Abstract
Mobile communication services raise user privacy concerns in sharing the traveling trajectories while facilitating people’s daily lives. According to these shared trajectories, adversaries can dig users’ multi-modal behavioral semantics by combining with extensive open-source web information. These behavioral semantics have differentiated privacy sensitivity, raising different levels of privacy concerns. It makes users have personalized requirements for protecting their travelings. Resulting in the inevitable evolutionary trend from location privacy protection to differentiated location privacy protection (DLPP). DLPP digs into mobile semantics and characterizes the differentiated location sensitivity by simulating the potential attacks. It provides the privacy protection with differentiated strength to each location. Differentiated and appropriate strength well balances the tradeoff between privacy protection and data availability for the quality of application service. We are motivated to conduct a comprehensive survey on DLPP from the semantic perception perspective. It forms a complete overview of the mobile semantics-aware differentiation in location privacy protection. Specifically, we first review the research works on multi-modal mobile semantic representation. Then, taking the dug semantics as a clue, we summarize the basic principles of DLPP research systematically. To complete the overview, we also summarize their design modes and discuss the open opportunities and challenges for future works.
- [1] . 2021. ADGAN: Protect your location privacy in camera data of auto-driving vehicles. IEEE Transactions on Industrial Informatics 17, 9 (2021), 6200–6210.Google ScholarCross Ref
- [2] . 2020. A location privacy-preserving system based on query range cover-up or location-based services. IEEE Transactions on Vehicular Technology 69, 5 (2020), 5244–5254.Google ScholarCross Ref
- [3] . 2019. Please forget where I was last summer: The privacy risks of public location (meta) data. In Proceedings of the 26th Network and Distributed System Security Symposium (NDSS’19). 1–15.Google ScholarCross Ref
- [4] . 2021. Practical location privacy attacks and defense on point-of-interest aggregates. In Proceedings of the 2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS’21). IEEE, Los Alamitos, CA, 808–818.Google ScholarCross Ref
- [5] . 2013. From tweets to semantic trajectories: Mining anomalous urban mobility patterns. In Proceedings of the International Workshop on Citizen in Sensor Networks. 26–35.Google Scholar
- [6] . 2019. UrbanFM: Inferring fine-grained urban flows. In Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 3132–3142.Google ScholarDigital Library
- [7] . 2016. Taxi driving behavior analysis in latent vehicle-to-vehicle networks: A social influence perspective. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD’16). 1285–1294.Google ScholarDigital Library
- [8] . 2020. Text captcha is dead? A large scale deployment and empirical study. In Proceedings of the 27th ACM SIGSAC Conference on Computer and Communications Security (CCS’20). 1391–1406.Google ScholarDigital Library
- [9] . 2021. Accurate range query with privacy preservation for outsourced location-based service in IoT. IEEE Internet of Things Journal 8, 18 (2021), 14322–14337.Google Scholar
- [10] . 2020. Demystifying resource management risks in emerging mobile app-in-app ecosystems. In Proceedings of the 27th ACM SIGSAC Conference on Computer and Communications Security (CCS’20). 569–585.Google ScholarDigital Library
- [11] . 2018. Analysis of privacy protections in fitness tracking social networks-or-you can run, but can you hide? In Proceedings of the 27th USENIX Security Symposium (USENIX Security’18). 497–512.Google Scholar
- [12] . 2023. Do you know you are tracked by photos that you didn’t take: Large-scale location-aware multi-party image privacy protection. IEEE Transactions on Dependable and Secure Computing 20, 1 (2023), 301–312.Google ScholarCross Ref
- [13] . 2023. Story-based authentication for mobile devices using semantically-linked images. International Journal of Human-Computer Studies 171 (2023), 102967.Google ScholarDigital Library
