World Wide Web

, Volume 21, Issue 4, pp 875–914 | Cite as

Personalized semantic trajectory privacy preservation through trajectory reconstruction

  • Yan Dai
  • Jie ShaoEmail author
  • Chengbo Wei
  • Dongxiang Zhang
  • Heng Tao Shen


Trajectory data gathered by mobile positioning techniques and location-aware devices contain plenty of sensitive spatial-temporal and semantic information, and can support many applications through data analysing and mining. However, attribute-linkage and re-identification attacks on such data may cause privacy leakage, and lead to unexpected serious consequences. Existing privacy preserving techniques for trajectory data often ignore the different privacy requirements of different moving objects or largely scarify the availability of trajectory data. In view of these issues, we propose an effective personalized trajectory privacy preserving method which can strike a good balance between user-defined privacy requirement and data availability in off-line trajectory publishing scenario. The main idea is to firstly label semantic attributes of all sampling points on the trajectory and build a corresponding taxonomy tree, next extract sensitive stop points, then for different types of sensitive stop points, adopt different strategies to select the appropriate points of user interests to replace while considering user speed and avoiding reverse mutation, and finally publish the reconstructed trajectory. Besides, to make our method more realistic we further consider possible obstacles appeared in the user space environment. In the experiments, average identification possibility, trajectory semantic consistency and trajectory shape similarity are taken as evaluation criteria, and the performance of our method is comprehensively evaluated. The results show that our method can improve the user trajectory availability as much as possible, while effectively achieving the different trajectory privacy requirements.


Trajectory database Privacy preservation Semantic attributes Replacement of stop points Trajectory reconstruction 



This work is supported by the National Nature Science Foundation of China (grants No. 61672133, No. 61602087 and No. 61632007), the Fundamental Research Funds for the Central Universities (grants No. ZYGX2015J058 and No. ZYGX2014Z007), and a project funded by the Priority Academic Program Development of Jiangsu Higher Education Institutions and Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology.


