skip to main content
10.1145/1850822.1850824acmconferencesArticle/Chapter ViewAbstractPublication PagesmodConference Proceedingsconference-collections
research-article

An online framework for publishing privacy-sensitive location traces

Published: 06 June 2010 Publication History

Abstract

This paper studies the problem of protecting individual privacy when continuously publishing a stream of location trace data collected from a population of users. Fundamentally, this leads to the new challenge of anonymizing data that evolves in predictable ways over time. Our main technical contribution is a novel formal framework for reasoning about privacy in this setting. We articulate a new privacy principle called temporal unlinkability. Then, by incorporating a probabilistic model of data change (in this case, user motion), we are able to quantify the risk of privacy violations. Within this framework, we develop an initial set of algorithms for continuous privacy-preserving publishing. Finally, our experiments demonstrate the shortcomings of previous publishing techniques that do not account for inference based on predictable data change, and they demonstrate the feasibility of the new approach.

References

[1]
O. Abul, F. Bonchi, and M. Nanni. Never walk alone: Uncertainty for anonymity in moving objects databases. In ICDE, 2008.
[2]
C. Aggarwal and P. Yu. A condensation approach to privacy-preserving data mining. In EDBT, 2004.
[3]
G. Aggarwal, T. Feder, K. Kenthapadi, R. Panigrahy, D. Thomas, and A. Zhu. Achieving anonymity via clustering in a metric space. In PODS, 2006.
[4]
A. Beresford and F. Stajano. Location privacy in pervasive computing. IEEE Pervasive Computing, 2003.
[5]
C. Bettini, X. S. Wang, and S. Jajodia. Protecting privacy against location-based personal identification. In VLDB Workshop on Secure Data Management, 2005.
[6]
T. Brinkhoff. A framework for generating network-based moving objects. GeoInformatica, 6(2), 2002.
[7]
J. Byun, Y. Sohn, E. Bertino, and N. Li. Secure anonymization for incremental datasets. In SIAM Data Mining, 2006.
[8]
C.-Y. Chow and M. Mokbel. Enabling private continuous queries for revealed user locations. In Advances in Spatial and Temporal Databases, 2007.
[9]
B. Fung, K. Wang, A. Fu, and J. Pei. Anonymity for continuous data publishing. In EDBT, 2008.
[10]
B. Gedik and L. Liu. Location privacy in mobile systems: A personalized approach. In ICDCS, 2005.
[11]
G. Ghinita, M. Damiani, C. Silvestri, and E. Bertino. Preventing velocity-based linkage attacks in location-aware applications. In ACM GIS, 2009.
[12]
G. Ghinita, P. Kalnis, and S. Skiadopoulis. Prive: Anonymous location-based queries in distributed mobile systems. In WWW, 2007.
[13]
A. Gkoulalas-Divanis, V. Verykios, and M. Mokbel. Identifying unsafe routes for network-based trajectory privacy. In SIAM Data Mining, 2009.
[14]
M. Gruteser and D. Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In Conference on Mobile Systems, Applications and Services, 2003.
[15]
M. Gruteser and B. Hoh. On the anonymity of periodic location samples. In Proceedings of the Second International Conference on Security in Pervasive Computing, 2005.
[16]
R. H. Güting and M. Schneider. Moving Objects Databases. Morgan Kaufmann, San Francisco, 2005.
[17]
B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady. Preserving privacy in GPS traces via uncertainty-aware path cloaking. In CCS, 2007.
[18]
H. Jeung, Q. Liu, H. T. Shen, and X. F. Zhou. A hybrid prediction model for moving objects. In ICDE, 2008.
[19]
W. Jin, K. LeFevre, and J. Patel. An online framework for publishing dynamic privacy-sensitive location traces. University of Michigan Tech. Report CSE-TR-553-09, 2009.
[20]
P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias. Preventing location-based identity inference on anonymous spatial queries. IEEE Transactions on Knowledge and Data Engineering, 19(12), 2007.
[21]
J. Krumm. Inference attacks on location tracks. In Pervasive, 2007.
[22]
K. LeFevre, D. DeWitt, and R. Ramakrishnan. Mondrian multidimensional k-anoymity. In ICDE, 2006.
[23]
A. Machanvajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam. l-diversity: Privacy beyond k-anonymity. In ICDE, 2006.
[24]
M. Mokbel, C. Chow, and W. Aref. The new casper: Query processing for location services without compromising privacy. In VLDB, 2006.
[25]
M. E. Nergiz, M. Atzori, and Y. Saygin. Toward trajectory anonymization: A generalization-based approach. In 2nd SIGSPATIAL ACM GIS International Workshop on Security and Privacy in GIS and LBS, 2008.
[26]
P. Samarati. Protecting respondants' identities in microdata release. IEEE Transactions on Knowledge and Data Engineering, 13(6), 2001.
[27]
L. Sweeney. K-anonymity: A model for protecting privacy. International Journal on Uncertainty, Fuzziness, and Knowledge-Based Systems, 10(5), 2002.
[28]
Y. F. Tao, C. Faloutsos, D. Papadias, and B. Liu. Prediction and indexing of moving objects with unknown motion patterns. In SIGMOD, 2004.
[29]
M. Terrovitis and N. Mamoulis. Privacy preservation in the publication of trajectories. In Proceedings of the International Conference on Mobile Data Management, 2008.
[30]
T. Wang and L. Liu. Privacy-aware mobile services over road networks. In VLDB, 2009.
[31]
X. Xiao and Y. Tao. Anatomy: Simple and effective privacy preservation. In VLDB, 2006.
[32]
X. Xiao and Y. Tao. M-invariance: Towards privacy preserving re-publication of dynamic datasets. In SIGMOD, 2007.
[33]
R. Yarovoy, F. Bonchi, L. Lakshmanan, and W. Wang. Anonymizing moving objects: How to hide a mob in a crowd? In EDBT, 2009.

Cited By

View all
  • (2022)A Study of User Concerns about Smartphone Privacy2022 6th Cyber Security in Networking Conference (CSNet)10.1109/CSNet56116.2022.9955623(1-8)Online publication date: 24-Oct-2022
  • (2013)Select-Organize-AnonymizeProceedings of the 2013 IEEE 13th International Conference on Data Mining Workshops10.1109/ICDMW.2013.136(867-874)Online publication date: 7-Dec-2013
  • (2011)Trajectory anonymity in publishing personal mobility dataACM SIGKDD Explorations Newsletter10.1145/2031331.203133613:1(30-42)Online publication date: 31-Aug-2011

Index Terms

  1. An online framework for publishing privacy-sensitive location traces

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    MobiDE '10: Proceedings of the Ninth ACM International Workshop on Data Engineering for Wireless and Mobile Access
    June 2010
    97 pages
    ISBN:9781450301510
    DOI:10.1145/1850822
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 06 June 2010

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Research-article

    Conference

    MobiDE'10
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 23 of 59 submissions, 39%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 01 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)A Study of User Concerns about Smartphone Privacy2022 6th Cyber Security in Networking Conference (CSNet)10.1109/CSNet56116.2022.9955623(1-8)Online publication date: 24-Oct-2022
    • (2013)Select-Organize-AnonymizeProceedings of the 2013 IEEE 13th International Conference on Data Mining Workshops10.1109/ICDMW.2013.136(867-874)Online publication date: 7-Dec-2013
    • (2011)Trajectory anonymity in publishing personal mobility dataACM SIGKDD Explorations Newsletter10.1145/2031331.203133613:1(30-42)Online publication date: 31-Aug-2011

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media