Skip to main content

Privacy Preserving in the Publication of Large-Scale Trajectory Databases

  • Conference paper
  • First Online:
Big Data Computing and Communications (BigCom 2016)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 9784))

Included in the following conference series:

Abstract

In recent years, preserving individual privacy when publishing trajectory data receives increasing attention. However, the existing trajectory data privacy preserving techniques cannot resolve the anonymous issues of large-scale trajectory databases. In traditional clustering constraint based trajectory privacy preserving algorithms, the anonymous groups lack of diversity and they cannot effectively prevent re-clustering attacks against the characteristics of publishing data. In this thesis, a segment clustering based privacy preserving algorithm is proposed. Firstly, the original database is divided into blocks and each block is treated as a separate database. Then, the trajectories in each block are partitioned into segments based on the minimum description length principle. Lastly, these segments are anonymized with cluster-constraint strategy. Experimental results show that the proposed algorithm can improve the safety and have good performance in data quality and anonymous efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Elahe, G.K., Mahdi, A., Fatemeh, D.: PPTD: preserving personalized privacy in trajectory data publishing by sensitive attribute generalization and trajectory local suppression. Knowl.-Based Syst. 94, 43–59 (2016)

    Article  Google Scholar 

  2. Huo, Z., Meng, X.F.: A survey of trajectory privacy preserving techniques. Chin. J. Comput. 34(10), 1820–1830 (2011)

    Article  Google Scholar 

  3. Chen, R., Xiao, Q., Zhang, Y.: Differentially private high-dimensional data publication via sampling-based inference. In: 21st ACM SIGKDD Conference on Knowledge Discovery and Data Mining (SIGKDD), pp. 129–138. ACM Press, Sydney (2015)

    Google Scholar 

  4. Parmar, S., Gupta, M.P.: A comparative study and literature survey on privacy preserving data mining techniques. Int. J. Comput. Sci. Mob. Comput. 4(4), 480–486 (2015)

    Google Scholar 

  5. Zhang, L., Cormode, G., Procopiuc, C.M., Srivastava, D.: PrivBayes: private data release via Bayesian networks. In: ACM SIGMOD International Conference on Management of Data, pp. 1423–1434. ACM Press, Snowbird (2014)

    Google Scholar 

  6. Gidofalvi, G., Huang, X., Pedersen, T.B: Privacy-preserving data mining on moving object trajectories. In: International Conference on Mobile Data Management, pp. 60–68. IEEE Press, Mannheim (2007)

    Google Scholar 

  7. Yarovoy, R., Bonchi, F., Lakshmanan, L.V.S.: Anonymizing moving objects: how to hide a MOB in a crowd. In: 12th International Conference on Extending Database Technology, pp. 72–83. ACM Press, Saint Petersburg (2009)

    Google Scholar 

  8. Hoh, B., Gruteser, M., Xiong, H.: Achieving guaranteed anonymity in GPS Traces via uncertainty-aware path cloaking. IEEE Trans. Mob. Comput. 9(8), 1089–1107 (2010)

    Article  Google Scholar 

  9. Nergiz, M.E., Atzori, M., Saygin, Y.: Towards trajectory anonymization: a generalization-based approach. In: SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS, pp. 52–61. ACM Press, Irvine (2008)

    Google Scholar 

  10. Abul, O., Bonchi, F., Nanni, M.: Anonymization of moving objects databases by clustering and perturbation. Inf. Syst. 35(8), 884–910 (2010)

    Article  Google Scholar 

  11. Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl.-Based Syst. 10(5), 557–570 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  12. Arunkuma, S., Srivatsac, M., Rajarajan, M.: A review paper on preserving privacy in mobile environments. J. Netw. Comput. Appl. 53, 74–90 (2015)

    Article  Google Scholar 

  13. Abul, O., Bonchim, F., Nanni, M.: Never walk alone: uncertainty for anonymity in moving objects databases. In: 24th IEEE International Conference on Data Engineering (ICDE 2008), pp. 376–385. IEEE Press, Cancún (2008)

    Google Scholar 

  14. Khalil, A.H., Benjamin, C.M.F., William, K.C.: Privacy-preserving trajectory stream publishing. Data Knowl. Eng. 94, 89–109 (2014)

    Article  Google Scholar 

  15. Sashi, G.R., Dan, L., Wei, J., Ali, H., Rui, Z.: Traffic information publication with privacy preservation. ACM Trans. Intell. Syst. Technol. 5(3), 1–26 (2014)

    Article  Google Scholar 

  16. Grunwald, P.D., Myung, I.J., Pitt, M.A.: Advances in Minimum Description Length: Theory and Applications, pp. 20–28. MIT Press, Cambridge (2005)

    Google Scholar 

  17. Brinkhoff, T.: Generating traffic data. IEEE Data Eng. Bull. 26(2), 19–25 (2003)

    Google Scholar 

Download references

Acknowledgement

This work is supported by Fundamental Research Funds for the Central Universities (N130316001, N140404006) and the National Natural Science Foundation of China under Grant No. 61173027.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fengyun Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Li, F., Gao, F., Yao, L., Pan, Y. (2016). Privacy Preserving in the Publication of Large-Scale Trajectory Databases. In: Wang, Y., Yu, G., Zhang, Y., Han, Z., Wang, G. (eds) Big Data Computing and Communications. BigCom 2016. Lecture Notes in Computer Science(), vol 9784. Springer, Cham. https://doi.org/10.1007/978-3-319-42553-5_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-42553-5_31

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-42552-8

  • Online ISBN: 978-3-319-42553-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics