Abstract
Trajectory data of mobile users contain plenty of sensitive spatial and temporal information, and can support many applications through data analysing and mining. However, re-identification attack and inference attack on such data may cause serious personal privacy leakage. Existing privacy preserving techniques cannot protect trajectory privacy well or largely scarify data utility. In view of these issues, in this paper we propose an enhanced trajectory privacy preserving method which can protect the trajectory privacy preferably while maintaining a high utility of the trajectory in data publishing. A mechanism is proposed to protect the privacy through replacing stop points in the trajectory and an effective trajectory reconstruction algorithm is introduced to avoid the mutations of trajectory, and also deal with the possible presence of obstacles around trajectories. The performance of our proposal is comprehensively evaluated on a real trajectory dataset. The results show that our method achieves a high privacy level and improves the utility of trajectory data greatly, compared with the state-of-the-art method.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Chen, R., Ács, G., Castelluccia, C.: Differentially private sequential data publication via variable-length n-grams. In: The ACM Conference on Computer and Communications Security, CCS 2012, Raleigh, NC, USA, 16–18 October 2012, pp. 638–649 (2012)
Chen, R., Fung, B.C.M., Desai, B.C., Sossou, N.M.: Differentially private transit data publication: a case study on the montreal transportation system. In: The 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2012, Beijing, China, 12–16 August 2012, pp. 213–221 (2012)
Gidófalvi, G., Huang, X., Pedersen, T.B.: Privacy: preserving trajectory collection. In: Proceedings of the 16th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, ACM-GIS 2008, Irvine, California, USA, 5–7 November 2008, p. 46 (2008)
Gkoulalas-Divanis, A., Verykios, V.S., Mokbel, M.F.: Identifying unsafe routes for network-based trajectory privacy. In: Proceedings of the SIAM International Conference on Data Mining, SDM 2009, Sparks, Nevada, USA, 30 April–2 May 2009, pp. 942–953 (2009)
Gruteser, M., Liu, X.: Protecting privacy in continuous location-tracking applications. IEEE Secur. Priv. 2(2), 28–34 (2004)
Huo, Z., Meng, X., Hu, H., Huang, Y.: You Can Walk Alone: trajectory privacy-preserving through significant stays protection. In: Lee, S., Peng, Z., Zhou, X., Moon, Y.-S., Unland, R., Yoo, J. (eds.) DASFAA 2012. LNCS, vol. 7238, pp. 351–366. Springer, Heidelberg (2012). doi:10.1007/978-3-642-29038-1_26
Luper, D., Cameron, D., Miller, J., Arabnia, H.R.: Spatial and temporal target association through semantic analysis and GPS data mining. In: Proceedings of the 2007 International Conference on Information and Knowledge Engineering, IKE 2007, Las Vegas, Nevada, USA, 25–28 June 2007, pp. 251–257 (2007)
Monreale, A., Trasarti, R., Renso, C., Pedreschi, D., Bogorny, V.: Preserving privacy in semantic-rich trajectories of human mobility. In: Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, SPRINGL 2010, San Jose, California, USA, 2 November 2010, pp. 47–54 (2010)
Naghizade, E., Kulik, L., Tanin, E.: Protection of sensitive trajectory datasets through spatial and temporal exchange. In: Conference on Scientific and Statistical Database Management, SSDBM 2014, Aalborg, Denmark, 30 June–02 July 2014, pp. 40:1–40:4 (2014)
Nergiz, M.E., Atzori, M., Saygin, Y., Güç, B.: Towards trajectory anonymization: a generalization-based approach. Trans. Data Priv. 2(1), 47–75 (2009)
Acknowledgments
This work is supported by the National Natural Science Foundation of China (grants No. 61672133 and No. 61632007), the Fundamental Research Funds for the Central Universities (grants No. ZYGX2015J058 and No. ZYGX2014Z007), and a project funded by the Priority Academic Program Development of Jiangsu Higher Education Institutions and Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Dai, Y., Shao, J. (2017). An Enhanced Method of Trajectory Privacy Preservation Through Trajectory Reconstruction. In: Sun, X., Chao, HC., You, X., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2017. Lecture Notes in Computer Science(), vol 10603. Springer, Cham. https://doi.org/10.1007/978-3-319-68542-7_19
Download citation
DOI: https://doi.org/10.1007/978-3-319-68542-7_19
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-68541-0
Online ISBN: 978-3-319-68542-7
eBook Packages: Computer ScienceComputer Science (R0)