Abstract
Recently, big data had become central in the analysis of human behavior and the development of innovative services. In particular, a new class of services is emerging, taking advantage of different sources of data, in order to consider the multiple aspects of human beings. Unfortunately, these data can lead to re-identification problems and other privacy leaks, as diffusely reported in both scientific literature and media. The risk is even more pressing if multiple sources of data are linked together since a potential adversary could know information related to each dataset. For this reason, it is necessary to evaluate accurately and mitigate the individual privacy risk before releasing personal data. In this paper, we propose a methodology for the first task, i.e., assessing privacy risk, in a multidimensional scenario, defining some possible privacy attacks and simulating them using real-world datasets.
Keywords
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
The risk evaluation task is compliant with the EU General Data Protection Regulation.
- 2.
Art. 5 EU GDPR.
References
Abul, O., Bonchi, F., Nanni, M.: Anonymization of moving objects databases by clustering and perturbation. Inf. Syst. 35(8) (2010)
Blondel, V.D., Decuyper, A., Krings, G.: A survey of results on mobile phone datasets analysis. EPJ Data Sci. 4(1), 10 (2015)
Cavoukian, A.: Privacy by design the 7 foundational principles, August 2009
Deng, M., Wuyts, K., Scandariato, R., Preneel, B., Joosen, W.: A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements. Requir. Eng. 16(1) (2011)
Gabrielli, L., Furletti, B., Trasarti, R., Giannotti, F., Pedreschi, D.: City users’ classification with mobile phone data. In: IEEE Big Data 2015 (2015)
Giannotti, F., Lakshmanan, L.V., Monreale, A., Pedreschi, D., Wang, H.: Privacy-preserving mining of association rules from outsourced transaction databases. IEEE Syst. J. 7 (2013)
Institute, C.S.E.: Octave. http://www.cert.org/octave/
Isaacman, S., Becker, R., Cáceres, R., Martonosi, M., Rowland, J., Varshavsky, A., Willinger, W.: Human mobility modeling at metropolitan scales. In: MobiSys 2012 (2012)
Le, H.Q., Arch-int, S., Nguyen, H.X., Arch-int, N.: Association rule hiding in risk management for retail supply chain collaboration. Comput. Indus. 64 (2013)
Meier, J., Corporation, M.: Improving Web Application Security: Threats and Countermeasures. In: Patterns & Practices, Microsoft (2003)
Mir, D.J., Isaacman, S., Cáceres, R., Martonosi, M., Wright, R.N.: Dp-where: differentially private modeling of human mobility. In: IEEE Big Data 2013 (2013)
OWASP: Risk rating methodology. https://www.owasp.org/index.php/OWASP_Risk_Rating_Methodology
Pauler, G., Dick, A.: Maximizing profit of a food retailing chain by targeting and promoting valuable customers using loyalty card and scanner data. EJOR 174 (2006)
Pellungrini, R., Pappalardo, L., Pratesi, F., Monreale, A.: A data mining approach to assess privacy risk in human mobility data, ready to appear in ACM TIST
Pellungrini, R., Pratesi, F., Pappalardo, L.: Assessing privacy risk in retail data. In: PAP@ECML-PKDD 2017 (2017)
Pratesi, F., Monreale, A., Trasarti, R., Giannotti, F., Pedreschi, D., Yanagihara, T.: Prisquit: a system for assessing privacy risk versus quality in data sharing, Technical report 2016-TR-043. ISTI - CNR, Pisa, Italy (2016)
Rizvi, S.J., Haritsa, J.R.: Maintaining data privacy in association rule mining. In: VLDB 2002 (2002)
Rygielski, C., Wang, J.C., Yen, D.C.: Data mining techniques for customer relationship management. Technol. Soc. 24 (2002)
Samarati, P., Sweeney, L.: Generalizing data to provide anonymity when disclosing information (abstract). In: PODS, p. 188 (1998)
Song, Y., Dahlmeier, D., Bressan, S.: Not so unique in the crowd: a simple and effective algorithm for anonymizing location data. In: PIR@SIGIR 2014 (2014)
Trasarti, R., Olteanu-Raimond, A.M., Nanni, M., Couronné, T., Furletti, B., Giannotti, F., Smoreda, Z., Ziemlicki, C.: Discovering urban and country dynamics from mobile phone data with spatial correlation patterns. Telecommun. Policy 39(3–4) (2015)
Xiao, Y., Xiong, L.: Protecting locations with differential privacy under temporal correlations. In: ACM CCS 2015 (2015)
World Economic Forum: Rethinking personal data: Strengthening trust. http://www3.weforum.org/docs/WEF_IT_RethinkingPersonalData_Report_2012.pdf
Zang, H., Bolot, J.: Anonymization of location data does not work: a large-scale measurement study. In: MobiCom. ACM (2011)
Acknowledgment
Funded by the European project SoBigData (Grant Agreement 654024).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Pratesi, F., Monreale, A., Giannotti, F., Pedreschi, D. (2018). Privacy Preserving Multidimensional Profiling. In: Guidi, B., Ricci, L., Calafate, C., Gaggi, O., Marquez-Barja, J. (eds) Smart Objects and Technologies for Social Good. GOODTECHS 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 233. Springer, Cham. https://doi.org/10.1007/978-3-319-76111-4_15
Download citation
DOI: https://doi.org/10.1007/978-3-319-76111-4_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-76110-7
Online ISBN: 978-3-319-76111-4
eBook Packages: Computer ScienceComputer Science (R0)