Skip to main content

KUR-Algorithm: From Position to Trajectory Privacy Protection in Location-Based Applications

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 9262))

Abstract

Some obfuscation techniques may fail to protect user privacy because of the moving context as well as the background knowledge of adversaries. In this paper, we propose a novel scheme to distinctly protect user privacy not only from user position but also from user trajectory. Furthermore, we present kUR-algorithm, which is context-aware and can be employed as either an independent method or a supportive technique, to give the high-level user privacy protection against privacy disclosure and privacy leak. Last but not least, we analyse other potential privacy problems which usually emerge as outliers and show how well our proposed solution overcomes these scenarios.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Abul, O., Bonchi, F., Nanni, M.: Never walk alone: uncertainty for anonymity in moving objects databases. In: Proceedings of the IEEE 24th International Conference on Data Engineering, pp. 376–385 (2008)

    Google Scholar 

  2. Chen, J., Meng, X.: Indexing future trajectories of moving objects in a constrained network. J. Comput. Sci. Technol. 22(2), 245–251 (2007)

    Article  MATH  Google Scholar 

  3. Chow, C.Y., Mokbel, M.F.: Trajectory privacy in location-based services and data publication. SIGKDD Explor. Newsl. 13(1), 19–29 (2011)

    Article  Google Scholar 

  4. Divanis, A.G., Verykios, V.S., Mokbel, M.F.: Identifying unsafe routes for network-based trajectory privacy. In: Proceedings of the SIAM International Conference on Data Mining, pp. 942–953 (2009)

    Google Scholar 

  5. Fung, B.C.M., Chen, K.W.R., Yu, P.S.: Privacy-preserving data publishing: a survey of recent developments. ACM Comput. Surv. 42(4), 1–53 (2010)

    Article  Google Scholar 

  6. Gao, S., Ma, J., Shi, W., Zhan, G., Sun, C.: TrPF: a trajectory privacy-preserving framework for participatory sensing. IEEE Trans. Inf. Forensics Secur. 8(6), 874–887 (2013)

    Article  Google Scholar 

  7. Ghinita, G.: Private queries and trajectory anonymization: a dual perspective on location privacy. Trans. Data Priv. 2(1), 3–19 (2009)

    MathSciNet  Google Scholar 

  8. Hilbert, D.: Über die stetige Abbildung einer Linie auf ein Flächenstück. Math. Ann. 38, 459–460 (1891)

    Article  MathSciNet  MATH  Google Scholar 

  9. Huo, Z., Meng, X., Hu, H., Huang, Y.: You can walk alone: trajectory privacy-preserving through significant stays protection. In: Proceedings of the 17th International Conference on Database Systems for Advanced Applications, pp. 351–366 (2012)

    Google Scholar 

  10. Kaplan, E., Pedersen, T.B., Savas, E., Saygın, Y.: Discovering private trajectories using background information. J. Data Knowl. Eng. 69(7), 723–736 (2010)

    Article  Google Scholar 

  11. Lin, D., Bertino, E., Cheng, R., Prabhakar, S.: Location privacy in moving-object environments. Trans. Data Priv. 2(1), 21–46 (2009)

    MathSciNet  MATH  Google Scholar 

  12. Liu, L.: From data privacy to location privacy: models and algorithms. In: Proceedings of the 33rd International Conference on Very Large Databases, pp. 1429–1430 (2007)

    Google Scholar 

  13. Liu, X., Karimi, H.A.: Location awareness through trajectory prediction. In: Proceedings of Computers, Environment and Urban Systems, pp. 741–756 (2006)

    Google Scholar 

  14. Nergiz, M.E., Atzori, M., Saygin, Y.: Towards trajectory anonymization: a generalization-based approach. In: Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS (2008)

    Google Scholar 

  15. Phan, T.N., Dang, T.K.: A novel trajectory privacy-preserving future time index structure in moving object databases. In: Proceedings of the 4th International Conference on Computational Collective Intelligence Technologies and Applications, Part I, pp. 124–134 (2012)

    Google Scholar 

  16. Phan, T.N., Dang, T.K., Küng, J.: User privacy protection from trajectory perspective in location-based applications. In: Proceedings of the 19th Interdisciplinary Information Management Talks, Jindřichův Hradec, Czech Republic, pp. 281–288 (2011)

    Google Scholar 

  17. Samarati, P., Sweeney, L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical report, SRI-CSL-98–04, SRI Computer Science Laboratory (1998)

    Google Scholar 

  18. Shokri, R., Theodorakopoulos, G., Le Boudec, J.-Y., Hubaux J.-P.: Quantifying location privacy. In: Proceedings of the 2011 IEEE Symposium on Security and Privacy, pp. 247–262 (2011)

    Google Scholar 

  19. To, Q.C., Dang, T.K., Küng, J.: A Hilbert-based framework for preserving privacy in location-based services. Int. J. Intell. Inf. Database Syst. 7(2), 113–134 (2013)

    Google Scholar 

  20. Xu, T., Cai, Y.: Exploring historical location data for anonymity preservation in location-based services. In: Proceedings of the 27th IEEE International Conference on Computer Communications (2008)

    Google Scholar 

  21. Yigitoglu, E., Damiani, M.L., Abul, O., Silvestri, C.: Privacy-preserving sharing of sensitive semantic locations under road-network constraints. In: Proceedings of the IEEE 13th International Conference on Mobile Data Management, pp. 186–195 (2012)

    Google Scholar 

  22. You, T.H., Peng, W.C., Lee, W.C.: Protecting moving trajectories with dummies. In: Proceedings of the 2007 International Conference on Mobile Data Management, pp. 278–282 (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Trong Nhan Phan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Phan, T.N., Küng, J., Dang, T.K. (2015). KUR-Algorithm: From Position to Trajectory Privacy Protection in Location-Based Applications. In: Chen, Q., Hameurlain, A., Toumani, F., Wagner, R., Decker, H. (eds) Database and Expert Systems Applications. Globe DEXA 2015 2015. Lecture Notes in Computer Science(), vol 9262. Springer, Cham. https://doi.org/10.1007/978-3-319-22852-5_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-22852-5_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-22851-8

  • Online ISBN: 978-3-319-22852-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics