Virginia Tech
    • Log in
    View Item 
    •   VTechWorks Home
    • ETDs: Virginia Tech Electronic Theses and Dissertations
    • Masters Theses
    • View Item
    •   VTechWorks Home
    • ETDs: Virginia Tech Electronic Theses and Dissertations
    • Masters Theses
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Implementing Differential Privacy for Privacy Preserving Trajectory Data Publication in Large-Scale Wireless Networks

    Thumbnail
    View/Open
    Stroud_CZ_T_2018.pdf (3.375Mb)
    Downloads: 711
    Supporting documents (506.3Kb)
    Downloads: 60
    Supporting documents (426.8Kb)
    Downloads: 25
    Date
    2018-08-14
    Author
    Stroud, Caleb Zachary
    Metadata
    Show full item record
    Abstract
    Wireless networks collect vast amounts of log data concerning usage of the network. This data aids in informing operational needs related to performance, maintenance, etc., but it is also useful for outside researchers in analyzing network operation and user trends. Releasing such information to these outside researchers poses a threat to privacy of users. The dueling need for utility and privacy must be addressed. This thesis studies the concept of differential privacy for fulfillment of these goals of releasing high utility data to researchers while maintaining user privacy. The focus is specifically on physical user trajectories in authentication manager log data since this is a rich type of data that is useful for trend analysis. Authentication manager log data is produced when devices connect to physical access points (APs) and trajectories are sequences of these spatiotemporal connections from one AP to another for the same device. The fulfillment of this goal is pursued with a variable length n-gram model that creates a synthetic database which can be easily ingested by researchers. We found that there are shortcomings to the algorithm chosen in specific application to the data chosen, but differential privacy itself can still be used to release sanitized datasets while maintaining utility if the data has a low sparsity.
    URI
    http://hdl.handle.net/10919/84548
    Collections
    • Masters Theses [19417]

    Related items

    Showing items related by title, author, creator and subject.

    • Thumbnail

      Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems 

      Bélanger, France; Crossler, Robert E. (University of Minnesota, Management Information Systems Research Center, 2011-12)
      Information privacy refers to the desire of individuals to control or have some influence over data about themselves. Advances in information technology have raised concerns about information privacy and its impacts, and ...
    • Thumbnail

      An Examination of the Privacy Impact Assessment as a Vehicle for Privacy Policy  Implementation in U.S. Federal Agencies 

      Pandy, Susan M. (Virginia Tech, 2013-02-13)
      The Privacy Act of 1974 was designed to protect personal privacy captured in the records held by government agencies.  However, the scope of privacy protection has expanded in light of advances in technology, heightened ...
    • Thumbnail

      New Approaches for Ensuring User Online Privacy 

      Bian, Kaigui (Virginia Tech, 2007-11-26)
      With the increase of requesting personal information online, unauthorized disclosure of user privacy is a significant problem faced by todayâ s Internet. As a typical identity theft, phishing usually employs fraudulent ...

    If you believe that any material in VTechWorks should be removed, please see our policy and procedure for Requesting that Material be Amended or Removed. All takedown requests will be promptly acknowledged and investigated.

    Virginia Tech | University Libraries | Contact Us
     

     

    VTechWorks

    AboutPoliciesHelp

    Browse

    All of VTechWorksCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

    My Account

    Log inRegister

    Statistics

    View Usage Statistics

    If you believe that any material in VTechWorks should be removed, please see our policy and procedure for Requesting that Material be Amended or Removed. All takedown requests will be promptly acknowledged and investigated.

    Virginia Tech | University Libraries | Contact Us