Skip to main content

A Survey of Privacy-Preserving Techniques on Trajectory Data

  • Conference paper
  • First Online:
Parallel Architectures, Algorithms and Programming (PAAP 2019)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1163))

Abstract

How to protect user’s trajectory privacy while ensuing the user’s access to high quality services is the core of the study of trajectory privacy protection technology. With the rapid development of mobile devices and Location Based Service (LBS), the amount of locations and trajectories of moving objects collected by service providers is continuously increasing. On one hand, the collected trajectories contains rich spatial-temporal information, and its analysis and mining can support a variety of innovative applications. Since trajectories enable intrusive inferences which may expose private information, such as individual habits, behavioral patterns, social relationships and so on, directly publishing trajectories may result in individual privacy vulnerable to various threats. On the other hand, the existing techniques are unable to prevent trajectory privacy leakage, so the complete real-time trajectories of individuals may be exposed when they request for LBS, even if their location privacy is protected by common data protection mechanisms. Therefore, specific techniques for trajectory privacy preserving have been proposed in accordance with different application requirements. In the trajectory data publishing scenario, privacy preserving techniques must preserve data utility. In the LBS scenario, privacy preserving techniques must guarantee high quality of services. In this survey, we overview the key challenges and main techniques of trajectory privacy protection for the above requirements respectively.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ghasemzadeh, M., Fung, B.C.M., Chen, R., Awasthi, A.: Anonymizing trajectory data for passenger flow analysis. Transp. Res. Part C Emerg. Technol. 39(2), 63–79 (2014)

    Article  Google Scholar 

  2. Domingo-Ferrer, J., Trujillo-Rasua, R.: Microaggregation- and permutation-based anonymization of movement data. Elsevier Science Inc. (2012)

    Google Scholar 

  3. Rowe, M.: Applying semantic social graphs to disambiguate identity references. In: Aroyo, L., et al. (eds.) ESWC 2009. LNCS, vol. 5554, pp. 461–475. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-02121-3_35

    Chapter  Google Scholar 

  4. Kaplan, E., Pedersen, T.B., Savas, E., Saygin, Y.: Discovering private trajectories using background information. Data Knowl. Eng. 69(7), 723–736 (2010)

    Article  Google Scholar 

  5. Thimmarayappa, S., Megha, V.: Big data privacy and management. Int. J. Comput. Appl. 107(6), 13–16 (2014)

    Google Scholar 

  6. Shokri, R., Theodorakopoulos, G., Troncoso, C., Hubaux, J.P., Le Boudec, J.Y.: Protecting location privacy: optimal strategy against localization attacks. In: ACM Conference on Computer and Communications Security, pp. 617–627 (2012)

    Google Scholar 

  7. Terrovitis, M., Mamoulis, N., Kalnis, P.: Local and global recoding methods for anonymizing set-valued data. VLDB J. 20(1), 83–106 (2011)

    Article  Google Scholar 

  8. Gao, S., Ma, J., Sun, C., Li, X.: Balancing trajectory privacy and data utility using a personalized anonymization model. J. Netw. Comput. Appl. 38(1), 125–134 (2014)

    Article  Google Scholar 

  9. Tramp, S., Frischmuth, P., Arndt, N., Ermilov, T., Auer, S.: Weaving a distributed, semantic social network for mobile users. In: Antoniou, G., et al. (eds.) ESWC 2011. LNCS, vol. 6643, pp. 200–214. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-21034-1_14

    Chapter  Google Scholar 

  10. Bonchi, F., Lakshmanan, L.V.S., Wang, H.: Trajectory anonymity in publishing personal mobility data. ACM Sigkdd Explor. Newsl. 13(1), 30–42 (2011)

    Article  Google Scholar 

  11. Pingley, A., Zhang, N., Fu, X., Choi, H.A.: Protection of query privacy for continuous location based services. In: 2011 Proceedings IEEE INFOCOM, pp. 1710–1718 (2013)

    Google Scholar 

  12. Li, H., Shen, Y., Sang, T.: An efficient method for privacy preserving trajectory data publishing based on data partitioning. J. Supercomput. (2019)

    Google Scholar 

  13. Lin, Y., Lin, C., Kong, X., Feng, X., Wu, G.: A clustering based location privacy protection scheme for pervasive computing. In: Green Computing and Communications, pp. 719–726 (2011)

    Google Scholar 

  14. Sang, Y., Shen, H., Tian, H.: Privacy preserving tuple matching in distributed databases. IEEE Trans. Knowl. Data Eng. 21(12), 1767–1782 (2009)

    Article  Google Scholar 

  15. Sweeney, L.: k anonymity a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10(05), 557–570 (2002)

    Article  MathSciNet  Google Scholar 

  16. Li, S., Shen, H., Sang, Y.: An efficient model and algorithm for privacy-preserving trajectory data publishing. In: Park, J.H., Shen, H., Sung, Y., Tian, H. (eds.) PDCAT 2018. CCIS, vol. 931, pp. 240–249. Springer, Singapore (2019). https://doi.org/10.1007/978-981-13-5907-1_25

    Chapter  Google Scholar 

  17. Sun, X., Sun, L., Wang, H.: Extended k anonymity models against sensitive attribute disclosure (2011)

    Article  Google Scholar 

  18. Poulis, G., Skiadopoulos, S., Loukides, G., Gkoulalas-Divanis, A.: Distance based km anonymization of trajectory data. In: IEEE International Conference on Mobile Data Management, pp. 57–62 (2013)