- [14] . 2023. VAISL: Visual-aware identification of semantic locations in lifelog. In MultiMedia Modeling: 29th International Conference (MMM’23): Proceedings, Part II. 659–670.Google ScholarDigital Library
- [15] . 2018. The long road to computational location privacy: A survey. IEEE Communications Surveys & Tutorials 21, 3 (2018), 2772–2793.Google ScholarCross Ref
- [16] . 2021. IEEE 802.11 CSI randomization to preserve location privacy: An empirical evaluation in different scenarios. Computer Networks 191 (2021), 107970.Google ScholarCross Ref
- [17] . 2021. Consistency analysis of data-usage purposes in mobile apps. In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. 2824–2843.Google ScholarDigital Library
- [18] . 2009. Feeling-based location privacy protection for location-based services. In Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS’09). 348–357.Google ScholarDigital Library
- [19] . 2021. Mobile semantic-aware trajectory for personalized location privacy preservation. IEEE Internet of Things Journal 8, 21 (2021), 16165–16180.Google ScholarCross Ref
- [20] . 2015. Learning-based privacy-preserving location sharing. In Proceedings of the International Symposium on Computational Intelligence and Intelligent Systems. 672–682.Google Scholar
- [21] . 2020. MoveWithMe: Location privacy preservation for smartphone users. IEEE Transactions on Information Forensics and Security 15 (2020), 711–724.Google ScholarDigital Library
- [22] . 2021. An improved dummy generation approach for enhancing user location privacy. In Proceedings of the International Conference on Database Systems for Advanced Applications. 487–495.Google ScholarDigital Library
- [23] . 2019. Inspect what your location history reveals about you: Raising user awareness on privacy threats associated with disclosing his location data. In Proceedings of the 28th ACM International Conference on Information and Knowledge Management. 2861–2864.Google ScholarDigital Library
- [24] . 2010. GeoLife: A collaborative social networking service among user, location and trajectory. IEEE Data Engineering Bulletin 33, 2 (2010), 32–40.Google Scholar
- [25] . 2019. If you do not care about it, sell it: Trading location privacy in mobile crowd sensing. In Proceedings of the 38th IEEE Conference on Computer Communications (INFOCOM’19). 1045–1053.Google ScholarDigital Library
- [26] . 2016. A probabilistic lifestyle-based trajectory model for social strength inference from human trajectory data. IEEE Transactions on Information Systems 35, 1 (2016), 1–28.Google ScholarDigital Library
- [27] . 2011. Protecting location privacy using location semantics. In Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD’11). 1289–1297.Google ScholarDigital Library
- [28] . 2020. Information leakage in embedding models. In Proceedings of the 27th ACM SIGSAC Conference on Computer and Communications Security (CCS’20). 377–390.Google ScholarDigital Library
- [29] . 2023. Geometric searchable encryption for privacy-preserving location-based services. IEEE Transactions on Services Computing 16, 4 (2023), 2672–2684.Google ScholarCross Ref
- [30] . 2021. An efficient and secure location-based alert protocol using searchable encryption and Huffman codes. arXiv preprint arXiv:2105.00618 (2021).Google Scholar
- [31] . 2021. When machine learning meets privacy: A survey and outlook. ACM Computing Surveys 54, 2 (2021), 1–36.Google ScholarDigital Library
- [32] . 2019. Habit2vec: Trajectory semantic embedding for living pattern recognition in population. IEEE Transactions on Mobile Computing 19, 5 (2019), 1096–1108.Google ScholarCross Ref
- [33] . 2015. Protecting locations with differential privacy under temporal correlations. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS’15). 1298–1309.Google ScholarDigital Library
- [34] . 2014. Semantic trajectory-based high utility item recommendation system. Expert Systems with Applications 41, 10 (2014), 4762–4776.Google ScholarCross Ref
- [35] . 2016. Anonymizing mobility data using semantic cloaking. Pervasive and Mobile Computing 28 (2016), 102–112.Google ScholarDigital Library
- [36] . 2018. Towards an Affective Semantic Trajectory Generator (ASTG). In Proceedings of the 2018 14th International Conference on Wireless and Mobile Computing, Networking, and Communications (WiMob’18). IEEE, Los Alamitos, CA, 1–10.Google ScholarCross Ref
- [37] . 2017. Understanding vulnerabilities of location privacy mechanisms against mobility prediction attacks. In Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services. 252–261.Google ScholarDigital Library
- [38] . 2017. Quantifying interdependent privacy risks with location data. IEEE Transactions on Mobile Computing 16, 3 (2017), 829–842.Google ScholarDigital Library
- [39] . 2012. Privacy protection for users of location-based services. IEEE Wireless Communications 19, 1 (2012), 30–39.Google ScholarCross Ref
- [40] . 2015. Privacy protection in pervasive systems: State of the art and technical challenges. Pervasive and Mobile Computing 17 (2015), 159–174.Google ScholarDigital Library
- [41] . 2021. Location privacy-preserving mechanisms in location-based services: A comprehensive survey. ACM Computing Surveys 54, 1 (2021), 1–36.Google ScholarDigital Library
- [42] . 2018. Continuous spatial query processing: A survey of safe region based techniques. ACM Computing Surveys 51, 3 (2018), 1–39.Google ScholarDigital Library
- [43] . 2016. Graph data anonymization, de-anonymization attacks, and de-anonymizability quantification: A survey. IEEE Communications Surveys and Tutorials 19, 2 (2016), 1305–1326.Google ScholarDigital Library
- [44] . 2018. Community discovery in dynamic networks: A survey. ACM Computing Surveys 51, 2 (2018), 1–37.Google ScholarDigital Library
- [45] . 2019. Identifying top-k nodes in social networks: A survey. ACM Computing Surveys 52, 1 (2019), 1–33.Google ScholarDigital Library
- [46] . 2018. GeoStreams: A survey. ACM Computing Surveys 51, 3 (2018), 1–37.Google ScholarDigital Library
- [47] . 2018. Spatio-temporal data mining: A survey of problems and methods. ACM Computing Surveys 51, 4 (2018), 1–41.Google ScholarDigital Library
- [48] . 2017. Feature selection: A data perspective. ACM Computing Surveys 50, 6 (2017), 1–45.Google ScholarDigital Library
- [49] . 2020. A comprehensive survey on mobility-aware D2D communications: Principles, practice and challenges. IEEE Communications Surveys & Tutorials 22, 3 (2020), 1863–1886.Google ScholarCross Ref
- [50] . 2020. A survey on anomalous behavior detection for elderly care using dense-sensing networks. IEEE Communications Surveys & Tutorials 22, 1 (2020), 352–370.Google ScholarDigital Library
- [51] . 2016. Networking for big data: A survey. IEEE Communications Surveys & Tutorials 19, 1 (2016), 531–549.Google ScholarDigital Library
- [52] . 2021. A survey of deep learning techniques for cybersecurity in mobile networks. IEEE Communications Surveys & Tutorials 23, 3 (2021), 1920–1955.Google ScholarCross Ref
- [53] . 2021. Privacy preserving location data publishing: A machine learning approach. IEEE Transactions on Knowledge and Data Engineering 33, 9 (2021), 3270–3283.Google ScholarDigital Library
- [54] . 2023. Location-based service information disclosure on social networking sites: The effect of privacy calculus, subjective norms, trust, and cultural difference. Information Services & Use 43, 1 (2023), 39–62.Google ScholarCross Ref
- [55] . 2023. LPP2KL: Online location privacy protection against knowing-and-learning attacks for LBSs. IEEE Transactions on Computational Social Systems 10, 1 (2023), 234–245.Google ScholarCross Ref
- [56] . 2022. Understanding the role of users’ socio-location attributes and their privacy implications on social media. Information & Computer Security 30, 5 (2022), 705–729.Google ScholarCross Ref
- [57] . 2020. End-to-end neural matching for semantic location prediction of tweets. ACM Transactions on Information Systems 39, 1 (2020), 1–35.Google ScholarDigital Library
- [58] . 2021. With a little help from my friends: Constructing practical anonymous credentials. In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. 2004–2023.Google ScholarDigital Library
- [59] . 2016. DPSense: Differentially private crowdsourced spectrum sensing. In Proceedings of the 23rd ACM SIGSAC Conference on Computer and Communications Security (CCS’16). 296–307.Google ScholarDigital Library
- [60] . 2018. Location privacy in usage-based automotive insurance: Attacks and countermeasures. IEEE Transactions on Information Forensics and Security 14, 1 (2018), 196–211.Google ScholarCross Ref
- [61] . 2021. Protecting privacy of location-based services in road networks. IEEE Transactions on Intelligent Transportation Systems 22, 10 (2021), 6435–6448.Google ScholarDigital Library
- [62] . 2016. Semantic-aware location privacy preservation on road networks. In Proceedings of the 21st International Conference on Database Systems for Advanced Applications (DASFAA’16). 314–331.Google ScholarDigital Library
- [63] . 2020. Time-efficient geo-obfuscation to protect worker location privacy over road networks in spatial crowdsourcing. In Proceedings of the 29th ACM International Conference on Information and Knowledge Management. 1275–1284.Google ScholarDigital Library
- [64] . 2018. Privacy leakage of location sharing in mobile social networks: Attacks and defense. IEEE Transactions on Dependable and Secure Computing 15, 4 (2018), 646–660.Google ScholarCross Ref
- [65] . 2014. Inferring social ties between users with human location history. Journal of Ambient Intelligence and Humanized Computing 5, 1 (2014), 3–19.Google ScholarCross Ref
- [66] . 2011. Quantifying location privacy. In Proceedings of the 32nd IEEE Symposium on Security and Privacy (SP’11). 247–262.Google ScholarDigital Library
- [67] . 2022. Eclipse: Preserving differential location privacy against long-term observation attacks. IEEE Transactions on Mobile Computing 21, 1 (2022), 125–138.Google Scholar
- [68] . 2022. Quantifying location privacy for navigation services in sustainable vehicular networks. IEEE Transactions on Green Communications and Networking 6, 3 (2022), 1267–1275.Google ScholarCross Ref
- [69] . 2006. Calibrating noise to sensitivity in private data analysis. In Proceedings of the Theory of Cryptography Conference. 265–284.Google ScholarDigital Library
- [70] . 2013. Geo-indistinguishability: Differential privacy for location-based systems. In Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security. 901–914.Google ScholarDigital Library
- [71] . 2009. Mining interesting locations and travel sequences from GPS trajectories. In Proceedings of the 18th ACM International Conference on World Wide Web (WWW’09). 791–800.Google Scholar
- [72] . 2008. Understanding mobility based on GPS data. In Proceedings of the 10th ACM International Conference on Ubiquitous Computing (UbiComp’08). 312–321.Google ScholarDigital Library
- [73] . 2019. PPtaxi: Non-stop package delivery via multi-hop ridesharing. IEEE Transactions on Mobile Computing 19, 11 (2019), 2684–2698.Google ScholarCross Ref
- [74] . 2019. The long road to computational location privacy: A survey. IEEE Communications Surveys and Tutorials 21, 3 (2019), 2772–2793.Google ScholarCross Ref
- [75] . 2017. A neural network approach to jointly modeling social networks and mobile trajectories. IEEE Transactions on Information Systems 35, 4 (2017), 1–28.Google ScholarDigital Library
- [76] . 2012. Protecting location privacy: Optimal strategy against localization attacks. In Proceedings of the 19th ACM Conference on Computer and Communications Security (CCS’12). 617–627.Google ScholarDigital Library
- [77] . 2017. Pegasus: Data-adaptive differentially private stream processing. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. 1375–1388.Google ScholarDigital Library
- [78] . 2016. Generic attacks on secure outsourced databases. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. 1329–1340.Google ScholarDigital Library
- [79] . 2017. Walk2friends: Inferring social links from mobility profiles. In Proceedings of the 24th ACM SIGSAC Conference on Computer and Communications Security (CCS’17). 1943–1957.Google ScholarDigital Library
- [80] . 2017. Back to the drawing board: Revisiting the design of optimal location privacy-preserving mechanisms. In Proceedings of the 24th ACM SIGSAC Conference on Computer and Communications Security (CCS’17). 1959–1972.Google ScholarDigital Library
- [81] . 2017. The feasibility of dynamically granted permissions: Aligning mobile privacy with user preferences. In Proceedings of the 2017 IEEE Symposium on Security and Privacy (SP’17). IEEE, Los Alamitos, CA, 1077–1093.Google ScholarCross Ref
- [82] . 2014. Mining geographic-temporal-semantic patterns in trajectories for location prediction. ACM Transactions on Intelligent Systems and Technology 5, 1 (2014), 1–33.Google ScholarDigital Library
- [83] . 2013. Semantic trajectories: Mobility data computation and annotation. ACM Transactions on Intelligent Systems and Technology 4, 3 (2013), 1–38.Google ScholarDigital Library
- [84] . 2017. Efficient mining of regional movement patterns in semantic trajectories. In Proceedings of the 43rd Springer International Conference on Very Large Data Bases (VLDB’17). 2073–2084.Google ScholarDigital Library
- [85] . 2009. WhereNext: A location predictor on trajectory pattern mining. In Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD’09). 637–646.Google ScholarDigital Library
- [86] . 2015. TOPTRAC: Topical trajectory pattern mining. In Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD’15). 587–596.Google ScholarDigital Library
- [87] . 2012. Improving location prediction services for new users with probabilistic latent semantic analysis. In Proceedings of the 14th ACM International Conference on Ubiquitous Computing (UbiComp’12). 906–910.Google ScholarDigital Library
- [88] . 2014. Splitter: Mining fine-grained sequential patterns in semantic trajectories. In Proceedings of the 40th Springer International Conference on Very Large Data Bases (VLDB’14), Vol. 7. 769–780.Google ScholarDigital Library
- [89] . 2012. Exploring trajectory-driven local geographic topics in foursquare. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing(UbiComp’12). 927–934.Google ScholarDigital Library
- [90] . 2016. Enhancing location prediction with big data: Evidence from Dhaka. In Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct. 753–762.Google ScholarDigital Library
- [91] . 2017. Full trajectory prediction: What will you do the rest of the day? In Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable Computers. 189–192.Google ScholarDigital Library
- [92] . 2015. Clustering and aggregating clues of trajectories for mining trajectory patterns and routes. VLDB Journal 24, 2 (2015), 169–192.Google ScholarDigital Library
- [93] . 2016. TribeFlow: Mining & predicting user trajectories. In Proceedings of the 25th International Conference on World Wide Web. 695–706.Google ScholarDigital Library
- [94] . 2015. Making sense of spatial trajectories. In Proceedings of the 24th ACM International on Conference on Information and Knowledge Management. 671–672.Google ScholarDigital Library
- [95] . 2015. You are where you go: Inferring demographic attributes from location check-ins. In Proceedings of the 8th ACM International Conference on Web Search and Data Mining. 295–304.Google ScholarDigital Library
- [96] . 2011. Exploiting place features in link prediction on location-based social networks. In Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD’11). 1046–1054.Google ScholarDigital Library
- [97] . 2017. SERM: A recurrent model for next location prediction in semantic trajectories. In Proceedings of the 2017 ACM on Conference on Information and Knowledge Management. 2411–2414.Google ScholarDigital Library
- [98] . 2018. AttriGuard: A practical defense against attribute inference attacks via adversarial machine learning. In Proceedings of the 27th USENIX Security Symposium (USENIX Security’18). 513–529.Google Scholar
- [99] . 2018. Utility-aware synthesis of differentially private and attack-resilient location traces. In Proceedings of the 25th ACM SIGSAC Conference on Computer and Communications Security (CCS’18). 196–211.Google ScholarDigital Library
