Abstract
How to protect user’s trajectory privacy while ensuing the user’s access to high quality services is the core of the study of trajectory privacy protection technology. With the rapid development of mobile devices and Location Based Service (LBS), the amount of locations and trajectories of moving objects collected by service providers is continuously increasing. On one hand, the collected trajectories contains rich spatial-temporal information, and its analysis and mining can support a variety of innovative applications. Since trajectories enable intrusive inferences which may expose private information, such as individual habits, behavioral patterns, social relationships and so on, directly publishing trajectories may result in individual privacy vulnerable to various threats. On the other hand, the existing techniques are unable to prevent trajectory privacy leakage, so the complete real-time trajectories of individuals may be exposed when they request for LBS, even if their location privacy is protected by common data protection mechanisms. Therefore, specific techniques for trajectory privacy preserving have been proposed in accordance with different application requirements. In the trajectory data publishing scenario, privacy preserving techniques must preserve data utility. In the LBS scenario, privacy preserving techniques must guarantee high quality of services. In this survey, we overview the key challenges and main techniques of trajectory privacy protection for the above requirements respectively.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ghasemzadeh, M., Fung, B.C.M., Chen, R., Awasthi, A.: Anonymizing trajectory data for passenger flow analysis. Transp. Res. Part C Emerg. Technol. 39(2), 63–79 (2014)
Domingo-Ferrer, J., Trujillo-Rasua, R.: Microaggregation- and permutation-based anonymization of movement data. Elsevier Science Inc. (2012)
Rowe, M.: Applying semantic social graphs to disambiguate identity references. In: Aroyo, L., et al. (eds.) ESWC 2009. LNCS, vol. 5554, pp. 461–475. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-02121-3_35
Kaplan, E., Pedersen, T.B., Savas, E., Saygin, Y.: Discovering private trajectories using background information. Data Knowl. Eng. 69(7), 723–736 (2010)
Thimmarayappa, S., Megha, V.: Big data privacy and management. Int. J. Comput. Appl. 107(6), 13–16 (2014)
Shokri, R., Theodorakopoulos, G., Troncoso, C., Hubaux, J.P., Le Boudec, J.Y.: Protecting location privacy: optimal strategy against localization attacks. In: ACM Conference on Computer and Communications Security, pp. 617–627 (2012)
Terrovitis, M., Mamoulis, N., Kalnis, P.: Local and global recoding methods for anonymizing set-valued data. VLDB J. 20(1), 83–106 (2011)
Gao, S., Ma, J., Sun, C., Li, X.: Balancing trajectory privacy and data utility using a personalized anonymization model. J. Netw. Comput. Appl. 38(1), 125–134 (2014)
Tramp, S., Frischmuth, P., Arndt, N., Ermilov, T., Auer, S.: Weaving a distributed, semantic social network for mobile users. In: Antoniou, G., et al. (eds.) ESWC 2011. LNCS, vol. 6643, pp. 200–214. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-21034-1_14
Bonchi, F., Lakshmanan, L.V.S., Wang, H.: Trajectory anonymity in publishing personal mobility data. ACM Sigkdd Explor. Newsl. 13(1), 30–42 (2011)
Pingley, A., Zhang, N., Fu, X., Choi, H.A.: Protection of query privacy for continuous location based services. In: 2011 Proceedings IEEE INFOCOM, pp. 1710–1718 (2013)
Li, H., Shen, Y., Sang, T.: An efficient method for privacy preserving trajectory data publishing based on data partitioning. J. Supercomput. (2019)
Lin, Y., Lin, C., Kong, X., Feng, X., Wu, G.: A clustering based location privacy protection scheme for pervasive computing. In: Green Computing and Communications, pp. 719–726 (2011)
Sang, Y., Shen, H., Tian, H.: Privacy preserving tuple matching in distributed databases. IEEE Trans. Knowl. Data Eng. 21(12), 1767–1782 (2009)
Sweeney, L.: k anonymity a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10(05), 557–570 (2002)
Li, S., Shen, H., Sang, Y.: An efficient model and algorithm for privacy-preserving trajectory data publishing. In: Park, J.H., Shen, H., Sung, Y., Tian, H. (eds.) PDCAT 2018. CCIS, vol. 931, pp. 240–249. Springer, Singapore (2019). https://doi.org/10.1007/978-981-13-5907-1_25
Sun, X., Sun, L., Wang, H.: Extended k anonymity models against sensitive attribute disclosure (2011)
