Cargando…

Effectively computing transition patterns with privacy-preserved trajectory datasets

Recent advances in positioning techniques, along with the widespread use of mobile devices, make it easier to monitor and collect user trajectory information during their daily activities. An ever-growing abundance of data about trajectories of individual users paves the way for various applications...

Descripción completa

Detalles Bibliográficos
Autores principales: Kim, Jong Wook, Jang, Beakcheol
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Public Library of Science 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9733873/
https://www.ncbi.nlm.nih.gov/pubmed/36490250
http://dx.doi.org/10.1371/journal.pone.0278744
_version_ 1784846469374672896
author Kim, Jong Wook
Jang, Beakcheol
author_facet Kim, Jong Wook
Jang, Beakcheol
author_sort Kim, Jong Wook
collection PubMed
description Recent advances in positioning techniques, along with the widespread use of mobile devices, make it easier to monitor and collect user trajectory information during their daily activities. An ever-growing abundance of data about trajectories of individual users paves the way for various applications that utilize user mobility information. One of the most common analysis tasks in these new applications is to extract the sequential transition patterns between two consecutive timestamps from a collection of trajectories. Such patterns have been widely exploited in diverse applications to predict and recommend next user locations based on the current position. Thus, in this paper, we explore the computation of the transition patterns, especially with a trajectory dataset collected using differential privacy, which is a de facto standard for privacy-preserving data collection and processing. Specifically, the proposed scheme relies on geo-indistinguishability, which is a variant of the well-known differential privacy, to collect trajectory data from users in a privacy-preserving manner, and exploits the functionality of the expectation-maximization algorithm to precisely estimate hidden transition patterns based on perturbed trajectory datasets collected under geo-indistinguishability. Experimental results using real trajectory datasets confirm that a good estimation of transition pattern can be achieved with the proposed method.
format Online
Article
Text
id pubmed-9733873
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher Public Library of Science
record_format MEDLINE/PubMed
spelling pubmed-97338732022-12-10 Effectively computing transition patterns with privacy-preserved trajectory datasets Kim, Jong Wook Jang, Beakcheol PLoS One Research Article Recent advances in positioning techniques, along with the widespread use of mobile devices, make it easier to monitor and collect user trajectory information during their daily activities. An ever-growing abundance of data about trajectories of individual users paves the way for various applications that utilize user mobility information. One of the most common analysis tasks in these new applications is to extract the sequential transition patterns between two consecutive timestamps from a collection of trajectories. Such patterns have been widely exploited in diverse applications to predict and recommend next user locations based on the current position. Thus, in this paper, we explore the computation of the transition patterns, especially with a trajectory dataset collected using differential privacy, which is a de facto standard for privacy-preserving data collection and processing. Specifically, the proposed scheme relies on geo-indistinguishability, which is a variant of the well-known differential privacy, to collect trajectory data from users in a privacy-preserving manner, and exploits the functionality of the expectation-maximization algorithm to precisely estimate hidden transition patterns based on perturbed trajectory datasets collected under geo-indistinguishability. Experimental results using real trajectory datasets confirm that a good estimation of transition pattern can be achieved with the proposed method. Public Library of Science 2022-12-09 /pmc/articles/PMC9733873/ /pubmed/36490250 http://dx.doi.org/10.1371/journal.pone.0278744 Text en © 2022 Kim, Jang https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
spellingShingle Research Article
Kim, Jong Wook
Jang, Beakcheol
Effectively computing transition patterns with privacy-preserved trajectory datasets
title Effectively computing transition patterns with privacy-preserved trajectory datasets
title_full Effectively computing transition patterns with privacy-preserved trajectory datasets
title_fullStr Effectively computing transition patterns with privacy-preserved trajectory datasets
title_full_unstemmed Effectively computing transition patterns with privacy-preserved trajectory datasets
title_short Effectively computing transition patterns with privacy-preserved trajectory datasets
title_sort effectively computing transition patterns with privacy-preserved trajectory datasets
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9733873/
https://www.ncbi.nlm.nih.gov/pubmed/36490250
http://dx.doi.org/10.1371/journal.pone.0278744
work_keys_str_mv AT kimjongwook effectivelycomputingtransitionpatternswithprivacypreservedtrajectorydatasets
AT jangbeakcheol effectivelycomputingtransitionpatternswithprivacypreservedtrajectorydatasets