WEKO3
アイテム
{"_buckets": {"deposit": "9c5c53d3-adf0-4a65-80e2-72cb6846b5b4"}, "_deposit": {"created_by": 13, "id": "8923", "owners": [13], "pid": {"revision_id": 0, "type": "depid", "value": "8923"}, "status": "published"}, "_oai": {"id": "oai:uec.repo.nii.ac.jp:00008923", "sets": ["6"]}, "author_link": ["24356", "24355"], "item_10001_biblio_info_7": {"attribute_name": "書誌情報", "attribute_value_mlt": [{"bibliographicIssueDates": {"bibliographicIssueDate": "2017-12", "bibliographicIssueDateType": "Issued"}, "bibliographicIssueNumber": "12", "bibliographicPageEnd": "3218", "bibliographicPageStart": "3207", "bibliographicVolumeNumber": "47", "bibliographic_titles": [{}, {"bibliographic_title": "IEEE Transactions on Systems, Man, and Cybernetics: Systems", "bibliographic_titleLang": "en"}]}]}, "item_10001_description_5": {"attribute_name": "抄録", "attribute_value_mlt": [{"subitem_description": "Mobile devices that can sense their location using GPS or Wi-Fi have become extremely popular. However, many users hesitate to provide their accurate location information to unreliable third parties if it means that their identities or sensitive attribute values will be disclosed by doing so. Many approaches for anonymization, such as k-anonymity, have been proposed to tackle this issue. Existing studies for k-anonymity usually anonymize each user\u0027s location so that the anonymized area contains k or more users. Existing studies, however, do not consider location errors and the probability that each user actually exists at the anonymized area. As a result, a specific user might be identified by untrusted third parties. We propose novel privacy and utility metrics that can treat the location and an efficient algorithm to anonymize the information associated with users\u0027 locations. This is the first work that anonymizes location while considering location errors and the probability that each user is actually present at the anonymized area. By means of simulations, we have proven that our proposed method can reduce the risk of the user\u0027s attributes being identified while maintaining the utility of the anonymized data.", "subitem_description_type": "Abstract"}]}, "item_10001_publisher_8": {"attribute_name": "出版者", "attribute_value_mlt": [{"subitem_publisher": "IEEE"}]}, "item_10001_relation_14": {"attribute_name": "DOI", "attribute_value_mlt": [{"subitem_relation_type": "isVersionOf", "subitem_relation_type_id": {"subitem_relation_type_id_text": "10.1109/TSMC.2016.2564928", "subitem_relation_type_select": "DOI"}}]}, "item_10001_relation_17": {"attribute_name": "関連サイト", "attribute_value_mlt": [{"subitem_relation_type_id": {"subitem_relation_type_id_text": "https://doi.org/10.1109/TSMC.2016.2564928", "subitem_relation_type_select": "DOI"}}]}, "item_10001_rights_15": {"attribute_name": "権利", "attribute_value_mlt": [{"subitem_rights": "© 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works."}]}, "item_10001_source_id_9": {"attribute_name": "ISSN", "attribute_value_mlt": [{"subitem_source_identifier": "2168-2216", "subitem_source_identifier_type": "ISSN"}]}, "item_10001_version_type_20": {"attribute_name": "著者版フラグ", "attribute_value_mlt": [{"subitem_version_resource": "http://purl.org/coar/version/c_ab4af688f83e57aa", "subitem_version_type": "AM"}]}, "item_creator": {"attribute_name": "著者", "attribute_type": "creator", "attribute_value_mlt": [{"creatorNames": [{"creatorName": "Sei, Yuichi", "creatorNameLang": "en"}], "nameIdentifiers": [{"nameIdentifier": "24355", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "Ohsuga, Akihiko", "creatorNameLang": "en"}], "nameIdentifiers": [{"nameIdentifier": "24356", "nameIdentifierScheme": "WEKO"}]}]}, "item_files": {"attribute_name": "ファイル情報", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_date", "date": [{"dateType": "Available", "dateValue": "2019-01-22"}], "displaytype": "detail", "download_preview_message": "", "file_order": 0, "filename": "2-SMC.pdf", "filesize": [{"value": "1.3 MB"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 