Abstract
Some obfuscation techniques may fail to protect user privacy because of the moving context as well as the background knowledge of adversaries. In this paper, we propose a novel scheme to distinctly protect user privacy not only from user position but also from user trajectory. Furthermore, we present kUR-algorithm, which is context-aware and can be employed as either an independent method or a supportive technique, to give the high-level user privacy protection against privacy disclosure and privacy leak. Last but not least, we analyse other potential privacy problems which usually emerge as outliers and show how well our proposed solution overcomes these scenarios.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Abul, O., Bonchi, F., Nanni, M.: Never walk alone: uncertainty for anonymity in moving objects databases. In: Proceedings of the IEEE 24th International Conference on Data Engineering, pp. 376–385 (2008)
Chen, J., Meng, X.: Indexing future trajectories of moving objects in a constrained network. J. Comput. Sci. Technol. 22(2), 245–251 (2007)
Chow, C.Y., Mokbel, M.F.: Trajectory privacy in location-based services and data publication. SIGKDD Explor. Newsl. 13(1), 19–29 (2011)
Divanis, A.G., Verykios, V.S., Mokbel, M.F.: Identifying unsafe routes for network-based trajectory privacy. In: Proceedings of the SIAM International Conference on Data Mining, pp. 942–953 (2009)
Fung, B.C.M., Chen, K.W.R., Yu, P.S.: Privacy-preserving data publishing: a survey of recent developments. ACM Comput. Surv. 42(4), 1–53 (2010)
Gao, S., Ma, J., Shi, W., Zhan, G., Sun, C.: TrPF: a trajectory privacy-preserving framework for participatory sensing. IEEE Trans. Inf. Forensics Secur. 8(6), 874–887 (2013)
Ghinita, G.: Private queries and trajectory anonymization: a dual perspective on location privacy. Trans. Data Priv. 2(1), 3–19 (2009)
Hilbert, D.: Über die stetige Abbildung einer Linie auf ein Flächenstück. Math. Ann. 38, 459–460 (1891)
Huo, Z., Meng, X., Hu, H., Huang, Y.: You can walk alone: trajectory privacy-preserving through significant stays protection. In: Proceedings of the 17th International Conference on Database Systems for Advanced Applications, pp. 351–366 (2012)
Kaplan, E., Pedersen, T.B., Savas, E., Saygın, Y.: Discovering private trajectories using background information. J. Data Knowl. Eng. 69(7), 723–736 (2010)
Lin, D., Bertino, E., Cheng, R., Prabhakar, S.: Location privacy in moving-object environments. Trans. Data Priv. 2(1), 21–46 (2009)
Liu, L.: From data privacy to location privacy: models and algorithms. In: Proceedings of the 33rd International Conference on Very Large Databases, pp. 1429–1430 (2007)
Liu, X., Karimi, H.A.: Location awareness through trajectory prediction. In: Proceedings of Computers, Environment and Urban Systems, pp. 741–756 (2006)
Nergiz, M.E., Atzori, M., Saygin, Y.: Towards trajectory anonymization: a generalization-based approach. In: Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS (2008)
Phan, T.N., Dang, T.K.: A novel trajectory privacy-preserving future time index structure in moving object databases. In: Proceedings of the 4th International Conference on Computational Collective Intelligence Technologies and Applications, Part I, pp. 124–134 (2012)
Phan, T.N., Dang, T.K., Küng, J.: User privacy protection from trajectory perspective in location-based applications. In: Proceedings of the 19th Interdisciplinary Information Management Talks, Jindřichův Hradec, Czech Republic, pp. 281–288 (2011)
Samarati, P., Sweeney, L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical report, SRI-CSL-98–04, SRI Computer Science Laboratory (1998)
Shokri, R., Theodorakopoulos, G., Le Boudec, J.-Y., Hubaux J.-P.: Quantifying location privacy. In: Proceedings of the 2011 IEEE Symposium on Security and Privacy, pp. 247–262 (2011)
To, Q.C., Dang, T.K., Küng, J.: A Hilbert-based framework for preserving privacy in location-based services. Int. J. Intell. Inf. Database Syst. 7(2), 113–134 (2013)
Xu, T., Cai, Y.: Exploring historical location data for anonymity preservation in location-based services. In: Proceedings of the 27th IEEE International Conference on Computer Communications (2008)
Yigitoglu, E., Damiani, M.L., Abul, O., Silvestri, C.: Privacy-preserving sharing of sensitive semantic locations under road-network constraints. In: Proceedings of the IEEE 13th International Conference on Mobile Data Management, pp. 186–195 (2012)
You, T.H., Peng, W.C., Lee, W.C.: Protecting moving trajectories with dummies. In: Proceedings of the 2007 International Conference on Mobile Data Management, pp. 278–282 (2007)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Phan, T.N., Küng, J., Dang, T.K. (2015). KUR-Algorithm: From Position to Trajectory Privacy Protection in Location-Based Applications. In: Chen, Q., Hameurlain, A., Toumani, F., Wagner, R., Decker, H. (eds) Database and Expert Systems Applications. Globe DEXA 2015 2015. Lecture Notes in Computer Science(), vol 9262. Springer, Cham. https://doi.org/10.1007/978-3-319-22852-5_8
Download citation
DOI: https://doi.org/10.1007/978-3-319-22852-5_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-22851-8
Online ISBN: 978-3-319-22852-5
eBook Packages: Computer ScienceComputer Science (R0)