Poulis, G., Skiadopoulos, S., Loukides, G., Gkoulalas-Divanis, A.: Distance based km anonymization of trajectory data. In: IEEE International Conference on Mobile Data Management, pp. 57–62 (2013)
Aslam, B., Amjad, F., Zou, C.C.: Pmtr, privacy enhancing multilayer trajectory-based routing protocol for vehicular ad hoc networks. In: MILCOM 2013 2013 IEEE Military Communications Conference, pp. 882–887 (2013)
Yigitoglu, E., Damiani, M.L., Abul, O., Silvestri, C.: Privacy preserving sharing of sensitive semantic locations under road-network constraints. In: IEEE International Conference on Mobile Data Management, pp. 186–195 (2012)
Sanchez, D., Castella Roca, J., Viejo, A.: Knowledge based scheme to create privacy preserving but semantically related queries for web search engines. Inf. Sci. 218(1), 17–30 (2013)
Chow, C.Y., Mokbel, M.F., Liu, X.: Spatial cloaking for anonymous location based services in mobile peer to peer environments. Geoinformatica 15(2), 351–380 (2011)
Xin, Y., Xie, Z.Q., Yang, J.: The privacy preserving method for dynamic trajectory releasing based on adaptive clustering. Inf. Sci. 378, 131–143 (2017)
Al-Hussaeni, K., Fung, B.C.M., Cheung, W.K.: Privacy preserving trajectory stream publishing. Data Knowl. Eng. 94(PA), 89–109 (2014)
Lefevre, K., Dewitt, D.J., Ramakrishnan, R.: Incognito: efficient full-domain k-anonymity. In: Proceedings of 2005 ACM SIGMOD International Conference on Management of Data, SIGMOD 2005, New York, NY, USA, pp. 49–60 (2005)
Cao, J., Karras, P., Kalnis, P., Tan, K.L.: SABRE: a sensitive attribute bucketization and redistribution framework for t closeness. VLDB J. Int. J. Very Large Data Bases 20(1), 59–81 (2011)
Lee, K.C.K., Zheng, B., Chen, C., Chow, C.Y.: Efficient index based approaches for skyline queries in location based applications. IEEE Trans. Knowl. Data Eng. 25(11), 2507–2520 (2013)
Chen, R., Fung, B.C.M., Mohammed, N., Desai, B.C., Wang, K.: Privacy preserving trajectory data publishing by local suppression. Inf. Sci. Int. J. 231(1), 83–97 (2013)
Sang, Y., Shen, H.: Efficient and secure protocols for privacy preserving set operations. ACM Trans. Inf. Syst. Secur. 13(1), 1–35 (2009)
Xu, Q., Shen, H., Sang, Y., Tian, H.: Privacy preserving ranked fuzzy keyword search over encrypted cloud data. In: International Conference on Parallel and Distributed Computing, Applications and Technologies, pp. 239–245 (2013)
Mano, K., Minami, K., Maruyama, H.: Privacy preserving publishing of pseudonym based trajectory location data set. In: Eighth International Conference on Availability, Reliability and Security, pp. 615–624 (2013)
Gao, S., Ma, J., Shi, W., Zhan, G., Sun, C.: TrPF, a trajectory privacy preserving framework for participatory sensing. IEEE Trans. Inf. Forensics Secur. 8(6), 874–887 (2013)
Zhou, L., Ding, L., Finin, T.: How is the semantic web evolving, a dynamic social network perspective. Comput. Hum. Behav. 27(4), 1294–1302 (2011)
Bayardo, R.J., Agrawal, R.: Data privacy through optimal k anonymization. In: International Conference on Data Engineering, 2005, ICDE 2005, Proceedings, pp. 217–228 (2005)
Xu, J., Wang, W., Pei, J., Wang, X., Shi, B., Fu, W.C.: Utility based anonymization using local recoding. In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 785–790 (2006)
Sang, Y., Shen, H., Tian, H., Zhang, Z.: Achieving probabilistic anonymity in a linear and hybrid randomization model. IEEE Trans. Inf. Forensics Secur. 11(10), 2187–2202 (2016)
Xu, Q., Shen, H., Sang, Y., Tian, H.: Privacy preserving ranked fuzzy keyword search over encrypted cloud data. In: International Conference on Parallel and Distributed Computing, Applications and Technologies, pp. 239–245 (2014)
Acknowledgment
This work is supported by National Key R & D Program of China Project #2017YFB0203201, Science and Technology Program of Guangdong Province, China (No. 2017A010101039).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Li, S., Shen, H., Sang, Y. (2020). A Survey of Privacy-Preserving Techniques on Trajectory Data. In: Shen, H., Sang, Y. (eds) Parallel Architectures, Algorithms and Programming. PAAP 2019. Communications in Computer and Information Science, vol 1163. Springer, Singapore. https://doi.org/10.1007/978-981-15-2767-8_41
Download citation
DOI: https://doi.org/10.1007/978-981-15-2767-8_41
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-2766-1
Online ISBN: 978-981-15-2767-8
eBook Packages: Computer ScienceComputer Science (R0)