Publishing Trajectory with Differential Privacy: A Priori vs. A Posteriori Sampling Mechanisms
It is now possible to collect and share trajectory data for any ship in the world by various means such as satellite and VHF systems. However, the publication of such data also creates new risks for privacy breach with consequences on the security and liability of the stakeholders. Thus, there is an urgent need to develop methods for preserving the privacy of published trajectory data. In this paper, we propose and comparatively investigate two mechanisms for the publication of the trajectory of individual ships under differential privacy guarantees. Traditionally, privacy and differential privacy is achieved by perturbation of the result or the data according to the sensitivity of the query. Our approach, instead, combines sampling and interpolation. We present and compare two techniques in which we sample and interpolate (a priori) and interpolate and sample (a posteriori), respectively. We show that both techniques achieve a (0, δ) form of differential privacy. We analytically and empirically, with real ship trajectories, study the privacy guarantee and utility of the methods.
KeywordsDynamic Time Warping Trajectory Data Differential Privacy Privacy Breach Original Trajectory
Unable to display preview. Download preview PDF.
- 1.Agard, B., Morency, C., Trépanier, M.: Mining public transport user behaviour from smart card data. In: The 12th IFAC Symposium on Information Control Problems in Manufacturing, INCOM (2006)Google Scholar
- 4.McSherry, F., Talwar, K.: Mechanism design via differential privacy. In: 48th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2007, pp. 94–103. IEEE (2007)Google Scholar
- 7.Chen, R., Fung, B.C.M., Desai, B.C.: Differentially private trajectory data publication. CoRR abs/1112.2020 (2011)Google Scholar
- 8.Mandel, C., Frese, U.: Comparison of wheelchair user interfaces for the paralysed: Head-joystick vs. verbal path selection from an offered route-set. In: Proceedings of the 3rd European Conference on Mobile Robots, ECMR 2007 (2007)Google Scholar
- 10.Gehrke, J., Hay, M., Lui, E., Pass, R.: Crowd-blending privacy. Cryptology ePrint Archive, Report 2012/456 (2012), http://eprint.iacr.org/
- 12.Dwork, C., Rothblum, G., Vadhan, S.: Boosting and differential privacy. In: 2010 51st Annual IEEE Symposium on Foundations of Computer Science (FOCS), pp. 51–60. IEEE (2010)Google Scholar
- 13.Shao, D., Jiang, K., Kister, T., Bressan, S., TAN, K.L.: Publishing trajectory with differential privacy: A priori vs a posteriori sampling mechanisms. Technical Report: TRA4/13 (2013), https://dl.comp.nus.edu.sg/dspace/handle/1900.100/3932