Privacy Preservation for Trajectory Data Publishing by Look-Up Table Generalization

  • Nattapon Harnsamut
  • Juggapong NatwichaiEmail author
  • Surapon Riyana
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10837)


With the increasing of location-aware devices, it is easy to collect the trajectory of a person which can be represented as a sequence of visited locations with regard to timestamps. For some applications such as traffic management and location-based advertising, the trajectory data may need to be published with other private information. However, revealing the private trajectory and sensitive information of user poses privacy concerns especially when an adversary has the background knowledge of target user, i.e., partial trajectory information. In general, data transformation is needed to ensure privacy preservation before data releasing. Not only the privacy has to be preserved, but also the data quality issue must be addressed, i.e., the impact on data quality after the transformation should be minimized. LKC-privacy model is a well-known model to anonymize the trajectory data that are published with the sensitive information. However, computing the optimal LKC-privacy solution on trajectory data by the brute-force (BF) algorithm with full-domain generalization technique is highly time-consuming. In this paper, we propose a look-up table brute-force (LT-BF) algorithm to preserve privacy and maintain the data quality based on LKC-privacy model in the scenarios which the generalization technique is applied to anonymize the trajectory data efficiently. Subsequently, our proposed algorithm is evaluated with experiments. The results demonstrate that our proposed algorithm is not only returns the optimal solution as the BF algorithm, but also it is highly efficient.


Privacy Trajectory data publishing LKC-privacy 



This work was supported by the Graduate School, Chiang Mai University, Thailand.


  1. 1.
    Mohammed, N., Fung, B.C.M., Debbabi, M.: Walking in the crowd: anonymizing trajectory data for pattern analysis. In: Proceeding of the 18th ACM Conference on Information and Knowledge Management, pp. 1441–1444 (2009)Google Scholar
  2. 2.
    Fung, B.C.M., Wang, K., Chen, R., Yu, P.S.: Privacy-preserving data publishing: a survey of recent developments. ACM Comput. Surv. 42, 1–53 (2010)CrossRefGoogle Scholar
  3. 3.
    Mohammed, N., Fung, B.C.M., Lee, C.K.: Centralized and distributed anonymization for high-dimensional healthcare data. ACM Trans. Knowl. Discov. Data 4, 1–33 (2010)CrossRefGoogle Scholar
  4. 4.
    Chen, R., Fung, B.C., Mohammed, N., Desai, B.C., Wang, K.: Privacy-preserving trajectory data publishing by local suppression. Inf. Sci. 231, 83–97 (2013)CrossRefGoogle Scholar
  5. 5.
    Ghasemzadeh, M., Fung, B.C.M., Chen, R., Awasthi, A.: Anonymizing trajectory data for passenger flow analysis. Transp. Res. Part C: Emerg. Technol. 39, 63–79 (2014)CrossRefGoogle Scholar
  6. 6.
    Bangkok Insurance: Data security policy. (2015)
  7. 7.
    O’Halloran, M., Glavin, M.: RFID patient tagging and database system. In: International Conference on Networking, Systems, Mobile Communications and Learning Technologies, p. 162 (2006)Google Scholar
  8. 8.
    Robin, D., Saravanan, S., Wanlei, Z.: A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems. Ad Hoc Netw. 11, 383–396 (2013)CrossRefGoogle Scholar
  9. 9.
    Zhu, T., Xiong, P., Li, G.K., Zhou, W.: Correlated differential privacy: hiding information in non-IID data set. IEEE Trans. Inf. Forensics Secur. 10, 229–242 (2015)CrossRefGoogle Scholar
  10. 10.
    Fung, B., Al-Hussaeni, K., Cao, M.: Preserving RFID data privacy. In: 2009 IEEE International Conference on RFID, pp. 200–207 (2009)Google Scholar
  11. 11.
    Fung, B.C.M., Cao, M., Desai, B.C., Xu, H.: Privacy protection for RFID data. In: Proceedings of the ACM Symposium on Applied Computing, pp. 1528–1535 (2009)Google Scholar
  12. 12.
    Al-Hussaeni, K., Fung, B.C., Cheung, W.K.: Privacy-preserving trajectory stream publishing. Data Knowl. Eng. 94, 89–109 (2014)CrossRefGoogle Scholar
  13. 13.
    Harnsamut, N., Natwichai, J.: Privacy preservation for trajectory data publishing and heuristic approach. In: Barolli, L., Enokido, T., Takizawa, M. (eds.) NBiS 2017. LNDECT, vol. 7, pp. 787–797. Springer, Cham (2018). Scholar
  14. 14.
    Wong, R., Li, J., Fu, A., Wang, K.: (\(\alpha \), K)-anonymous data publishing. J. Intell. Inf. Syst. 33, 209–234 (2009)CrossRefGoogle Scholar
  15. 15.
    Mohammed, N., Fung, B.C.M., Debbabi, M.: Preserving privacy and utility in RFID data publishing. Technical report 6850 (2010)Google Scholar
  16. 16.
    Komishani, E.G., Abadi, M., Deldar, F.: PPTD: preserving personalized privacy in trajectory data publishing by sensitive attribute generalization and trajectory local suppression. Knowl.-Based Syst. 94, 43–59 (2016)CrossRefGoogle Scholar
  17. 17.
    Aggarwal, C.C.: On K-anonymity and the curse of dimensionality. In: Proceedings of the 31st International Conference on Very Large Databases, pp. 901–909 (2005)Google Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  • Nattapon Harnsamut
    • 1
  • Juggapong Natwichai
    • 1
    Email author
  • Surapon Riyana
    • 1
  1. 1.Data Engineering and Network Technology Laboratory, Department of Computer Engineering, Faculty of EngineeringChiang Mai UniversityChiang MaiThailand

Personalised recommendations