The De-anonymization Method Based on User Spatio-Temporal Mobility Trace

  • Zhenyu ChenEmail author
  • Yanyan Fu
  • Min Zhang
  • Zhenfeng Zhang
  • Hao Li
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10631)


Nowadays user mobility traces are more and more likely to de-anonymize users in addition to other types of data. Among them, model-based approaches usually provide more accurate de-anonymize than that of feature-locations-based approaches. More recently, Hidden Markov Model (HMM) based approaches are proposed to find out the mobility pattern of user mobility traces. However, in the key step of the hidden state definition, existing models rely on the fixed classification of time, space or number, which can hardly suit for all various users. In this paper, we propose a user de-anonymization method based on HMM. Different from current approaches, the method utilizes a novel density-based HMM, which uses the density-based clustering to obtain hidden states of HMM from three-dimensional (time, latitude and longitude) spatio-temporal data, and provide much better performance. Furthermore, we also propose a frequent spatio-temporal cube filter (FSTC-Filter) which significantly reduces the number of candidate models and thus improves the efficiency.


De-anonymization Density-based HMM Frequent spatio-temporal cube Mobility trace 



This work is supported by the National Natural Science Foundation of China (No. U1636216, No. 61232005, No. 61402456)


  1. 1.
    Ayhan, S., Samet, H.: Aircraft trajectory prediction made easy with predictive analytics. In: Proceedings of the 22nd International Conference on Knowledge Discovery and Data Mining (2016)Google Scholar
  2. 2.
    De Montjoye, Y.-A., Hidalgo, C.A., Verleysen, M., Blondel, V.D.: Unique in the crowd: the privacy bounds of human mobility. Sci. Rep. 3, 1376 (2013)CrossRefGoogle Scholar
  3. 3.
    Freudiger, J., Shokri, R., Hubaux, J.-P.: Evaluating the privacy risk of location-based services. In: Danezis, G. (ed.) FC 2011. LNCS, vol. 7035, pp. 31–46. Springer, Heidelberg (2012). Scholar
  4. 4.
    Gambs, S., Killijian, M.-O., del Prado Cortez, M.N.: De-anonymization attack on geolocated data. J. Comput. Syst. Sci. 80(8), 1597–1614 (2014)MathSciNetCrossRefGoogle Scholar
  5. 5.
    Gonzalez, M.C., Hidalgo, C.A., Barabasi, A.-L.: Understanding individual human mobility patterns. Nature 453(7196), 779–782 (2008)CrossRefGoogle Scholar
  6. 6.
    Lin, M., Cao, H., Zheng, V., Chang, K.C., Krishnaswamy, S.: Mobile user verification/identification using statistical mobility profile. In: 2015 International Conference on Big Data and Smart Computing (BigComp), pp. 15–18. IEEE (2015)Google Scholar
  7. 7.
    Lin, M., Cao, H., Zheng, V., Chang, K.C.-C., Krishnaswamy, S.: Mobility profiling for user verification with anonymized location data. In: Twenty-Fourth International Joint Conference on Artificial Intelligence (2015)Google Scholar
  8. 8.
    Naini, F.M., Unnikrishnan, J., Thiran, P., Vetterli, M.: Where you are is who you are: user identification by matching statistics. IEEE Trans. Inf. Forensics Secur. 11(2), 358–372 (2016)CrossRefGoogle Scholar
  9. 9.
    Narayanan, A., Shi, E., Rubinstein, B.I.P.: Link prediction by de-anonymization: how we won the kaggle social network challenge. In: The 2011 International Joint Conference on Neural Networks (IJCNN), pp. 1825–1834. IEEE (2011)Google Scholar
  10. 10.
    Narayanan, A., Shmatikov, V.: Robust de-anonymization of large sparse datasets. In: IEEE Symposium on Security and Privacy, SP 2008, pp. 111–125. IEEE (2008)Google Scholar
  11. 11.
    Narayanan, A., Shmatikov, V.: De-anonymizing social networks. In: 2009 30th IEEE Symposium on Security and Privacy, pp. 173–187. IEEE (2009)Google Scholar
  12. 12.
    Pan, J., Rao, V., Agarwal, P., Gelfand, A.: Markov-modulated marked Poisson processes for check-in data. In: International Conference on Machine Learning, pp. 2244–2253 (2016)Google Scholar
  13. 13.
    Wang, R., Zhang, M., Feng, D., Fu, Y., Chen, Z.: A de-anonymization attack on geo-located data considering spatio-temporal influences. In: Qing, S., Okamoto, E., Kim, K., Liu, D. (eds.) ICICS 2015. LNCS, vol. 9543, pp. 478–484. Springer, Cham (2016). Scholar
  14. 14.
    Wang, Y., Yuan, N.J., Lian, D., Xu, L., Xie, X., Chen, E., Rui, Y.: Regularity and conformity: location prediction using heterogeneous mobility data. In: Proceedings of the 21th ACM SIGFKDD International Conference on Knowledge Discovery and Data Mining, pp. 1275–1284. ACM (2015)Google Scholar
  15. 15.
    Xue, A.Y., Zhang, R., Zheng, Y., Xie, X., Huang, J., Xu, Z.: Destination prediction by sub-trajectory synthesis and privacy protection against such prediction. In: 2013 IEEE 29th International Conference on Data Engineering (ICDE), pp. 254–265. IEEE (2013)Google Scholar
  16. 16.
    Yuan, Q., Cong, G., Ma, Z., Sun, A., Thalmann, N.M.: Time-aware point-of-interest recommendation. In: Proceedings of the 36th International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 363–372. ACM (2013)Google Scholar
  17. 17.
    Zang, H., Bolot, J.: Anonymization of location data does not work: a large-scale measurement study. In: Proceedings of the 17th Annual International Conference on Mobile Computing and Networking, pp. 145–156. ACM (2011)Google Scholar
  18. 18.
    Zhang, C., Zhang, K., Yuan, Q., Zhang, L., Hanratty, T., Han, J.: Gmove: group-level mobility modeling using geo-tagged social media. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1305–1314. ACM (2016)Google Scholar
  19. 19.
    Zheng, Y., Zhang, L., Xie, X., Ma, W.-Y.: Mining interesting locations and travel sequences from GPS trajectories. In: Proceedings of the 18th International Conference on World Wide Web, pp. 791–800. ACM (2009)Google Scholar
  20. 20.
    Zhou, C., Frankowski, D., Ludford, P., Shekhar, S., Terveen, L.: Discovering personally meaningful places: an interactive clustering approach. ACM Trans. Inf. Syst. (TOIS) 25(3), 12 (2007)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  • Zhenyu Chen
    • 1
    • 2
    Email author
  • Yanyan Fu
    • 1
  • Min Zhang
    • 1
  • Zhenfeng Zhang
    • 1
  • Hao Li
    • 1
  1. 1.Institute of Software Chinese Academy of ScienceBeijingChina
  2. 2.University of Chinese Academy of SciencesBeijingChina

Personalised recommendations