  1. 1.
    Abul, O., Bonchi, F., Nanni, M.: Never walk alone: uncertainty for anonymity in moving objects databases. In: Proceedings of the 24th International Conference on Data Engineering, ICDE 2008, April 7–12, 2008, Cancún, México, pp. 376–385 (2008)Google Scholar
  2. 2.
    Beresford, A.R., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Comput. 2(1), 46–55 (2003)CrossRefGoogle Scholar
  3. 3.
    Domingo-Ferrer, J., Trujillo-Rasua, R.: Microaggregation- and permutation-based anonymization of movement data. Inf. Sci. 208, 55–80 (2012)CrossRefGoogle Scholar
  4. 4.
    Duckham, M., Kulik, L.: A formal model of obfuscation and negotiation for location privacy. In: Pervasive Computing, Third International Conference, PERVASIVE 2005, Munich, Germany, May 8–13, 2005, Proceedings, pp. 152–170 (2005)Google Scholar
  5. 5.
    Dwork, C.: Differential privacy. In: Automata, Languages and Programming, 33rd International Colloquium, ICALP 2006, Venice, Italy, July 10–14, 2006, Proceedings, Part II, pp. 1–12 (2006)Google Scholar
  6. 6.
    Fu, Z., Huang, F., Ren, K., Weng, J., Wang, C.: Privacy-preserving smart semantic search based on conceptual graphs over encrypted outsourced data. IEEE Trans. Inf. Forensics Secur. 12(8), 1874–1884 (2017)CrossRefGoogle Scholar
  7. 7.
    Fu, Z., Ren, K., Shu, J., Sun, X., Huang, F.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. 27(9), 2546–2559 (2016)CrossRefGoogle Scholar
  8. 8.
    Fu, Z., Wu, X., Guan, C., Sun, X., Ren, K.: Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans. Inf. Forensics Secur. 11(12), 2706–2716 (2016)CrossRefGoogle Scholar
  9. 9.
    Gao, S., Ma, J., Shi, W., Zhan, G., Sun, C.: Trpf: a trajectory privacy-preserving framework for participatory sensing. IEEE Trans. Inf. Forensics Secur. 8(6), 874–887 (2013)CrossRefGoogle Scholar
  10. 10.
    Gao, S., Ma, J., Sun, C., Li, X.: Balancing trajectory privacy and data utility using a personalized anonymization model. J. Netw. Comput. Appl. 38, 125–134 (2014)CrossRefGoogle Scholar
  11. 11.
    Gidófalvi, G., Huang, X., Pedersen, T.B.: Privacy: preserving trajectory collection. In: 16th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, ACM-GIS 2008, November 5-7, 2008, Irvine, California, USA, Proceedings, p 46 (2008)Google Scholar
  12. 12.
    Gkoulalas-Divanis, A., Verykios, V.S., Mokbel, M.F.: Identifying unsafe routes for network-based trajectory privacy. In: Proceedings of the SIAM International Conference on Data Mining, SDM 2009, April 30–May 2, 2009, Sparks, Nevada, USA, pp. 942–953 (2009)Google Scholar
  13. 13.
    Gramaglia, M., Fiore, M., Tarable, A., Banchs, A.: kτ, 𝜖-anonymity: towards privacy-preserving publishing of spatiotemporal trajectory data. arXiv:1701.02243 (2017)
  14. 14.
    Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the First International Conference on Mobile Systems, Applications, and Services, Mobisys 2003, San Francisco, CA, USA, May 5–8, 2003 (2003)Google Scholar
  15. 15.
    Gruteser, M., Liu, X.: Protecting privacy in continuous location-tracking applications. IEEE Secur. Priv. 2(2), 28–34 (2004)CrossRefGoogle Scholar
  16. 16.
    Han, P., Tsai, H.: SST: privacy preserving for semantic trajectories. In: 16Th IEEE International Conference on Mobile Data Management, MDM 2015, Pittsburgh, PA, USA, June 15–18, 2015, vol. 2, pp. 80–85 (2015)Google Scholar
  17. 17.
    Hazzard, A., Benford, S., Burnett, G. E.: You’ll never walk alone: composing location-based soundtracks. In: 14th International Conference on New Interfaces for Musical Expression, NIME 2014, London, United Kingdom, June 30–July 4, 2014, pp. 411–414 (2014)Google Scholar
  18. 18.
    Huo, Z., Meng, X., Hu, H., Huang, Y.: You can walk alone: trajectory privacy-preserving through significant stays protection. In: Database Systems for Advanced Applications - 17th International Conference, DASFAA 2012, Busan, South Korea, April 15–19, 2012, Proceedings, Part I, pp. 351–366 (2012)Google Scholar
  19. 19.
    Komishani, E.G., Abadi, M., Deldar, F.: PPTD: Preserving personalized privacy in trajectory data publishing by sensitive attribute generalization and trajectory local suppression. Knowl.-Based Syst. 94, 43–59 (2016)CrossRefGoogle Scholar
  20. 20.
    Krumm, J.: A survey of computational location privacy. Pers. Ubiquit. Comput. 13(6), 391–399 (2009)CrossRefGoogle Scholar
  21. 21.
    Li, M., Zhu, L., Zhang, Z., Xu, R.: Achieving differential privacy of trajectory data publishing in participatory sensing. Inf. Sci. 400, 1–13 (2017)Google Scholar
  22. 22.
    Liu, A., Zheng, K., Li, L., Liu, G., Zhao, L., Zhou, X.: Efficient secure similarity computation on encrypted trajectory data. In: 31st IEEE International Conference on Data Engineering, ICDE 2015, Seoul, South Korea, April 13–17, 2015, pp. 66–77 (2015)Google Scholar
  23. 23.
    Liu, X., Xie, Q., Wang, L.: Personalized extended (α, k)-anonymity model for privacy-preserving data publishing. Concurrency and Computation: Practice and Experience 29(6) (2017)Google Scholar
  24. 24.
    Luper, D., Cameron, D., Miller, J., Arabnia, H.R.: Spatial and temporal target association through semantic analysis and gps data mining. In: Proceedings of the 2007 International Conference on Information & Knowledge Engineering, IKE 2007, June 25–28, 2007, Las Vegas, Nevada, USA, pp. 251–257 (2007)Google Scholar
  25. 25.
    Monreale, A., Trasarti, R., Renso, C., Pedreschi, D., Bogorny, V.: Preserving privacy in semantic-rich trajectories of human mobility. In: Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, SPRINGL 2010, November 2, 2010, San Jose, California, USA, Proceedings, pp. 47–54 (2010)Google Scholar
  26. 26.
    Naghizade, E., Kulik, L., Tanin, E.: Protection of sensitive trajectory datasets through spatial and temporal exchange. In: Conference on Scientific and Statistical Database Management, SSDBM ’14, Aalborg, Denmark, June 30–July 02, 2014, pp. 40:1–40:4 (2014)Google Scholar
  27. 27.
    Nergiz, M.E., Atzori, M., Saygin, Y., Güç, B.: Towards trajectory anonymization: a generalization-based approach. Transactions on Data Privacy 2(1), 47–75 (2009)MathSciNetGoogle Scholar
  28. 28.
    Tu, Z., Zhao, K., Xu, F., Li, Y., Su, L., Jin, D.: Beyond k-anonymity: protect your trajectory from semantic attack. In: 14th Annual IEEE International Conference on Sensing, Communication, and Networking, SECON 2017, San Diego, CA, USA, June 12–14, 2017, pp. 1–9 (2017)Google Scholar
  29. 29.
    Xu, T., Cai, Y.: Exploring historical location data for anonymity preservation in location-based services. In: INFOCOM 2008. 27tH IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 13–18 April 2008, Phoenix, AZ, USA, pp. 547–555 (2008)Google Scholar
  30. 30.
    Yarovoy, R., Bonchi, F., Lakshmanan, L.V.S., Wang, W.H.: Anonymizing moving objects: how to hide a MOB in a crowd?. In: EDBT 2009, 12th International Conference on Extending Database Technology, Saint Petersburg, Russia, March 24-26, 2009, Proceedings, pp. 72–83 (2009)Google Scholar
  31. 31.
    Yurtsever, E., Takeda, K., Miyajima, C.: Traffic trajectory history and drive path generation using GPS data cloud. In: 2015 IEEE Intelligent Vehicles Symposium, IV 2015, Seoul, South Korea, June 28–July 1, 2015, pp. 229–234 (2015)Google Scholar
  32. 32.
    Zheng, Y., Xie, X., Ma, W.: Geolife: a collaborative social networking service among user, location and trajectory. IEEE Data Eng. Bull. 33(2), 32–39 (2010)Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2017

Authors and Affiliations

  1. 1.Center for Future Media, School of Computer Science and EngineeringUniversity of Electronic Science and Technology of ChinaChengduChina

Personalised recommendations