ABSTRACT
Advancements in mobile computing techniques along with the pervasiveness of location-based services have generated a great amount of trajectory data. These data can be used for various data analysis purposes such as traffic flow analysis, infrastructure planning and understanding of human behavior. However, publishing this amount of trajectory data may lead to serious risks of privacy breach. Quasi-identifiers are trajectory points that can be linked to external information and be used to identify individuals associated with trajectories. Therefore, by analyzing quasi-identifiers, one may be able to trace anonymous trajectories back to individuals with the aid of location-aware social networking applications, for example. Most existing trajectory data anonymization approaches were proposed for centralized computing environments, so they usually present poor performance to anonymize large trajectory data sets. In this paper we propose a distributed and efficient strategy that adopts the km-anonymity privacy model and uses the scalable MapReduce paradigm, which allows finding quasi-identifiers in larger amount of data. We also present a technique to minimize the loss of information by selecting key locations from the quasi-identifiers to be suppressed. Experimental evaluation results demonstrate that our proposed approach for trajectory data anonymization is more scalable and efficient than existing works.
- O. Abul, F. Bonchi, and M. Nanni. Never walk alone: Uncertainty for anonymity in moving objects databases. In Proc. of the 24th ICDE, pages 376--385, 2008. Google ScholarDigital Library
- F. Bonchi, L. V. S. Lakshmanan, and W. H. Wang. Trajectory anonymity in publishing personal mobility data. SIGKDD Explorations, 13(1):30--42, 2011. Google ScholarDigital Library
- L. Bonomi and L. Xiong. A two-phase algorithm for mining sequential patterns with differential privacy. In 22nd ACM International Conference on Information and Knowledge Management, pages 269--278, 2013. Google ScholarDigital Library
- T. Brinkhoff. A framework for generating network-based moving objects. GeoInformatica, 6(2):153--180, 2002. Google ScholarDigital Library
- R. Chen, G. Ács, and C. Castelluccia. Differentially private sequential data publication via variable-length n-grams. In ACM Conference on Computer and Communications Security, pages 638--649, 2012. Google ScholarDigital Library
- R. Chen, B. C. M. Fung, B. C. Desai, and N. M. Sossou. Differentially private transit data publication: a case study on the montreal transportation system. In 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 213--221, 2012. Google ScholarDigital Library
- R. Chen, B. C. M. Fung, N. Mohammed, B. C. Desai, and K. Wang. Privacy-preserving trajectory data publishing by local suppression. Inf. Sci., 231:83--97, 2013. Google ScholarDigital Library
- C. Clifton and T. Tassa. On syntactic anonymity and differential privacy. In 29th IEEE International Conference on Data Engineering, pages 88--93, 2013.Google ScholarCross Ref
- J. Dean and S. Ghemawat. Mapreduce: Simplified data processing on large clusters. In 6th Symposium on Operating System Design and Implementation, pages 137--150. USENIX Association, 2004. Google ScholarDigital Library
- C. Dwork. Differential privacy. In 33rd International Colloquium, pages 1--12, 2006. Google ScholarDigital Library
- B. C. Fung, K. Wang, A. W.-C. Fu, and P. S. Yu. Introduction to Privacy-Preserving Data Publishing: Concepts and Techniques. 1st edition, 2010. Google ScholarDigital Library
- M. R. Garey and D. S. Johnson. Computers and Intractability: A Guide to the Theory of NP-Completeness. W. H. Freeman, 1979. Google ScholarDigital Library
- H. Hu, Q. Chen, and J. Xu. VERDICT: privacy-preserving authentication of range queries in location-based services. In 29th ICDE, pages 1312--1315, 2013. Google ScholarDigital Library
- R. Lämmel. Google's mapreduce programming model - revisited. Sci. Comput. Program., 70(1):1--30, 2008. Google ScholarDigital Library
- N. Li, T. Li, and S. Venkatasubramanian. t-closeness: Privacy beyond k-anonymity and l-diversity. In Proc. of the 23rd ICDE, pages 106--115, 2007.Google ScholarCross Ref
- A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam. L-diversity: Privacy beyond k-anonymity. TKDD, 1(1), 2007. Google ScholarDigital Library
- A. Meyerson and R. Williams. On the complexity of optimal k-anonymity. In Proc. of the 23rd ACM SIGACT-SIGMOD-SIGART, pages 223--228, 2004. Google ScholarDigital Library
- N. Mohammed, B. C. M. Fung, and M. Debbabi. Walking in the crowd: anonymizing trajectory data for pattern analysis. In Proc. of the 18th ACM CIKM, pages 1441--1444, 2009. Google ScholarDigital Library
- M. E. Nergiz, M. Atzori, Y. Saygin, and B. Güç. Towards trajectory anonymization: a generalization-based approach. Transactions on Data Privacy, 2(1):47--75, 2009. Google ScholarDigital Library
- G. Poulis, S. Skiadopoulos, G. Loukides, and A. Gkoulalas-Divanis. Distance-based k^m-anonymization of trajectory data. In IEEE 14th International Conference on Mobile Data Management, pages 57--62, 2013. Google ScholarDigital Library
- G. Poulis, S. Skiadopoulos, G. Loukides, and A. Gkoulalas-Divanis. Select-organize-anonymize: A framework for trajectory data anonymization. In 13th ICDM Workshops, pages 867--874, 2013. Google ScholarDigital Library
- G. Poulis, S. Skiadopoulos, G. Loukides, and A. Gkoulalas-Divanis. Apriori-based algorithms for km-anonymizing trajectory data. Transactions on Data Privacy, 7(2):165--194, 2014. Google ScholarDigital Library
- R. Srikant and R. Agrawal. Mining sequential patterns: Generalizations and performance improvements. In 5th EDBT, pages 3--17, 1996. Google ScholarDigital Library
- L. Sweeney. k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(5):557--570, 2002. Google ScholarDigital Library
- M. Terrovitis and N. Mamoulis. Privacy preservation in the publication of trajectories. In 9th International Conference on Mobile Data Management, pages 65--72. IEEE, 2008. Google ScholarDigital Library
- M. Terrovitis, N. Mamoulis, and P. Kalnis. Local and global recoding methods for anonymizing set-valued data. VLDB J., 20(1):83--106, 2011. Google ScholarDigital Library
- R. Trujillo-Rasua and J. Domingo-Ferrer. On the privacy offered by (k, Δ)-anonymity. Inf. Syst., 38(4):491--494, 2013. Google ScholarDigital Library
- R. Yarovoy, F. Bonchi, L. V. S. Lakshmanan, and W. H. Wang. Anonymizing moving objects: how to hide a MOB in a crowd? In 12th EDBT, pages 72--83, 2009. Google ScholarDigital Library
Index Terms
A Distributed Approach for Privacy Preservation in the Publication of Trajectory Data
Recommendations
Privacy Preservation for Trajectory Publication Based on Differential Privacy
With the proliferation of location-aware devices, trajectory data have been used widely in real-life applications. However, trajectory data are often associated with sensitive labels, such as users’ purchase transactions and planned activities. As such, ...
Protecting sensitive place visits in privacy-preserving trajectory publishing
Highlights- We propose a method for privacy-preserving trajectory publishing.
- It aims at ...
AbstractThe rise of mobile computing has generated huge amount of trajectory data. Since these data are valuable for many people, publishing them while providing adequate individual privacy protection has been a challenging task. In this paper,...
A clustering-based approach for personalized privacy preserving publication of moving object trajectory data
NSS'12: Proceedings of the 6th international conference on Network and System SecurityWith the growing prevalence of location-aware devices, the amount of trajectories generated by moving objects has been dramatically increased, resulting in various novel data mining applications. Since trajectories may contain sensitive information ...
Comments