Mobility Data Anonymization by Obfuscating the Cellular Network Topology Graph
Identifikátory výsledku
Kód výsledku v IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F68407700%3A21230%2F13%3A00211549" target="_blank" >RIV/68407700:21230/13:00211549 - isvavai.cz</a>
Výsledek na webu
<a href="http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6654824" target="_blank" >http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6654824</a>
DOI - Digital Object Identifier
<a href="http://dx.doi.org/10.1109/ICC.2013.6654824" target="_blank" >10.1109/ICC.2013.6654824</a>
Alternativní jazyky
Jazyk výsledku
angličtina
Název v původním jazyce
Mobility Data Anonymization by Obfuscating the Cellular Network Topology Graph
Popis výsledku v původním jazyce
Studies of cellular-network data, comprising analyses of user movements across the network, are becoming increasingly popular with the rise of new services based on user behavior and geographic location. Such data might contain, for example, timestampedlists of IDs of cells a user was registered to. If coupled with the cell locations, confidential to the operator, this would enable reconstruction of user trajectories across the regions covered. It is vital to preserve privacy of this data for all partsinvolved (users, operators) while enabling open sharing of the data to foster research and development of new findings, services and technologies based on mining of this data. Thus, we pose the problem of obfuscating entire cellular-network topologies while retaining some of the analytical value of the user data. To this end, we adopt multiple obfuscation methods based on different topology-graph distortions, and analyze their performance using simulated scenarios.
Název v anglickém jazyce
Mobility Data Anonymization by Obfuscating the Cellular Network Topology Graph
Popis výsledku anglicky
Studies of cellular-network data, comprising analyses of user movements across the network, are becoming increasingly popular with the rise of new services based on user behavior and geographic location. Such data might contain, for example, timestampedlists of IDs of cells a user was registered to. If coupled with the cell locations, confidential to the operator, this would enable reconstruction of user trajectories across the regions covered. It is vital to preserve privacy of this data for all partsinvolved (users, operators) while enabling open sharing of the data to foster research and development of new findings, services and technologies based on mining of this data. Thus, we pose the problem of obfuscating entire cellular-network topologies while retaining some of the analytical value of the user data. To this end, we adopt multiple obfuscation methods based on different topology-graph distortions, and analyze their performance using simulated scenarios.
Klasifikace
Druh
D - Stať ve sborníku
CEP obor
IN - Informatika
OECD FORD obor
—
Návaznosti výsledku
Projekt
—
Návaznosti
I - Institucionalni podpora na dlouhodoby koncepcni rozvoj vyzkumne organizace
Ostatní
Rok uplatnění
2013
Kód důvěrnosti údajů
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Údaje specifické pro druh výsledku
Název statě ve sborníku
Proceedings of the 2013 IEEE International Conference on Communications (ICC)
ISBN
978-1-4673-3122-7
ISSN
1550-3607
e-ISSN
—
Počet stran výsledku
5
Strana od-do
2032-2036
Název nakladatele
IEEE
Místo vydání
Piscataway
Místo konání akce
Budapest
Datum konání akce
9. 6. 2013
Typ akce podle státní příslušnosti
WRD - Celosvětová akce
Kód UT WoS článku
—