    Google Scholar 

  19. Aslam, B., Amjad, F., Zou, C.C.: Pmtr, privacy enhancing multilayer trajectory-based routing protocol for vehicular ad hoc networks. In: MILCOM 2013 2013 IEEE Military Communications Conference, pp. 882–887 (2013)

    Google Scholar 

  20. Yigitoglu, E., Damiani, M.L., Abul, O., Silvestri, C.: Privacy preserving sharing of sensitive semantic locations under road-network constraints. In: IEEE International Conference on Mobile Data Management, pp. 186–195 (2012)

    Google Scholar 

  21. Sanchez, D., Castella Roca, J., Viejo, A.: Knowledge based scheme to create privacy preserving but semantically related queries for web search engines. Inf. Sci. 218(1), 17–30 (2013)

    Article  Google Scholar 

  22. Chow, C.Y., Mokbel, M.F., Liu, X.: Spatial cloaking for anonymous location based services in mobile peer to peer environments. Geoinformatica 15(2), 351–380 (2011)

    Article  Google Scholar 

  23. Xin, Y., Xie, Z.Q., Yang, J.: The privacy preserving method for dynamic trajectory releasing based on adaptive clustering. Inf. Sci. 378, 131–143 (2017)

    Article  Google Scholar 

  24. Al-Hussaeni, K., Fung, B.C.M., Cheung, W.K.: Privacy preserving trajectory stream publishing. Data Knowl. Eng. 94(PA), 89–109 (2014)

    Article  Google Scholar 

  25. Lefevre, K., Dewitt, D.J., Ramakrishnan, R.: Incognito: efficient full-domain k-anonymity. In: Proceedings of 2005 ACM SIGMOD International Conference on Management of Data, SIGMOD 2005, New York, NY, USA, pp. 49–60 (2005)

    Google Scholar 

  26. Cao, J., Karras, P., Kalnis, P., Tan, K.L.: SABRE: a sensitive attribute bucketization and redistribution framework for t closeness. VLDB J. Int. J. Very Large Data Bases 20(1), 59–81 (2011)

    Article  Google Scholar 

  27. Lee, K.C.K., Zheng, B., Chen, C., Chow, C.Y.: Efficient index based approaches for skyline queries in location based applications. IEEE Trans. Knowl. Data Eng. 25(11), 2507–2520 (2013)

    Article  Google Scholar 

  28. Chen, R., Fung, B.C.M., Mohammed, N., Desai, B.C., Wang, K.: Privacy preserving trajectory data publishing by local suppression. Inf. Sci. Int. J. 231(1), 83–97 (2013)

    MATH  Google Scholar 

  29. Sang, Y., Shen, H.: Efficient and secure protocols for privacy preserving set operations. ACM Trans. Inf. Syst. Secur. 13(1), 1–35 (2009)

    Article  Google Scholar 

  30. Xu, Q., Shen, H., Sang, Y., Tian, H.: Privacy preserving ranked fuzzy keyword search over encrypted cloud data. In: International Conference on Parallel and Distributed Computing, Applications and Technologies, pp. 239–245 (2013)

    Google Scholar 

  31. Mano, K., Minami, K., Maruyama, H.: Privacy preserving publishing of pseudonym based trajectory location data set. In: Eighth International Conference on Availability, Reliability and Security, pp. 615–624 (2013)

    Google Scholar 

  32. Gao, S., Ma, J., Shi, W., Zhan, G., Sun, C.: TrPF, a trajectory privacy preserving framework for participatory sensing. IEEE Trans. Inf. Forensics Secur. 8(6), 874–887 (2013)

    Article  Google Scholar 

  33. Zhou, L., Ding, L., Finin, T.: How is the semantic web evolving, a dynamic social network perspective. Comput. Hum. Behav. 27(4), 1294–1302 (2011)

    Article  Google Scholar 

  34. Bayardo, R.J., Agrawal, R.: Data privacy through optimal k anonymization. In: International Conference on Data Engineering, 2005, ICDE 2005, Proceedings, pp. 217–228 (2005)

    Google Scholar 

  35. Xu, J., Wang, W., Pei, J., Wang, X., Shi, B., Fu, W.C.: Utility based anonymization using local recoding. In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 785–790 (2006)

    Google Scholar 

  36. Sang, Y., Shen, H., Tian, H., Zhang, Z.: Achieving probabilistic anonymity in a linear and hybrid randomization model. IEEE Trans. Inf. Forensics Secur. 11(10), 2187–2202 (2016)

    Article  Google Scholar 

  37. Xu, Q., Shen, H., Sang, Y., Tian, H.: Privacy preserving ranked fuzzy keyword search over encrypted cloud data. In: International Conference on Parallel and Distributed Computing, Applications and Technologies, pp. 239–245 (2014)

    Google Scholar 

Download references

Acknowledgment

This work is supported by National Key R & D Program of China Project #2017YFB0203201, Science and Technology Program of Guangdong Province, China (No. 2017A010101039).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Songyuan Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Li, S., Shen, H., Sang, Y. (2020). A Survey of Privacy-Preserving Techniques on Trajectory Data. In: Shen, H., Sang, Y. (eds) Parallel Architectures, Algorithms and Programming. PAAP 2019. Communications in Computer and Information Science, vol 1163. Springer, Singapore. https://doi.org/10.1007/978-981-15-2767-8_41

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-2767-8_41

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-2766-1

  • Online ISBN: 978-981-15-2767-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics