Privacy of Location Trajectory
نویسندگان
چکیده
The ubiquity of mobile devices with global positioning functionality (e.g., GPS and Assisted GPS) and Internet connectivity (e.g., 3G and Wi-Fi) has resulted in widespread development of location-based services (LBS). Typical examples of LBS include local business search, e-marketing, social networking, and automotive traffic monitoring. Although LBS provide valuable services for mobile users, revealing their private locations to potentially untrusted LBS service providers pose privacy concerns. In general, there are two types of LBS, namely, snapshot and continuous LBS. For snapshot LBS, a mobile user only needs to report its current location to a service provider once to get its desired information. On the other hand, a mobile user has to report its location to a service provider in a periodic or on-demand manner to obtain its desired continuous LBS. Protecting user location privacy for continuous LBS is more challenging than snapshot LBS because adversaries may use the spatial and temporal correlations in the user’s a sequence of location samples to infer the user’s location information with a higher degree of certainty. Such user location trajectories are also very important for many applications, e.g., business analysis, city planning, and intelligent transportation. However, publishing original location trajectories to the public or a third party for data analysis could pose serious privacy concerns. Privacy protection in continuous LBS and trajectory data publication has increasingly drawn attention from the research community and industry. In this chapter, we describe the state-of-the-art privacy-preserving techniques for continuous LBS and trajectory publication. Chi-Yin Chow Department of Computer Science, City University of Hong Kong, Hong Kong, China, e-mail: [email protected] Mohamed F. Mokbel Department of Computer Science and Engineering, University of Minnesota Twin Cities, MN, USA, e-mail: [email protected]
منابع مشابه
Lclean: A Plausible Approach to Individual Trajectory Data Sanitization
In recent years, with the continuous development of significant data industrialization, trajectory data have more and more critical analytical value for urban construction and environmental monitoring. However, the trajectory contains a lot of personal privacy, and rashly publishing trajectory data set will cause serious privacy leakage risk. At present, the privacy protection of trajectory dat...
متن کاملLTPPM: a location and trajectory privacy protection mechanism in participatory sensing
The ubiquity of mobile devices has facilitated the prevalence of participatory sensing, whereby ordinary citizens use their private mobile devices to collect regional information and to share with participators. However, such applications may endanger the users’ privacy by revealing their locations and trajectories information. Most of existing solutions, which hide a user’s location informatio...
متن کاملTrPLS: Preserving Privacy in Trajectory Data Publishing by Personalized Local Suppression
Trajectory data are becoming more popular due to the rapid development of mobile devices and the widespread use of location-based services. They often provide useful information that can be used for data mining tasks. However, a trajectory database may contain sensitive attributes, such as disease, job, and salary, which are associated with trajectory data. Hence, improper publishing of the tra...
متن کاملIdentifying Unsafe Routes for Network-Based Trajectory Privacy
In this paper, we propose a privacy model that offers trajectory privacy to the requesters of Location-Based Services (LBSs), by utilizing an underlying network of user movement. The privacy model has been implemented as a framework that (i) reconstructs the user movement from a series of independent location updates, (ii) identifies routes where user privacy is at risk, and (iii) anonymizes on...
متن کاملDifferentially Private Trajectory Data Publication
With the increasing prevalence of location-aware devices, trajectory data has been generated and collected in various application domains. Trajectory data carries rich information that is useful for many data analysis tasks. Yet, improper publishing and use of trajectory data could jeopardize individual privacy. However, it has been shown that existing privacy-preserving trajectory data publish...
متن کاملEvaluating data utility of privacy-preserving pseudonymized location datasets
Pseudonymization is an effective way to publish a location dataset with trajectory information in a privacy-preserving way. We previously proposed a technique of randomly exchanging multiple users’ pseudonyms at a mix zone where the users meet at the same time to prevent an adversary from reidentifying multiple trajectory segments of a target user. However, such a segmentation technique essenti...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012