Cargando…
Effectively computing transition patterns with privacy-preserved trajectory datasets
Recent advances in positioning techniques, along with the widespread use of mobile devices, make it easier to monitor and collect user trajectory information during their daily activities. An ever-growing abundance of data about trajectories of individual users paves the way for various applications...
Autores principales: | , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Public Library of Science
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9733873/ https://www.ncbi.nlm.nih.gov/pubmed/36490250 http://dx.doi.org/10.1371/journal.pone.0278744 |
_version_ | 1784846469374672896 |
---|---|
author | Kim, Jong Wook Jang, Beakcheol |
author_facet | Kim, Jong Wook Jang, Beakcheol |
author_sort | Kim, Jong Wook |
collection | PubMed |
description | Recent advances in positioning techniques, along with the widespread use of mobile devices, make it easier to monitor and collect user trajectory information during their daily activities. An ever-growing abundance of data about trajectories of individual users paves the way for various applications that utilize user mobility information. One of the most common analysis tasks in these new applications is to extract the sequential transition patterns between two consecutive timestamps from a collection of trajectories. Such patterns have been widely exploited in diverse applications to predict and recommend next user locations based on the current position. Thus, in this paper, we explore the computation of the transition patterns, especially with a trajectory dataset collected using differential privacy, which is a de facto standard for privacy-preserving data collection and processing. Specifically, the proposed scheme relies on geo-indistinguishability, which is a variant of the well-known differential privacy, to collect trajectory data from users in a privacy-preserving manner, and exploits the functionality of the expectation-maximization algorithm to precisely estimate hidden transition patterns based on perturbed trajectory datasets collected under geo-indistinguishability. Experimental results using real trajectory datasets confirm that a good estimation of transition pattern can be achieved with the proposed method. |
format | Online Article Text |
id | pubmed-9733873 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | Public Library of Science |
record_format | MEDLINE/PubMed |
spelling | pubmed-97338732022-12-10 Effectively computing transition patterns with privacy-preserved trajectory datasets Kim, Jong Wook Jang, Beakcheol PLoS One Research Article Recent advances in positioning techniques, along with the widespread use of mobile devices, make it easier to monitor and collect user trajectory information during their daily activities. An ever-growing abundance of data about trajectories of individual users paves the way for various applications that utilize user mobility information. One of the most common analysis tasks in these new applications is to extract the sequential transition patterns between two consecutive timestamps from a collection of trajectories. Such patterns have been widely exploited in diverse applications to predict and recommend next user locations based on the current position. Thus, in this paper, we explore the computation of the transition patterns, especially with a trajectory dataset collected using differential privacy, which is a de facto standard for privacy-preserving data collection and processing. Specifically, the proposed scheme relies on geo-indistinguishability, which is a variant of the well-known differential privacy, to collect trajectory data from users in a privacy-preserving manner, and exploits the functionality of the expectation-maximization algorithm to precisely estimate hidden transition patterns based on perturbed trajectory datasets collected under geo-indistinguishability. Experimental results using real trajectory datasets confirm that a good estimation of transition pattern can be achieved with the proposed method. Public Library of Science 2022-12-09 /pmc/articles/PMC9733873/ /pubmed/36490250 http://dx.doi.org/10.1371/journal.pone.0278744 Text en © 2022 Kim, Jang https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. |
spellingShingle | Research Article Kim, Jong Wook Jang, Beakcheol Effectively computing transition patterns with privacy-preserved trajectory datasets |
title | Effectively computing transition patterns with privacy-preserved trajectory datasets |
title_full | Effectively computing transition patterns with privacy-preserved trajectory datasets |
title_fullStr | Effectively computing transition patterns with privacy-preserved trajectory datasets |
title_full_unstemmed | Effectively computing transition patterns with privacy-preserved trajectory datasets |
title_short | Effectively computing transition patterns with privacy-preserved trajectory datasets |
title_sort | effectively computing transition patterns with privacy-preserved trajectory datasets |
topic | Research Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9733873/ https://www.ncbi.nlm.nih.gov/pubmed/36490250 http://dx.doi.org/10.1371/journal.pone.0278744 |
work_keys_str_mv | AT kimjongwook effectivelycomputingtransitionpatternswithprivacypreservedtrajectorydatasets AT jangbeakcheol effectivelycomputingtransitionpatternswithprivacypreservedtrajectorydatasets |