Abstract
The increased use of location-aware devices, such as smartphones, generates a large amount of trajectory data. These data can be useful in several domains, like marketing, path modeling, localization of an epidemic focus, and so on. Nevertheless, since trajectory information contains personal mobility data, improper use or publication of trajectory data can threaten users’ privacy. It may reveal sensitive details like habits of behavior, religious beliefs, and sexual preferences. Therefore, many users might be unwilling to share their trajectory data without a previous anonymization process. Currently, several proposals to address this problem can be found in the literature. These solutions focus on anonymizing data before its publication, i.e., when they are already stored in the server database. Nevertheless, we argue that this approach gives the user no control about the information she shares. For this reason, we propose anonymizing data in the users’ mobile devices, before they are sent to a third party. This article extends our previous work which was, to the best of our knowledge, the first one to anonymize data at the client side, allowing users to select the amount and accuracy of shared data. In this article, we describe an improved version of the protocol, and we include the implementation together with an analysis of the results obtained after the simulation with real trajectory data.
- M. Abe. 1999. Mix-networks on permutation networks. In Advances in Cryptology – Asiacrypt’99, Kwok-Yan Lam, Eiji Okamoto, and Chaoping Xing (Eds.). Lecture Notes in Computer Science, vol. 1716. Springer Berlin Heidelberg, 258--273. Google ScholarDigital Library
- Osman Abul, Francesco Bonchi, and Mirco Nanni. 2008. Never walk alone: Uncertainty for anonymity in moving objects databases. In Proceedings of the 2008 IEEE 24th International Conference on Data Engineering (ICDE’08). IEEE Computer Society, Washington, DC, 376--385. Google ScholarDigital Library
- Miguel E. Andrés, Nicolás E. Bordenabe, Konstantinos Chatzikokolakis, and Catuscia Palamidessi. 2013. Geo-indistinguishability: Differential privacy for location-based systems. In Proceedings of the 2013 ACM SIGSAC Conference on Computer 8 Communications Security. ACM, 901--914. Google ScholarDigital Library
- Alastair R. Beresford and Frank Stajano. 2004. Mix zones: User privacy in location-aware services. In Proceedings of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW’04). IEEE Computer Society, Washington, DC, 127--131. http://dl.acm.org/citation.cfm?id=977405.978634. Google ScholarDigital Library
- Elisa Bertino, Dan Lin, and Wei Jiang. 2008. A survey of quantification of privacy preserving data mining algorithms. In Privacy-Preserving Data Mining. Springer, 183--205.Google Scholar
- Sébastien Canard, Nicolas Desmoulins, Julien Devigne, and Jacques Traoré. 2012. On the implementation of a pairing-based cryptographic protocol in a constrained device. In Proceedings of the 5th International Conference on Pairing-Based Cryptography. Springer, 210--217. Google ScholarDigital Library
- Rui Chen, Benjamin Fung, Bipin C. Desai, and Nériah M. Sossou. 2012. Differentially private transit data publication: A case study on the montreal transportation system. In Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 213--221. Google ScholarDigital Library
- Y. Desmedt and Y. Frankel. 1990. Threshold cryptosystems. In Advances in Cryptology -- CRYPTO’89, Gilles Brassard (Ed.). Lecture Notes in Computer Science, vol. 335. Springer New York, 307--315. Google ScholarDigital Library
- T. Dittler, F. Tschorsch, S. Dietzel, and B. Scheuermann. 2016. ANOTEL: Cellular networks with location privacy. In Proceedings of the 2016 IEEE 41st Conference on Local Computer Networks (LCN’16). 635--638.Google Scholar
- Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith. 2006. Calibrating noise to sensitivity in private data analysis. In Theory of Cryptography Conference. Springer, 265--284. Google ScholarDigital Library
- Cynthia Dwork, Moni Naor, Toniann Pitassi, and Guy N. Rothblum. 2010. Differential privacy under continual observation. In Proceedings of the 42nd ACM Symposium on Theory of Computing. ACM, 715--724. Google ScholarDigital Library
- Cynthia Dwork, Moni Naor, Omer Reingold, and Guy N. Rothblum. 2014. Pure differential privacy for rectangle queries via private partitions. In Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security. Springer, 735--751. Google ScholarDigital Library
- T. ElGamal. 1985. A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory 31 (1985), 469--472. Google ScholarDigital Library
- Ehab ElSalamouny and Sébastien Gambs. 2016. Differential privacy models for location-based services. Transactions on Data Privacy 9, 1 (2016), 15--48. Google ScholarDigital Library
- Aris Gkoulalas-Divanis and Vassilios S. Verykios. 2008. A privacy-aware trajectory tracking query engine. ACM SIGKDD Explorations Newsletter 10, 1 (2008), 40--49. Google ScholarDigital Library
- M. Gruteser and Xuan Liu. 2004. Protecting privacy, in continuous location-tracking applications. IEEE Security Privacy 2, 2 (Mar. 2004), 28--34. Google ScholarDigital Library
