Skip to main content

Privacy Preserving Multidimensional Profiling

  • Conference paper
  • First Online:
Smart Objects and Technologies for Social Good (GOODTECHS 2017)

Abstract

Recently, big data had become central in the analysis of human behavior and the development of innovative services. In particular, a new class of services is emerging, taking advantage of different sources of data, in order to consider the multiple aspects of human beings. Unfortunately, these data can lead to re-identification problems and other privacy leaks, as diffusely reported in both scientific literature and media. The risk is even more pressing if multiple sources of data are linked together since a potential adversary could know information related to each dataset. For this reason, it is necessary to evaluate accurately and mitigate the individual privacy risk before releasing personal data. In this paper, we propose a methodology for the first task, i.e., assessing privacy risk, in a multidimensional scenario, defining some possible privacy attacks and simulating them using real-world datasets.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The risk evaluation task is compliant with the EU General Data Protection Regulation.

  2. 2.

    Art. 5 EU GDPR.

References

  1. Abul, O., Bonchi, F., Nanni, M.: Anonymization of moving objects databases by clustering and perturbation. Inf. Syst. 35(8) (2010)

    Google Scholar 

  2. Blondel, V.D., Decuyper, A., Krings, G.: A survey of results on mobile phone datasets analysis. EPJ Data Sci. 4(1), 10 (2015)

    Article  Google Scholar 

  3. Cavoukian, A.: Privacy by design the 7 foundational principles, August 2009

    Google Scholar 

  4. Deng, M., Wuyts, K., Scandariato, R., Preneel, B., Joosen, W.: A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements. Requir. Eng. 16(1) (2011)

    Google Scholar 

  5. Gabrielli, L., Furletti, B., Trasarti, R., Giannotti, F., Pedreschi, D.: City users’ classification with mobile phone data. In: IEEE Big Data 2015 (2015)

    Google Scholar 

  6. Giannotti, F., Lakshmanan, L.V., Monreale, A., Pedreschi, D., Wang, H.: Privacy-preserving mining of association rules from outsourced transaction databases. IEEE Syst. J. 7 (2013)

    Google Scholar 

  7. Institute, C.S.E.: Octave. http://www.cert.org/octave/

  8. Isaacman, S., Becker, R., Cáceres, R., Martonosi, M., Rowland, J., Varshavsky, A., Willinger, W.: Human mobility modeling at metropolitan scales. In: MobiSys 2012 (2012)

    Google Scholar 

  9. Le, H.Q., Arch-int, S., Nguyen, H.X., Arch-int, N.: Association rule hiding in risk management for retail supply chain collaboration. Comput. Indus. 64 (2013)

    Google Scholar 

  10. Meier, J., Corporation, M.: Improving Web Application Security: Threats and Countermeasures. In: Patterns & Practices, Microsoft (2003)

    Google Scholar 

  11. Mir, D.J., Isaacman, S., Cáceres, R., Martonosi, M., Wright, R.N.: Dp-where: differentially private modeling of human mobility. In: IEEE Big Data 2013 (2013)

    Google Scholar 

  12. OWASP: Risk rating methodology. https://www.owasp.org/index.php/OWASP_Risk_Rating_Methodology

  13. Pauler, G., Dick, A.: Maximizing profit of a food retailing chain by targeting and promoting valuable customers using loyalty card and scanner data. EJOR 174 (2006)

    Google Scholar 

  14. Pellungrini, R., Pappalardo, L., Pratesi, F., Monreale, A.: A data mining approach to assess privacy risk in human mobility data, ready to appear in ACM TIST

    Google Scholar 

  15. Pellungrini, R., Pratesi, F., Pappalardo, L.: Assessing privacy risk in retail data. In: PAP@ECML-PKDD 2017 (2017)

    Google Scholar 

  16. Pratesi, F., Monreale, A., Trasarti, R., Giannotti, F., Pedreschi, D., Yanagihara, T.: Prisquit: a system for assessing privacy risk versus quality in data sharing, Technical report 2016-TR-043. ISTI - CNR, Pisa, Italy (2016)

    Google Scholar 

  17. Rizvi, S.J., Haritsa, J.R.: Maintaining data privacy in association rule mining. In: VLDB 2002 (2002)

    Google Scholar 

  18. Rygielski, C., Wang, J.C., Yen, D.C.: Data mining techniques for customer relationship management. Technol. Soc. 24 (2002)

    Google Scholar 

  19. Samarati, P., Sweeney, L.: Generalizing data to provide anonymity when disclosing information (abstract). In: PODS, p. 188 (1998)

    Google Scholar 

  20. Song, Y., Dahlmeier, D., Bressan, S.: Not so unique in the crowd: a simple and effective algorithm for anonymizing location data. In: PIR@SIGIR 2014 (2014)

    Google Scholar 

  21. Trasarti, R., Olteanu-Raimond, A.M., Nanni, M., Couronné, T., Furletti, B., Giannotti, F., Smoreda, Z., Ziemlicki, C.: Discovering urban and country dynamics from mobile phone data with spatial correlation patterns. Telecommun. Policy 39(3–4) (2015)

    Google Scholar 

  22. Xiao, Y., Xiong, L.: Protecting locations with differential privacy under temporal correlations. In: ACM CCS 2015 (2015)

    Google Scholar 

  23. World Economic Forum: Rethinking personal data: Strengthening trust. http://www3.weforum.org/docs/WEF_IT_RethinkingPersonalData_Report_2012.pdf

  24. Zang, H., Bolot, J.: Anonymization of location data does not work: a large-scale measurement study. In: MobiCom. ACM (2011)

    Google Scholar 

Download references

Acknowledgment

Funded by the European project SoBigData (Grant Agreement 654024).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Francesca Pratesi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Pratesi, F., Monreale, A., Giannotti, F., Pedreschi, D. (2018). Privacy Preserving Multidimensional Profiling. In: Guidi, B., Ricci, L., Calafate, C., Gaggi, O., Marquez-Barja, J. (eds) Smart Objects and Technologies for Social Good. GOODTECHS 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 233. Springer, Cham. https://doi.org/10.1007/978-3-319-76111-4_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-76111-4_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-76110-7

  • Online ISBN: 978-3-319-76111-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics