Microsoft Word - Task9.1DHD.docx SIT719 Security and Privacy Issues in Analytics Distinction/High Distinction Task 9.1: Location-based Privacy Protection Overview Trajectory data is powerful to many...

1 answer below »
quote for this assignment



Microsoft Word - Task9.1DHD.docx SIT719 Security and Privacy Issues in Analytics Distinction/High Distinction Task 9.1: Location-based Privacy Protection Overview Trajectory data is powerful to many crowdsourcing tasks. For example, Uber and other services use the drivers’ geolocation to match the client’s requests. However, there are serious concerns about the privacy of publishing the geolocation data. In this Distinction/Higher Distinction Task, you will experiment with Machine Learning classification algorithms. Please see more details in the Task description. Before attempting this task, please make sure you are already up to date with all previous Credit and Pass tasks. Task Description Instructions: Suppose that you are hired by a large company that uses the user’s geolocation data as references for allocating crowdsourcing tasks. The company has developed good algorithms for allocating tasks based on accurate geolocation data. One of the new business requirements is that the client can visualize a few nearby crowdsourcing works before the client finalizes the order. Displaying the geolocation on google maps and alike services is doable. However, the data is sensitive and cannot be directly disclosed to the clients. Therefore, the boss has requested you to develop a demo system to protect the privacy of the geolocation data. Since this is a demo system, the famous dataset named “Gowalla” is provided to simulate the crowdsourcing workers, which is available at https://snap.stanford.edu/data/loc-gowalla.html. The Gowalla dataset consists of multiple users’ check-in data with timestamps in five columns, some sample data look like this: [user] [check-in time] [latitude] [longitude] [location id] 196514 2010-07-24T13:45:06Z 53.3648119 -2.2723465833 145064 196514 2010-07-24T13:44:58Z 53.360511233 -2.276369017 1275991 196514 2010-07-24T13:44:46Z 53.3653895945 -2.2754087046 376497 196514 2010-07-24T13:44:38Z 53.3663709833 -2.2700764333 98503 196514 2010-07-24T13:44:26Z 53.3674087524 -2.2783813477 1043431 196514 2010-07-24T13:44:08Z 53.3675663377 -2.278631763 881734 196514 2010-07-24T13:43:18Z 53.3679640626 -2.2792943689 207763 196514 2010-07-24T13:41:10Z 53.364905 -2.270824 1042822 You will need to download the dataset, familiarize with it before performing the following actions: 1. Find three privacy protection methods to protect location-based data from at least three published papers, including the papers published on arxiv.org. 2. Write a short literature review (approximately 500 words) to compare the identified methods in at least three aspects that are relevant to data privacy and utility. 3. Identify meaningful performance metrics based on your critical literature review and comparison before proposing how to measure these metrics. 4. Implement or apply the existing implementations of privacy protection methods on the Gowalla dataset. 5. Report the performance metrics that are identified in Step 3. 6. Demonstrate the proposed solutions with a few case studies using Google maps. A simple illustration of your demo may look like the following, where Pi are the crowdsourcing workers, ai are the clients: Once you have completed the above steps of the project, you need to deliver the outcome. In real-world, results are typically delivered as a product/tool/web-app or through a presentation or by submitting the report. However, in our unit, we will consider a report and a demo only. Here, you need to write a report (at least 2,000 word including the above-mentioned literature review) based on the outcome and results you obtained by performing the above steps. The report will describe the literature review, the algorithms used, their working principle, key parameters, and the results. Results should consider all the key performance measures and comparative results in the form of tables, graphs, etc. The demo should be a 5-minute long pre- recorded presentation. Submit the PDF report and the demo PPT through onTrack. You also need to submit the code separately (within the “Code for task 9.1” folder) under the assignment tab of the CloudDeakin Python script during submission. Marking Rubric: Criteria Unsatisfactory – Beginning Developing Accomplished Exemplary Tot al Report Focus: Purpose/ Position Stateme nt 0-7 points 8-11 points 12-15 points 16-20 points /20 Fails to clearly relate the report topic or is not clearly defined and/or the report lacks focus throughout. The report is too broad in scope (outside of the title topic) and/or the report is somewhat unclear and needs to be developed further. Focal point is not consistently maintained throughout the report. The report provides adequate direction with some degree of interest for the reader. The report states the position, and maintains the focal point of the analysis for the most part. The report provides direction for the discussion part of the analysis that is engaging and thought provoking, The report clearly and concisely states the position, and consistently maintain the focal point. Compar ative analysis and Discussi on 0-15 points 16-20 points 21-24 points 25-30 points /30 Demonstrates a lack of understanding and inadequate knowledge of the topic. Analysis is very superficial and contains flaws. The report is also not clear. Demonstrates general understanding of python scripting. Analysis is good and has addressed all criteria. Comparative analysis is presented. Sufficient discussion is also presented. Demonstrates good level of understanding of python scripting. Algorithms are fine-tuned and comprise good selection of algorithms. Comparative results are presented using standard performance measures. Demonstrates superior level of understanding of python scripting and algorithms. Algorithms are fine-tuned with some novelty or hybridization or advanced and/or recent algorithm. Comparative results are presented using performance measures in a way that it provides very clear and meaningful insights of the output. Demonst ration 0-6 points 7-11 points 12-15 points 16-20 points /20 Demonstration lacks coherent ideas and fails to demonstrate a working system. Demonstration includes a working system, however, the benefits of privacy protection are not clearly presented. Demo is working and clearly explained, however, there might be occasional mistakes or difficult points to understand. Professionally conducted demo, free from errors, excellent talk with deep knowledge on privacy protection for location data. Writing Quality & Adheren ce to Format Guidelin es 0-10 points 11-17 points 18-21 points 22-30 points /30 Report shows a below average/poor writing style lacking in elements of appropriate standard English. Frequent errors in spelling, grammar, punctuation, spelling, usage, and/or formatting. Report shows an average and/or casual writing style using standard English. Some errors in spelling, grammar, punctuation, usage, and/or formatting. Report shows above average writing style (can be considered good) and clarity in writing using standard English. Minor errors in grammar, punctuation, spelling, usage, and/or formatting. Author has demonstrated the use of scientific language and results are well explained. Article is well written and clear and standard English characterized by elements of a strong writing style. Basically free from grammar, punctuation, spelling, usage, or formatting errors. Author has demonstrated advanced use of scientific language and results are well explained with insights. Rubric adopted from: Denise Kreiger, Instructional Design and Technology Services, SC&I, Rutgers University, 4/2014
Answered 9 days AfterMay 16, 2021SIT719

Answer To: Microsoft Word - Task9.1DHD.docx SIT719 Security and Privacy Issues in Analytics Distinction/High...

Neha answered on May 25 2021
159 Votes
Location Privacy Methods
Location Privacy Methods
Submitted By:-
Introduction
There is development for the positioning technology and application was also obtained for the utilization of location information system anytime and anywhere.
It is also
known for providing the location-based services for different users.
As per the current location-based service framework the users are using their mobile phones and the other smart devices for sharing their location information and also query request over the location-based services server.
The location-based services are known for providing different types of the Information Services on the basis of the location coordination of each user. In the recent years there has been rapid development for the mobile terminals and different types of the mobile applications have been utilised. At the same time there is development for the positioning technology and application was also obtained for the utilization of location information system anytime and anywhere. It is also known for providing the location-based services for different users. As per the current location-based service framework the users are using their mobile phones and the other smart devices for sharing their location information and also query request over the location-based services server. After this the server will return location-based service as per the location of the user. Generally, this application includes the interest point queries and also the route navigation like the query for nearest bank and checking for the nearest waking waiting side etc.
2
Related Work
The largest threat for the location-based services is the privacy threat and it has major impact over the users on the basis of space and time. There can be space reasoning attacks because the location information about the user can be leaked. Currently there are many different types of the researchers which have published their summaries above the privacy protection for the location-based services. On the basis of location-based services for the privacy protection the major aim it's to utilise the privacy protection technology which can make it difficult for the attackers to find out information about the exact location of the users which are performed under the location-based system services and this can be applied under different normal cases. We can divide the main method into deception of location former data encryption, regional coverage and few other methods.
3
Currently there are many different types of the...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here