Advertisement

Privacy Preserving Multidimensional Profiling

  • Francesca Pratesi
  • Anna Monreale
  • Fosca Giannotti
  • Dino Pedreschi
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 233)

Abstract

Recently, big data had become central in the analysis of human behavior and the development of innovative services. In particular, a new class of services is emerging, taking advantage of different sources of data, in order to consider the multiple aspects of human beings. Unfortunately, these data can lead to re-identification problems and other privacy leaks, as diffusely reported in both scientific literature and media. The risk is even more pressing if multiple sources of data are linked together since a potential adversary could know information related to each dataset. For this reason, it is necessary to evaluate accurately and mitigate the individual privacy risk before releasing personal data. In this paper, we propose a methodology for the first task, i.e., assessing privacy risk, in a multidimensional scenario, defining some possible privacy attacks and simulating them using real-world datasets.

Keywords

Privacy risk assessment Mobile phone data Retail data 

Notes

Acknowledgment

Funded by the European project SoBigData (Grant Agreement 654024).

References

  1. 1.
    Abul, O., Bonchi, F., Nanni, M.: Anonymization of moving objects databases by clustering and perturbation. Inf. Syst. 35(8) (2010)Google Scholar
  2. 2.
    Blondel, V.D., Decuyper, A., Krings, G.: A survey of results on mobile phone datasets analysis. EPJ Data Sci. 4(1), 10 (2015)CrossRefGoogle Scholar
  3. 3.
    Cavoukian, A.: Privacy by design the 7 foundational principles, August 2009Google Scholar
  4. 4.
    Deng, M., Wuyts, K., Scandariato, R., Preneel, B., Joosen, W.: A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements. Requir. Eng. 16(1) (2011)Google Scholar
  5. 5.
    Gabrielli, L., Furletti, B., Trasarti, R., Giannotti, F., Pedreschi, D.: City users’ classification with mobile phone data. In: IEEE Big Data 2015 (2015)Google Scholar
  6. 6.
    Giannotti, F., Lakshmanan, L.V., Monreale, A., Pedreschi, D., Wang, H.: Privacy-preserving mining of association rules from outsourced transaction databases. IEEE Syst. J. 7 (2013)Google Scholar
  7. 7.
    Institute, C.S.E.: Octave. http://www.cert.org/octave/
  8. 8.
    Isaacman, S., Becker, R., Cáceres, R., Martonosi, M., Rowland, J., Varshavsky, A., Willinger, W.: Human mobility modeling at metropolitan scales. In: MobiSys 2012 (2012)Google Scholar
  9. 9.
    Le, H.Q., Arch-int, S., Nguyen, H.X., Arch-int, N.: Association rule hiding in risk management for retail supply chain collaboration. Comput. Indus. 64 (2013)Google Scholar
  10. 10.
    Meier, J., Corporation, M.: Improving Web Application Security: Threats and Countermeasures. In: Patterns & Practices, Microsoft (2003)Google Scholar
  11. 11.
    Mir, D.J., Isaacman, S., Cáceres, R., Martonosi, M., Wright, R.N.: Dp-where: differentially private modeling of human mobility. In: IEEE Big Data 2013 (2013)Google Scholar
  12. 12.
  13. 13.
    Pauler, G., Dick, A.: Maximizing profit of a food retailing chain by targeting and promoting valuable customers using loyalty card and scanner data. EJOR 174 (2006)Google Scholar
  14. 14.
    Pellungrini, R., Pappalardo, L., Pratesi, F., Monreale, A.: A data mining approach to assess privacy risk in human mobility data, ready to appear in ACM TISTGoogle Scholar
  15. 15.
    Pellungrini, R., Pratesi, F., Pappalardo, L.: Assessing privacy risk in retail data. In: PAP@ECML-PKDD 2017 (2017)Google Scholar
  16. 16.
    Pratesi, F., Monreale, A., Trasarti, R., Giannotti, F., Pedreschi, D., Yanagihara, T.: Prisquit: a system for assessing privacy risk versus quality in data sharing, Technical report 2016-TR-043. ISTI - CNR, Pisa, Italy (2016)Google Scholar
  17. 17.
    Rizvi, S.J., Haritsa, J.R.: Maintaining data privacy in association rule mining. In: VLDB 2002 (2002)Google Scholar
  18. 18.
    Rygielski, C., Wang, J.C., Yen, D.C.: Data mining techniques for customer relationship management. Technol. Soc. 24 (2002)Google Scholar
  19. 19.
    Samarati, P., Sweeney, L.: Generalizing data to provide anonymity when disclosing information (abstract). In: PODS, p. 188 (1998)Google Scholar
  20. 20.
    Song, Y., Dahlmeier, D., Bressan, S.: Not so unique in the crowd: a simple and effective algorithm for anonymizing location data. In: PIR@SIGIR 2014 (2014)Google Scholar
  21. 21.
    Trasarti, R., Olteanu-Raimond, A.M., Nanni, M., Couronné, T., Furletti, B., Giannotti, F., Smoreda, Z., Ziemlicki, C.: Discovering urban and country dynamics from mobile phone data with spatial correlation patterns. Telecommun. Policy 39(3–4) (2015)Google Scholar
  22. 22.
    Xiao, Y., Xiong, L.: Protecting locations with differential privacy under temporal correlations. In: ACM CCS 2015 (2015)Google Scholar
  23. 23.
    World Economic Forum: Rethinking personal data: Strengthening trust. http://www3.weforum.org/docs/WEF_IT_RethinkingPersonalData_Report_2012.pdf
  24. 24.
    Zang, H., Bolot, J.: Anonymization of location data does not work: a large-scale measurement study. In: MobiCom. ACM (2011)Google Scholar

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2018

Authors and Affiliations

  1. 1.ISTI-CNR A. FaedoPisaItaly
  2. 2.Department of Computer ScienceUniversity of PisaPisaItaly

Personalised recommendations