- [100] . 2019. PriSTE: from location privacy to spatiotemporal event privacy. In Proceedings of the 35th International Conference on Data Engineering (ICDE’19). IEEE, Los Alamitos, CA, 1606–1609.Google ScholarCross Ref
- [101] . 2017. Privacy-preserving aggregate queries for optimal location selection. IEEE Transactions on Dependable and Secure Computing 16, 2 (2017), 329–343.Google ScholarDigital Library
- [102] . 2018. Attacker location evaluation-based fake source scheduling for source location privacy in cyber-physical systems. IEEE Transactions on Information Forensics and Security 14, 5 (2018), 1337–1350.Google ScholarCross Ref
- [103] . 2018. Personalized semantic trajectory privacy preservation through trajectory reconstruction. World Wide Web 21, 4 (2018), 875–914.Google ScholarDigital Library
- [104] . 2018. Enhancing data privacy with semantic trajectories: A raster-based framework for GPS stop/move management. Transactions in GIS 22, 4 (2018), 975–990.Google ScholarCross Ref
- [105] . 2014. On the management and analysis of our lifesteps. In Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD’14). 23–32.Google ScholarDigital Library
- [106] . 2023. Semantic ontology enabled modeling, retrieval and inference for incomplete mobile trajectory data. Future Generation Computer Systems 145 (2023), 1–11.Google ScholarDigital Library
- [107] . 2020. Zero knowledge proofs for decision tree predictions and accuracy. In Proceedings of the 27th ACM SIGSAC Conference on Computer and Communications Security (CCS’20). 2039–2053.Google ScholarDigital Library
- [108] . 2018. Research on the method of multi-source information fusion based on Bayesian theory. In Proceedings of the 2018 IEEE 3rd Advanced Information Technology, Electronic, and Automation Control Conference (IAEAC’18). IEEE, Los Alamitos, CA, 1760–1763.Google ScholarCross Ref
- [109] . 2016. PLP: Protecting location privacy against correlation analyze attack in crowdsensing. IEEE Transactions on Mobile Computing 16, 9 (2016), 2588–2598.Google ScholarDigital Library
- [110] . 2021. A new location-based privacy protection algorithm with deep learning. Security and Privacy 4, 1 (2021), e139.Google ScholarCross Ref
- [111] . 2023. Semantic similarity for mobile application recommendation under scarce user data. Engineering Applications of Artificial Intelligence 121 (2023), 105974.Google ScholarDigital Library
- [112] . 2016. Synthesizing plausible privacy-preserving location traces. In Proceedings of the 37th IEEE Symposium on Security and Privacy (SP’16). 546–563.Google ScholarCross Ref
- [113] . 2001. Protecting respondents identities in microdata release. IEEE Transactions on Knowledge and Data Engineering 13, 6 (2001), 1010–1027.Google ScholarDigital Library
- [114] . 2002. k-Anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 10, 05 (2002), 557–570.Google ScholarDigital Library
- [115] . 2007. l-Diversity: Privacy beyond k-anonymity. ACM Transactions on Knowledge Discovery from Data 1, 1 (2007), 1–12.Google ScholarDigital Library
- [116] . 2008. Protecting location privacy with personalized k-anonymity: Architecture and algorithms. IEEE Transactions on Mobile Computing 7, 1 (2008), 1–18.Google ScholarDigital Library
- [117] . 2007. t-Closeness: Privacy beyond k-anonymity and l-diversity. In Proceedings of the 2007 IEEE 23rd International Conference on Data Engineering. IEEE, Los Alamitos, CA, 106–115.Google ScholarCross Ref
- [118] . 2017. Preserving mobile subscriber privacy in open datasets of spatiotemporal trajectories. In Proceedings of the 36th IEEE International Conference on Computer Communications (INFOCOM’17). 1–9.Google ScholarCross Ref
- [119] . 2018. Privacy preservation in big data from the communication perspective survey. IEEE Communications Surveys and Tutorials 21, 1 (2018), 753–778.Google ScholarCross Ref
- [120] . 2020. Sparse mobile crowdsensing with differential and distortion location privacy. IEEE Transactions on Information Forensics and Security 15 (2020), 2735–2749.Google ScholarDigital Library
- [121] . 2018. Frequent sequence pattern mining with differential privacy. In Proceedings of the International Conference on Intelligent Computing. 454–466.Google ScholarDigital Library
- [122] . 2022. Instance-aware semantic segmentation of road furniture in mobile laser scanning data. IEEE Transactions on Intelligent Transportation Systems 23, 10 (2022), 17516–17529.Google ScholarCross Ref
- [123] . 2022. Personalized location privacy protection based on vehicle movement regularity in vehicular networks. IEEE Systems Journal 16, 1 (2022), 755–766.Google ScholarCross Ref
- [124] . 2022. Location-privacy preserving partial nearby friends querying in urban areas. Data & Knowledge Engineering 139 (2022), 102006.Google ScholarDigital Library
- [125] . 2022. TrafficAdaptor: An adaptive obfuscation strategy for vehicle location privacy against traffic flow aware attacks. In Proceedings of the 30th International Conference on Advances in Geographic Information Systems, Vol. 4. 1–10.Google ScholarDigital Library
- [126] . 2022. Personalized location privacy with road network-indistinguishability. IEEE Transactions on Intelligent Transportation Systems 23, 11 (2022), 20860–20872.Google ScholarCross Ref
- [127] . 2013. A novel time-obfuscated algorithm for trajectory privacy protection. IEEE Transactions on Services Computing 7, 2 (2013), 126–139.Google ScholarCross Ref
- [128] . 2010. Preserving privacy in semantic-rich trajectories of human mobility. In Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS. 47–54.Google ScholarDigital Library
- [129] . 2011. C-safety: A framework for the anonymization of semantic trajectories. Transactions on Data Privacy 4, 2 (2011), 73–101.Google ScholarDigital Library
- [130] . 2007. Trajectory pattern mining. In Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 330–339.Google ScholarDigital Library
- [131] . 2013. Towards privacy-preserving semantic mobility analysis. In Proceedings of the EuroVis Workshop on Visual Analytics.Google Scholar
- [132] . 2016. Privacy-preserving social tie discovery based on cloaked human trajectories. IEEE Transactions on Vehicular Technology 66, 2 (2016), 1619–1630.Google ScholarCross Ref
- [133] . 2015. Privacy preserving social tie discovery based on cloaked human trajectories. In Proceedings of the 7th International Workshop on Hot Topics in Planet-Scale Mobile Computing and Online Social Networking. 13–18.Google ScholarDigital Library
- [134] . 2018. Semantic-based customizable location privacy protection scheme. In Proceedings of the 2018 17th International Symposium on Distributed Computing and Applications for Business Engineering and Science (DCABES’18). IEEE, Los Alamitos, CA, 148–154.Google ScholarCross Ref
- [135] . 2022. A framework for personalized location privacy. IEEE Transactions on Mobile Computing 21, 9 (2022), 3071–3083.Google ScholarCross Ref
- [136] . 2021. Mobility-aware differentially private trajectory for privacy-preserving continual crowdsourcing. IEEE Access 9 (2021), 26362–26376.Google ScholarCross Ref
- [137] . 2017. Understanding vulnerabilities of location privacy mechanisms against mobility prediction attacks. In Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services. 252–261.Google ScholarDigital Library
- [138] . 2018. A non-parametric generative model for human trajectories. In Proceedings of the 27th International Joint Conference on Artificial Intelligence (IJCAI’18). 3812–3817.Google ScholarDigital Library
- [139] . 2017. Recommending Privacy Preferences in Location-Sharing Services. Ph.D. Dissertation. University of St. Andrews.Google Scholar
- [140] . 2022. Semantic-aware privacy-preserving online location trajectory data sharing. IEEE Transactions on Information Forensics and Security 17 (2022), 2256–2271.Google ScholarCross Ref
- [141] . 2022. Synthesis of longitudinal human location sequences: Balancing utility and privacy. ACM Transactions on Knowledge Discovery from Data 16, 6 (2022), 1–27.Google ScholarDigital Library
- [142] . 2023. P2AE: Preserving privacy, accuracy, and efficiency in location-dependent mobile crowdsensing. IEEE Transactions on Mobile Computing 22, 4 (2023), 2323–2339.Google ScholarDigital Library