1300000.0, "url": {"label": "2-SMC", "url": "https://uec.repo.nii.ac.jp/record/8923/files/2-SMC.pdf"}, "version_id": "f0c0efbf-4ae8-4a8f-b2e2-a94577a0a532"}]}, "item_keyword": {"attribute_name": "キーワード", "attribute_value_mlt": [{"subitem_subject": "Anonymization", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}, {"subitem_subject": "location information", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}, {"subitem_subject": "privacy", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}, {"subitem_subject": "ubiquitous computing", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}]}, "item_language": {"attribute_name": "言語", "attribute_value_mlt": [{"subitem_language": "eng"}]}, "item_resource_type": {"attribute_name": "資源タイプ", "attribute_value_mlt": [{"resourcetype": "journal article", "resourceuri": "http://purl.org/coar/resource_type/c_6501"}]}, "item_title": "Location Anonymization With Considering Errors and Existence Probability", "item_titles": {"attribute_name": "タイトル", "attribute_value_mlt": [{"subitem_title": "Location Anonymization With Considering Errors and Existence Probability", "subitem_title_language": "en"}]}, "item_type_id": "10001", "owner": "13", "path": ["6"], "permalink_uri": "https://uec.repo.nii.ac.jp/records/8923", "pubdate": {"attribute_name": "公開日", "attribute_value": "2019-01-22"}, "publish_date": "2019-01-22", "publish_status": "0", "recid": "8923", "relation": {}, "relation_version_is_last": true, "title": ["Location Anonymization With Considering Errors and Existence Probability"], "weko_shared_id": -1}
Location Anonymization With Considering Errors and Existence Probability
https://uec.repo.nii.ac.jp/records/8923
https://uec.repo.nii.ac.jp/records/8923f9138845-866e-4758-8bee-50d6c175bdbc
名前 / ファイル | ライセンス | アクション |
---|---|---|
2-SMC (1.3 MB)
|
|
Item type | 学術雑誌論文 / Journal Article(1) | |||||
---|---|---|---|---|---|---|
公開日 | 2019-01-22 | |||||
タイトル | ||||||
言語 | en | |||||
タイトル | Location Anonymization With Considering Errors and Existence Probability | |||||
言語 | ||||||
言語 | eng | |||||
キーワード | ||||||
言語 | en | |||||
主題 | Anonymization | |||||
キーワード | ||||||
言語 | en | |||||
主題 | location information | |||||
キーワード | ||||||
言語 | en | |||||
主題 | privacy | |||||
キーワード | ||||||
言語 | en | |||||
主題 | ubiquitous computing | |||||
資源タイプ | ||||||
資源タイプ識別子 | http://purl.org/coar/resource_type/c_6501 | |||||
資源タイプ | journal article | |||||
著者 |
Sei, Yuichi
× Sei, Yuichi× Ohsuga, Akihiko |
|||||
抄録 | ||||||
内容記述タイプ | Abstract | |||||
内容記述 | Mobile devices that can sense their location using GPS or Wi-Fi have become extremely popular. However, many users hesitate to provide their accurate location information to unreliable third parties if it means that their identities or sensitive attribute values will be disclosed by doing so. Many approaches for anonymization, such as k-anonymity, have been proposed to tackle this issue. Existing studies for k-anonymity usually anonymize each user's location so that the anonymized area contains k or more users. Existing studies, however, do not consider location errors and the probability that each user actually exists at the anonymized area. As a result, a specific user might be identified by untrusted third parties. We propose novel privacy and utility metrics that can treat the location and an efficient algorithm to anonymize the information associated with users' locations. This is the first work that anonymizes location while considering location errors and the probability that each user is actually present at the anonymized area. By means of simulations, we have proven that our proposed method can reduce the risk of the user's attributes being identified while maintaining the utility of the anonymized data. | |||||
書誌情報 |
en : IEEE Transactions on Systems, Man, and Cybernetics: Systems 巻 47, 号 12, p. 3207-3218, 発行日 2017-12 |
|||||
出版者 | ||||||
出版者 | IEEE | |||||
ISSN | ||||||
収録物識別子タイプ | ISSN | |||||
収録物識別子 | 2168-2216 | |||||
DOI | ||||||
関連タイプ | isVersionOf | |||||
識別子タイプ | DOI | |||||
関連識別子 | 10.1109/TSMC.2016.2564928 | |||||
権利 | ||||||
権利情報 | © 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. | |||||
関連サイト | ||||||
識別子タイプ | DOI | |||||
関連識別子 | https://doi.org/10.1109/TSMC.2016.2564928 | |||||
著者版フラグ | ||||||
出版タイプ | AM | |||||
出版タイプResource | http://purl.org/coar/version/c_ab4af688f83e57aa |