Abstract
With the increasing of location-aware devices, it is easy to collect the trajectory of a person which can be represented as a sequence of visited locations with regard to timestamps. For some applications such as traffic management and location-based advertising, the trajectory data may need to be published with other private information. However, revealing the private trajectory and sensitive information of user poses privacy concerns especially when an adversary has the background knowledge of target user, i.e., partial trajectory information. In general, data transformation is needed to ensure privacy preservation before data releasing. Not only the privacy has to be preserved, but also the data quality issue must be addressed, i.e., the impact on data quality after the transformation should be minimized. LKC-privacy model is a well-known model to anonymize the trajectory data that are published with the sensitive information. However, computing the optimal LKC-privacy solution on trajectory data by the brute-force (BF) algorithm with full-domain generalization technique is highly time-consuming. In this paper, we propose a look-up table brute-force (LT-BF) algorithm to preserve privacy and maintain the data quality based on LKC-privacy model in the scenarios which the generalization technique is applied to anonymize the trajectory data efficiently. Subsequently, our proposed algorithm is evaluated with experiments. The results demonstrate that our proposed algorithm is not only returns the optimal solution as the BF algorithm, but also it is highly efficient.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Mohammed, N., Fung, B.C.M., Debbabi, M.: Walking in the crowd: anonymizing trajectory data for pattern analysis. In: Proceeding of the 18th ACM Conference on Information and Knowledge Management, pp. 1441–1444 (2009)
Fung, B.C.M., Wang, K., Chen, R., Yu, P.S.: Privacy-preserving data publishing: a survey of recent developments. ACM Comput. Surv. 42, 1–53 (2010)
Mohammed, N., Fung, B.C.M., Lee, C.K.: Centralized and distributed anonymization for high-dimensional healthcare data. ACM Trans. Knowl. Discov. Data 4, 1–33 (2010)
Chen, R., Fung, B.C., Mohammed, N., Desai, B.C., Wang, K.: Privacy-preserving trajectory data publishing by local suppression. Inf. Sci. 231, 83–97 (2013)
Ghasemzadeh, M., Fung, B.C.M., Chen, R., Awasthi, A.: Anonymizing trajectory data for passenger flow analysis. Transp. Res. Part C: Emerg. Technol. 39, 63–79 (2014)
Bangkok Insurance: Data security policy. http://www.bangkokinsurance.com/service/service_privacy.php (2015)
O’Halloran, M., Glavin, M.: RFID patient tagging and database system. In: International Conference on Networking, Systems, Mobile Communications and Learning Technologies, p. 162 (2006)
Robin, D., Saravanan, S., Wanlei, Z.: A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems. Ad Hoc Netw. 11, 383–396 (2013)
Zhu, T., Xiong, P., Li, G.K., Zhou, W.: Correlated differential privacy: hiding information in non-IID data set. IEEE Trans. Inf. Forensics Secur. 10, 229–242 (2015)
Fung, B., Al-Hussaeni, K., Cao, M.: Preserving RFID data privacy. In: 2009 IEEE International Conference on RFID, pp. 200–207 (2009)
Fung, B.C.M., Cao, M., Desai, B.C., Xu, H.: Privacy protection for RFID data. In: Proceedings of the ACM Symposium on Applied Computing, pp. 1528–1535 (2009)
Al-Hussaeni, K., Fung, B.C., Cheung, W.K.: Privacy-preserving trajectory stream publishing. Data Knowl. Eng. 94, 89–109 (2014)
Harnsamut, N., Natwichai, J.: Privacy preservation for trajectory data publishing and heuristic approach. In: Barolli, L., Enokido, T., Takizawa, M. (eds.) NBiS 2017. LNDECT, vol. 7, pp. 787–797. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-65521-5_71
Wong, R., Li, J., Fu, A., Wang, K.: (\(\alpha \), K)-anonymous data publishing. J. Intell. Inf. Syst. 33, 209–234 (2009)
Mohammed, N., Fung, B.C.M., Debbabi, M.: Preserving privacy and utility in RFID data publishing. Technical report 6850 (2010)
Komishani, E.G., Abadi, M., Deldar, F.: PPTD: preserving personalized privacy in trajectory data publishing by sensitive attribute generalization and trajectory local suppression. Knowl.-Based Syst. 94, 43–59 (2016)
Aggarwal, C.C.: On K-anonymity and the curse of dimensionality. In: Proceedings of the 31st International Conference on Very Large Databases, pp. 901–909 (2005)
Acknowledgment
This work was supported by the Graduate School, Chiang Mai University, Thailand.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this paper
Cite this paper
Harnsamut, N., Natwichai, J., Riyana, S. (2018). Privacy Preservation for Trajectory Data Publishing by Look-Up Table Generalization. In: Wang, J., Cong, G., Chen, J., Qi, J. (eds) Databases Theory and Applications. ADC 2018. Lecture Notes in Computer Science(), vol 10837. Springer, Cham. https://doi.org/10.1007/978-3-319-92013-9_2
Download citation
DOI: https://doi.org/10.1007/978-3-319-92013-9_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-92012-2
Online ISBN: 978-3-319-92013-9
eBook Packages: Computer ScienceComputer Science (R0)