Skip to main content

Privacy-Preserving Spatio-Temporal Patient Data Publishing

  • Conference paper
  • First Online:
Database and Expert Systems Applications (DEXA 2020)

Abstract

As more data become available to the public, the value of information seems to be diminishing with concern over what constitute privacy of individual. Despite benefit to data publishing, preserving privacy of individuals remains a major concern because linking of data from heterogeneous source become easier due to the vast availability of artificial intelligence tools. In this paper, we focus on preserving privacy of spatio-temporal data publishing. Specifically, we present a framework consisting of (i) a 5-level temporal hierarchy to protect the temporal attributes and (ii) temporal representative point (TRP) differential privacy to protect the spatial attributes. Evaluation results on big datasets show that our framework keeps a good balance of utility and privacy. To a further extent, our solution is expected be extendable for privacy-preserving data publishing for the spatio-temporal data of coronavirus disease 2019 (COVID-19) patients.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Abul, O., Bonchi, F., Nanni, M.: Never walk alone: uncertainty for anonymity in moving objects databases. In: IEEE ICDE 2008, pp. 376–385 (2018)

    Google Scholar 

  2. Acs, G., Castelluccia, C.: A case study: privacy preserving release of spatio-temporal density in Paris. In: ACM KDD 2014, pp. 1679–1688 (2014)

    Google Scholar 

  3. Andrés, M.E., Bordenabe, N.E., Chatzikokolakis, K., Palamidessi, C.: Geo-indistinguishability: differential privacy for location-based systems. In: ACM CCS 2013, pp. 901–914 (2013)

    Google Scholar 

  4. Arora, N.R., Lee, W., Leung, C.K.-S., Kim, J., Kumar, H.: Efficient fuzzy ranking for keyword search on graphs. In: Liddle, S.W., Schewe, K.-D., Tjoa, A.M., Zhou, X. (eds.) DEXA 2012, Part I. LNCS, vol. 7446, pp. 502–510. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-32600-4_38

    Chapter  Google Scholar 

  5. Athanasopoulos, G., Hyndman, R.J., Kourentzes, N., Petropoulos, F.: Forecasting with temporal hierarchies. EJOR 262(1), 60–74 (2017)

    Article  MathSciNet  Google Scholar 

  6. Audu, A.-R.A., Cuzzocrea, A., Leung, C.K., MacLeod, K.A., Ohin, N.I., Pulgar-Vidal, N.C.: An intelligent predictive analytics system for transportation analytics on open data towards the development of a smart city. In: Barolli, L., Hussain, F.K., Ikeda, M. (eds.) CISIS 2019. AISC, vol. 993, pp. 224–236. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-22354-0_21

    Chapter  Google Scholar 

  7. Cao, Y., Yoshikawa, M., Xiao, Y., Xiong, L.: Quantifying differential privacy under temporal correlations. In: IEEE ICDE 2017, pp. 821–832 (2017)

    Google Scholar 

  8. Cho, E., Myers, S.A., Leskovec, J.: Friendship and mobility: user movement in location-based social networks. In: ACM KDD 2011, pp. 1082–1090 (2011)

    Google Scholar 

  9. Dandekar, A., Basu, D., Bressan, S.: Differential privacy for regularised linear regression. In: Hartmann, S., Ma, H., Hameurlain, A., Pernul, G., Wagner, R.R. (eds.) DEXA 2018, Part II. LNCS, vol. 11030, pp. 483–491. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-98812-2_44

    Chapter  Google Scholar 

  10. Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006, Part II. LNCS, vol. 4052, pp. 1–12. Springer, Heidelberg (2006). https://doi.org/10.1007/11787006_1

    Chapter  Google Scholar 

  11. Eom, C.S., Lee, C.C., Lee, W., Leung, C.K.: Effective privacy preserving data publishing by vectorization. Inf. Sci. 527, 311–328 (2020)

    Article  Google Scholar 

  12. Eom, C.S., Lee, W., Leung, C.K.: STDP: secure privacy-preserving trajectory data publishing. In: IEEE Cybermatics 2018, pp. 892–899 (2018)

    Google Scholar 

  13. Fung, B.C., Wang, K., Chen, R., Yu, P.S.: Privacy-preserving data publishing: a survey of recent developments. ACM CSur 42(4), 14:1–14:53 (2010)

    Google Scholar 

  14. Khouri, S., Lanasri, D., Saidoune, R., Boudoukha, K., Bellatreche, L.: LogLInc: LoG queries of linked open data investigator for cube design. In: Hartmann, S., Küng, J., Chakravarthy, S., Anderst-Kotsis, G., Tjoa, A.M., Khalil, I. (eds.) DEXA 2019, Part II. LNCS, vol. 11706, pp. 352–367. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-27615-7_27

    Chapter  Google Scholar 

  15. Lakshmanan, L.V.S., Leung, C.K., Ng, R.T.: The segment support map: scalable mining of frequent itemsets. ACM SIGKDD Explor. 2(2), 21–27 (2000)

