Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1529282.1529626acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article

Privacy protection for RFID data

Published: 08 March 2009 Publication History

Abstract

Radio Frequency IDentification (RFID) is a technology of automatic object identification. Retailers and manufacturers have created compelling business cases for deploying RFID in their supply chains. Yet, the uniquely identifiable objects pose a privacy threat to individuals. In this paper, we study the privacy threats caused by publishing RFID data. Even if the explicit identifying information, such as name and social security number, has been removed from the published RFID data, an adversary may identify a target victim's record or infer her sensitive value by matching a priori known visited locations and timestamps. RFID data by default is high-dimensional and sparse, so applying traditional K-anonymity to RFID data suffers from the curse of high dimensionality, and would result in poor data usefulness. We define a new privacy model, develop an anonymization algorithm to accommodate special challenges on RFID data, and evaluate its performance in terms of data quality, efficiency, and scalability. To the best of our knowledge, this is the first work on anonymizing high-dimensional RFID data.

References

[1]
O. Abul, F. Bonchi, and M. Nanni. Never walk alone: Uncertainty for anonymity in moving objects databases. In Proc. of the 24th IEEE International Conference on Data Engineering (ICDE), pages 376--385, April 2008.
[2]
C. C. Aggarwal. On k-anonymity and the curse of dimensionality. In Proc. of the 31st Very Large Data Bases (VLDB), pages 901--909, 2005.
[3]
R. J. Bayardo and R. Agrawal. Data privacy through optimal k-anonymization. In Proc. of the 21st IEEE International Conference on Data Engineering (ICDE), pages 217--228, Tokyo, Japan, 2005.
[4]
B. C. M. Fung, K. Wang, A. W. C. Fu, and J. Pei. Anonymity for continuous data publishing. In Proc. of the 11th International Conference on Extending Database Technology (EDBT), March 2008.
[5]
B. C. M. Fung, K. Wang, L. Wang, and M. Debbabi. A framework for privacy-preserving cluster analysis. In Proc. of the 2008 IEEE International Conference on Intelligence and Security Informatics (ISI), Taipei, Taiwan, June 2008.
[6]
B. C. M. Fung, K. Wang, and P. S. Yu. Top-down specialization for information and privacy preservation. In Proc. of the 21st IEEE International Conference on Data Engineering (ICDE), pages 205--216, Tokyo, Japan, April 2005.
[7]
B. C. M. Fung, K. Wang, and P. S. Yu. Anonymizing classification data for privacy preservation. IEEE Transactions on Knowledge and Data Engineering (TKDE), 19(5): 711--725, May 2007.
[8]
G. Ghinita, Y. Tao, and P. Kalnis. On the anonymization of sparse high-dimensional data. In Proc. of the 24th IEEE International Conference on Data Engineering (ICDE), pages 715--724, April 2008.
[9]
H. Gonzalez, J. Han, and X. Li. Flowcube: Constructing RFID flowcubes for multi-dimensional analysis of commodity flows. In Proc. of the International Conference on Very Large Data Bases (VLDB), pages 1--19, Seoul, Korea, September 2006.
[10]
H. Gonzalez, J. Han, and X. Li. Mining compressed commodity workflows from massive rfid data sets. In Proc. of the International Conference on Information and Knowledge Management (CIKM), November 2006.
[11]
A. Juels. Rfid security and privacy: a research survey. IEEE Journal on Selected Areas in Communications, 24(2): 381--394, February 2006.
[12]
K. LeFevre, D. J. DeWitt, and R. Ramakrishnan. Incognito: Efficient full-domain k-anonymity. In Proc. of ACM SIGMOD, pages 49--60, Baltimore, ML, 2005.
[13]
N. Li, T. Li, and S. Venkatasubramanian. t-closeness: Privacy beyond k-anonymity and l-diversity. In Proc. of the 21st IEEE International Conference on Data Engineering (ICDE), Istanbul, Turkey, April 2007.
[14]
A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam. l-diversity: Privacy beyond k-anonymity. In Proc. of the 22nd IEEE International Conference on Data Engineering (ICDE), 2006.
[15]
A. Meyerson and R. Williams. On the complexity of optimal k-anonymity. In Proc. of the 23rd ACM PODS, pages 223--228, Paris, France, 2004.
[16]
P. Samarati and L. Sweeney. Generalizing data to provide anonymity when disclosing information. In Proc. of the 17th ACM PODS, page 188, June 1998.
[17]
S. E. Sarma, S. A. Weis, and D. W. Engels. Rfid systems and security and privacy implications. In Proc. of the 4th International Workshop of Cryptographic Hardware and Embedded Systems (CHES), pages 1--19, San Diego, 2003.
[18]
M. Terrovitis and N. Mamoulis. Privacy preservation in the publication of trajectories. In Proc. of the 9th International Conference on Mobile Data Management (MDM), pages 65--72, April 2008.
[19]
M. Terrovitis, N. Mamoulis, and P. Kalnis. Anonymity in unstructured data. Technical Report TR-2004-04, Department of Computer Science, University of Hong Kong, April 2008.
[20]
K. Wang and B. C. M. Fung. Anonymizing sequential releases. In Proc. of the 12th ACM SIGKDD, Philadelphia, PA, August 2006.
[21]
K. Wang, B. C. M. Fung, and P. S. Yu. Template-based privacy preservation in classification problems. In Proc. of the 5th IEEE International Conference on Data Mining (ICDM), pages 466--473, Houston, TX, November 2005.
[22]
K. Wang, B. C. M. Fung, and P. S. Yu. Handicapping attacker's confidence: An alternative to k-anonymization. Knowledge and Information Systems (KAIS), 11(3): 345--368, April 2007.
[23]
S.-W. Wang, W.-H. Chen, C.-S. Ong, L. Liu, and Y. Chuang. RFID applications in hospitals: a case study on a demonstration rfid project in a taiwan hospital. In Proc. of the 39th Hawaii International Conference on System Sciences, 2006.
[24]
R. C. W. Wong, J. Li., A. W. C. Fu, and K. Wang. (α, k)-anonymity: An enhanced k-anonymity model for privacy preserving data publishing. In Proc. of the 12th ACM SIGKDD, 2006.
[25]
X. Xiao and Y. Tao. Personalized privacy preservation. In Proc. of ACM SIGMOD, Chicago, IL, 2006.
[26]
Y. Xu, B. C. M. Fung, K. Wang, A. W. C. Fu, and J. Pei. Publishing sensitive transactions for itemset utility. In Proc. of the 8th IEEE International Conference on Data Mining (ICDM 2008), Pisa, Italy, December 2008. IEEE Computer Society.
[27]
Y. Xu, K. Wang, A. W. C. Fu, and P. S. Yu. Anonymizing transaction databases for publication. In Proc. of the 14th ACM SIGKDD, August 2008.

