Implementing Differential Privacy for Privacy Preserving Trajectory Data Publication in Large-Scale Wireless Networks
Stroud, Caleb Zachary
MetadataShow full item record
Wireless networks collect vast amounts of log data concerning usage of the network. This data aids in informing operational needs related to performance, maintenance, etc., but it is also useful for outside researchers in analyzing network operation and user trends. Releasing such information to these outside researchers poses a threat to privacy of users. The dueling need for utility and privacy must be addressed. This thesis studies the concept of differential privacy for fulfillment of these goals of releasing high utility data to researchers while maintaining user privacy. The focus is specifically on physical user trajectories in authentication manager log data since this is a rich type of data that is useful for trend analysis. Authentication manager log data is produced when devices connect to physical access points (APs) and trajectories are sequences of these spatiotemporal connections from one AP to another for the same device. The fulfillment of this goal is pursued with a variable length n-gram model that creates a synthetic database which can be easily ingested by researchers. We found that there are shortcomings to the algorithm chosen in specific application to the data chosen, but differential privacy itself can still be used to release sanitized datasets while maintaining utility if the data has a low sparsity.
- Masters Theses 
Showing items related by title, author, creator and subject.
Bélanger, France; Crossler, Robert E. (University of Minnesota, Management Information Systems Research Center, 2011-12)Information privacy refers to the desire of individuals to control or have some influence over data about themselves. Advances in information technology have raised concerns about information privacy and its impacts, and ...
Bian, Kaigui (Virginia Tech, 2007-11-26)With the increase of requesting personal information online, unauthorized disclosure of user privacy is a significant problem faced by todayâ s Internet. As a typical identity theft, phishing usually employs fraudulent ...