- Xi He, Graham Cormode, Ashwin Machanavajjhala, Cecilia M. Procopiuc, and Divesh Srivastava. 2015. DPT: Differentially private trajectory synthesis using hierarchical reference systems. Proceedings of the VLDB Endowment 8, 11 (2015), 1154--1165. Google ScholarDigital Library
- David Hilbert. 1891. Ueber die stetige Abbildung einer line auf ein Flächenstück. Mathematische Annalen 38, 3 (1891), 459--460.Google ScholarCross Ref
- Kaifeng Jiang, Dongxu Shao, Stéphane Bressan, Thomas Kister, and Kian-Lee Tan. 2013. Publishing trajectories with differential privacy guarantees. In Proceedings of the 25th International Conference on Scientific and Statistical Database Management. ACM, 12. Google ScholarDigital Library
- Meng Li, Liehuang Zhu, Zijian Zhang, and Rixin Xu. 2017. Achieving differential privacy of trajectory data publishing in participatory sensing. Information Sciences 400 (2017), 1--13. Google ScholarDigital Library
- Yehuda Lindell and Erez Waisbard. 2010. Private web search with malicious adversaries. In Privacy Enhancing Technologies. Springer, 220--235. Google ScholarDigital Library
- Jean Damascène Mazimpaka and Sabine Timpf. 2016. Trajectory data mining: A review of methods and applications. Journal of Spatial Information Science 2016, 13 (2016), 61--99.Google Scholar
- Ruggero G. Pensa, Anna Monreale, Fabio Pinelli, and Dino Pedreschi. 2008. Pattern-preserving k-anonymization of sequences and its application to mobility data mining. In Proceedings of PiLBA. 1--10.Google Scholar
- Sofie Reumers, Feng Liu, Davy Janssens, Mario Cools, and Geert Wets. 2013. Semantic annotation of global positioning system traces: Activity type inference. Transportation Research Record: Journal of the Transportation Research Board 2383 (2013), 35--43.Google ScholarCross Ref
- Cristina Romero-Tris and David Megías. 2015. User-centric privacy-preserving collection and analysis of trajectory data. In Proceedings of the 10th International Workshop on Data Privacy Management (DPM’15), and 4th International Workshop on Quantitative Aspects in Security Assurance (QASA’15), Vienna, Austria, September 21--22, 2015.245--253. Google ScholarDigital Library
- Pierangela Samarati and Latanya Sweeney. 1998. Generalizing data to provide anonymity when disclosing information (abstract). In Proceedings of the Seventeenth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS’98). ACM, New York, NY, 188. Google ScholarDigital Library
- V. Tanuja and P. Govindarajulu. 2016. Application of trajectory data mining techniques in CRM using movement based community clustering. International Journal of Computer Science and Network Security 16, 11 (2016), 20.Google Scholar
- Manolis Terrovitis and Nikos Mamoulis. 2008. Privacy preservation in the publication of trajectories. In Proceedings of the 9th International Conference on Mobile Data Management (MDM’08). IEEE, 65--72. Google ScholarDigital Library
- Hien To, Gabriel Ghinita, and Cyrus Shahabi. 2014. A framework for protecting worker location privacy in spatial crowdsourcing. Proceedings of VLDB Endowment 7, 10 (Jun. 2014), 919--930. Google ScholarDigital Library
- Guomin Yang, Duncan S. Wong, Xiaotie Deng, and Huaxiong Wang. 2006. Anonymous signature schemes. In International Workshop on Public Key Cryptography. Springer, 347--363. Google ScholarDigital Library
- Roman Yarovoy, Francesco Bonchi, Laks V. S. Lakshmanan, and Wendy Hui Wang. 2009. Anonymizing moving objects: How to hide a MOB in a crowd?. In Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology (EDBT’09). ACM, New York, NY, 72--83. Google ScholarDigital Library
- Yu Zheng, Lizhu Zhang, Xing Xie, and Wei-Ying Ma. 2009. Mining interesting locations and travel sequences from GPS trajectories. In Proceedings of the 18th International Conference on World Wide Web. ACM, 791--800. Google ScholarDigital Library
Index Terms
- Protecting Privacy in Trajectories with a User-Centric Approach
Recommendations
Protecting privacy in data release
Foundations of security analysis and design VIThe evolution of the Information and Communication Technology has radically changed our electronic lives, making information the key driver for today's society. Every action we perform requires the collection, elaboration, and dissemination of personal ...
Protecting IMSI and User Privacy in 5G Networks
MobiMedia '16: Proceedings of the 9th EAI International Conference on Mobile Multimedia CommunicationsIn recent years, many cases of compromising users' privacy in telecom networks have been reported. Stories of "fake" base stations capable of tracking users and collecting their personal data without users' knowledge have emerged. The current way of ...
Protecting User Privacy: An Approach for Untraceable Web Browsing History and Unambiguous User Profiles
WSDM '19: Proceedings of the Twelfth ACM International Conference on Web Search and Data MiningThe overturning of the Internet Privacy Rules by the Federal Communications Commissions (FCC) in late March 2017 allows Internet Service Providers (ISPs) to collect, share and sell their customers' Web browsing data without their consent. With third-...
Comments