Cited By

View all
  • (2024)Ensuring Security and Privacy Preservation for the Publication of Rating DatasetsSN Computer Science10.1007/s42979-024-02690-y5:4Online publication date: 27-Mar-2024
  • (2021)Privacy Preservation Techniques for Sequential Data ReleasingProceedings of the 12th International Conference on Advances in Information Technology10.1145/3468784.3470468(1-9)Online publication date: 29-Jun-2021
  • (2021)A Privacy Preservation Model for RFID Data-Collections is Highly Secure and More Efficient than LKC-PrivacyProceedings of the 12th International Conference on Advances in Information Technology10.1145/3468784.3469853(1-11)Online publication date: 29-Jun-2021
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SAC '09: Proceedings of the 2009 ACM symposium on Applied Computing
March 2009
2347 pages
ISBN:9781605581668
DOI:10.1145/1529282
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 March 2009

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. anonymity
  2. data mining
  3. information sharing
  4. privacy protection
  5. sensitive information

Qualifiers

  • Research-article

Funding Sources

Conference

SAC09
Sponsor:
SAC09: The 2009 ACM Symposium on Applied Computing
March 8, 2009 - March 12, 2008
Hawaii, Honolulu

Acceptance Rates

Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

Upcoming Conference

SAC '25
The 40th ACM/SIGAPP Symposium on Applied Computing
March 31 - April 4, 2025
Catania , Italy

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)12
  • Downloads (Last 6 weeks)1
Reflects downloads up to 13 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Ensuring Security and Privacy Preservation for the Publication of Rating DatasetsSN Computer Science10.1007/s42979-024-02690-y5:4Online publication date: 27-Mar-2024
  • (2021)Privacy Preservation Techniques for Sequential Data ReleasingProceedings of the 12th International Conference on Advances in Information Technology10.1145/3468784.3470468(1-9)Online publication date: 29-Jun-2021
  • (2021)A Privacy Preservation Model for RFID Data-Collections is Highly Secure and More Efficient than LKC-PrivacyProceedings of the 12th International Conference on Advances in Information Technology10.1145/3468784.3469853(1-11)Online publication date: 29-Jun-2021
  • (2021)Achieving Anonymization Constraints in High-Dimensional Data Publishing Based on Local and Global Data SuppressionsSN Computer Science10.1007/s42979-021-00936-73:1Online publication date: 23-Oct-2021
  • (2021)An Anatomization Model for Farmer Data CollectionsSN Computer Science10.1007/s42979-021-00740-32:5Online publication date: 23-Jun-2021
  • (2020)Achieving Privacy Preservation Constraints in Missing-Value DatasetsSN Computer Science10.1007/s42979-020-00241-91:4Online publication date: 4-Jul-2020
  • (2018)Privacy Preservation for Trajectory Data Publishing by Look-Up Table GeneralizationDatabases Theory and Applications10.1007/978-3-319-92013-9_2(15-27)Online publication date: 18-May-2018
  • (2017)Preserving mobile subscriber privacy in open datasets of spatiotemporal trajectoriesIEEE INFOCOM 2017 - IEEE Conference on Computer Communications10.1109/INFOCOM.2017.8056979(1-9)Online publication date: May-2017
  • (2017)Privacy Preservation for Trajectory Data Publishing and Heuristic ApproachAdvances in Network-Based Information Systems10.1007/978-3-319-65521-5_71(787-797)Online publication date: 24-Aug-2017
  • (2016)PPTDKnowledge-Based Systems10.1016/j.knosys.2015.11.00794:C(43-59)Online publication date: 15-Feb-2016
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media