    Article  Google Scholar 

  16. LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Incognito: efficient full-domain \(k\)-anonymity. In: ACM SIGMOD 2005, pp. 49–60 (2005)

    Google Scholar 

  17. Leung, C.K.: Frequent itemset mining with constraints. In: Encyclopedia of Database Systems, 2nd edn., pp. 1531–1536 (2018)

    Google Scholar 

  18. Leung, C.K., Hoi, C.S.H., Pazdor, A.G.M., Wodi, B.H., Cuzzocrea, A.: Privacy-preserving frequent pattern mining from big uncertain data. In: IEEE BigData 2018, pp. 5101–5110 (2018)

    Google Scholar 

  19. Leung, C.K.-S., Tanbeer, S.K., Cameron, J.J.: Interactive discovery of influential friends from social networks. Soc. Netw. Anal. Min. 4(1), 154:1–154:13 (2014). https://doi.org/10.1007/s13278-014-0154-z

    Article  Google Scholar 

  20. Leung, C.K., Zhang, H., Souza, J., Lee, W.: Scalable vertical mining for big data analytics of frequent itemsets. In: Hartmann, S., Ma, H., Hameurlain, A., Pernul, G., Wagner, R.R. (eds.) DEXA 2018, Part I. LNCS, vol. 11029, pp. 3–17. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-98809-2_1

    Chapter  Google Scholar 

  21. Li, N., Li, T., Venkatasubramanian, S.: \(t\)-closeness: privacy beyond \(k\)-anonymity and \(l\)-diversity. In: IEEE ICDE 2007, pp. 106–115 (2007)

    Google Scholar 

  22. Lin, J.C.-W., Zhang, Y., Fournier-Viger, P., Djenouri, Y., Zhang, J.: A metaheuristic algorithm for hiding sensitive itemsets. In: Hartmann, S., Ma, H., Hameurlain, A., Pernul, G., Wagner, R.R. (eds.) DEXA 2018, Part II. LNCS, vol. 11030, pp. 492–498. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-98812-2_45

    Chapter  Google Scholar 

  23. Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: \(l\)-diversity: privacy beyond \(k\)-anonymity. ACM TKDD 1(1), 3:1–3:52 (2007)

    Google Scholar 

  24. Mendes, R., Vilela, J.P.: Privacy-preserving data mining: methods, metrics, and applications. IEEE Access 5, 10562–10582 (2017)

    Article  Google Scholar 

  25. Mohammed, N., Fung, B.C.M., Debbabi, M.: Walking in the crowd: anonymizing trajectory data for pattern analysis. In: ACM CIKM 2009, pp. 1441–1444 (2009)

    Google Scholar 

  26. Olawoyin, A.M., Chen, Y.: Predicting the future with artificial neural network. Procedia Comput. Sci. 140, 383–392 (2018)

    Article  Google Scholar 

  27. Statistics Canada: Representative point. Illustrated Glossary, Census Year 2011 (2011). https://www150.statcan.gc.ca/n1/pub/92-195-x/2011001/other-autre/point/point-eng.htm

  28. Tanbeer, S.K., Leung, C.K., Cameron, J.J.: Interactive mining of strong friends from social networks and its applications in e-commerce. JOCEC 24(2–3), 157–173 (2014)

    Google Scholar 

  29. Wodi, B.H., Leung, C.K., Cuzzocrea, A., Sourav, S.: Fast privacy-preserving keyword search on encrypted outsourced data. In: IEEE BigData 2019, pp. 6266–6275 (2019). https://doi.org/10.1109/BigData47090.2019.9046058

  30. Xiao, Y., Xiong, L.: Protecting locations with differential privacy under temporal correlations. In: ACM CCS 2015, pp. 1298–1309 (2015)

    Google Scholar 

  31. Yin, Y., Kaku, I., Tang, J., Zhu, J.: Privacy-preserving data mining. In: Data Mining. Decision Engineering, pp. 101–119. Springer, London (2011). https://doi.org/10.1007/978-1-84996-338-1_6

  32. Zheng, Y., Xie, X., Ma, W.: GeoLife: a collaborative social networking service among user, location and trajectory. IEEE Data Eng. Bull. 33(2), 32–39 (2010)

    Google Scholar 

Download references

Acknowledgements

This work is partially supported by NSERC (Canada) and University of Manitoba.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Carson K. Leung .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Olawoyin, A.M., Leung, C.K., Choudhury, R. (2020). Privacy-Preserving Spatio-Temporal Patient Data Publishing. In: Hartmann, S., Küng, J., Kotsis, G., Tjoa, A.M., Khalil, I. (eds) Database and Expert Systems Applications. DEXA 2020. Lecture Notes in Computer Science(), vol 12392. Springer, Cham. https://doi.org/10.1007/978-3-030-59051-2_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-59051-2_28

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-59050-5

  • Online ISBN: 978-3-030-59051-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics