brute-force (BF) algorithm with full-domain generalization technique is highly time-consuming. In this paper, we propose a look-up table brute-force (LT-BF) algorithm to preserve privacy and maintain the data quality based on LKC-privacy model in the scenarios which the generalization technique is applied to anonymize the trajectory data efficiently. Subsequently, our proposed algorithm is evaluated with experiments. The results demonstrate that our proposed algorithm is not only returns the optimal solution as the BF algorithm, but also it is highly efficient.en_US
dc.subjectComputer Scienceen_US
dc.subjectMathematicsen_US
dc.titlePrivacy preservation for trajectory data publishing by look-up table generalizationen_US
dc.typeBook Seriesen_US
article.title.sourcetitleLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)en_US
article.volume10837 LNCSen_US
article.stream.affiliationsChiang Mai Universityen_US
Appears in Collections:CMUL: Journal Articles

Files in This Item:
There are no files associated with this item.


Items in CMUIR are protected by copyright, with all rights reserved, unless otherwise indicated.