- [143] . 2023. DistPreserv: Maintaining user distribution for privacy-preserving location-based services. IEEE Transactions on Mobile Computing 22, 6 (2023), 3287–3302.Google ScholarDigital Library
- [144] . 2020. Tradeoff between location quality and privacy in crowdsensing: An optimization perspective. IEEE Internet of Things Journal 7, 4 (2020), 3535–3544.Google ScholarCross Ref
- [145] . 2016. Location privacy for crowdsourcing applications. In Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing. 694–705.Google ScholarDigital Library
- [146] . 2020. Location privacy protection in vehicle-based spatial crowdsourcing via geo-indistinguishability. IEEE Transactions on Mobile Computing 21, 7 (2020), 2436–2450.Google ScholarCross Ref
- [147] . 2017. Achieving differential privacy of trajectory data publishing in participatory sensing. Information Sciences 400 (2017), 1–13.Google ScholarDigital Library
- [148] . 2002. Tools for privacy preserving distributed data mining. ACM SIGKDD Explorations Newsletter 4, 2 (2002), 28–34.Google ScholarDigital Library
- [149] . 2018. Online location trace privacy: An information theoretic approach. IEEE Transactions on Information Forensics and Security 14, 1 (2018), 235–250.Google ScholarCross Ref
- [150] . 2019. Attacking graph-based classification via manipulating the graph structure. In Proceedings of the 26th ACM SIGSAC Conference on Computer and Communications Security (CCS’19). 2023–2040.Google ScholarDigital Library
- [151] . 2012. Predicting future locations with hidden Markov models. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing (UbiComp’12). 911–918.Google ScholarDigital Library
- [152] . 2018. Revealing privacy vulnerabilities of anonymous trajectories. IEEE Transactions on Vehicular Technology 67, 12 (2018), 12061–12071.Google ScholarCross Ref
- [153] . 2018. Social GAN: Socially acceptable trajectories with generative adversarial networks. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 2255–2264.Google ScholarCross Ref
- [154] . 2017. Protecting trajectory privacy: A user-centric analysis. Journal of Network and Computer Applications 82 (2017), 128–139.Google ScholarDigital Library
- [155] . 2013. Exploring pattern-aware travel routes for trajectory search. ACM Transactions on Intelligent Systems and Technology 4, 3 (2013), 1–25.Google ScholarDigital Library
- [156] . 2012. Intention oriented itinerary recommendation by bridging physical trajectories and online social networks. In Proceedings of the ACM SIGKDD International Workshop on Urban Computing. 71–78.Google ScholarDigital Library
- [157] . 2008. Private queries in location based services: Anonymizers are not necessary. In Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data. 121–132.Google ScholarDigital Library
Index Terms
- Differentiated Location Privacy Protection in Mobile Communication Services: A Survey from the Semantic Perception Perspective
Recommendations
Resilient Privacy Protection for Location-Based Services through Decentralization
Location-Based Services (LBSs) provide valuable services, with convenient features for mobile users. However, the location and other information disclosed through each query to the LBS erodes user privacy. This is a concern especially because LBS ...
Location Privacy Protection Scheme Based on Location Services
ICCNS '19: Proceedings of the 2019 9th International Conference on Communication and Network SecurityLocation-based services (LBS) in the mobile internet applications are very important and provide a great convenience. However, at the same time it brings the threat of privacy leak. For location services, a location privacy protection scheme is proposed,...
Quality aware privacy protection for location-based services
DASFAA'07: Proceedings of the 12th international conference on Database systems for advanced applicationsProtection of users' privacy has been a central issue for location-based services (LBSs). In this paper, we classify two kinds of privacy protection requirements in LBS: location anonymity and identifier anonymity.While the location cloaking technique ...
Comments