Skip to main content

Privacy-Aware Mobility Data Exploration

  • Chapter
  • First Online:
Mobility Data Management and Exploration

Abstract

The increasing availability of data due to the explosion of mobile devices and positioning technologies has led to the development of efficient mobility data management and mining techniques. However, the analysis of such data may enhance significant risks regarding individuals’ privacy. Consider for example a user requesting a service for nearby points of interest (POI), such as restaurants or pharmacies. Even if hiding user identifier, the request contains enough information to identify the requester. By linking exact coordinates sent to the service provider with public available information about POI’s, a third party can increase the probability that the request was sent e.g. from user’s home. Consequently, location data should be kept confidential since its disclosure may represent a brutal violation of privacy protection rights. Moreover, developing techniques able to analyze and extract significant patterns from traces left by moving objects can provide insight to the data holders and support to decision-making and strategic planning activities (consider, for instance, patterns depicting typical movement behavior of people moving in an urban environment and how these patterns evolve over time). For this reason, publishing mobility data for analysis purposes is an unavoidable need. But what kinds of privacy threats rise if a MOD is released? By linking an anonymous MOD with public available information, is a malevolent user able to conclude personal behaviors or, even worse, uniquely re-identify the user behind a trajectory? This chapter provides a survey regarding privacy-preservation techniques for location and moving object data. In particular, we discuss the challenges with respect to privacy on mobility data, focusing on three categories of privacy-preservation techniques, namely (a) privacy in the context of Location-based Services (LBS), where a trusted server aims at providing the service without threatening the anonymity of the user requiring the service, (b) privacy-preserving mobility data publishing, where the goal is to release a sanitized version of the original MOD for public use, and (c) privacy-aware mobility data querying, where the focus is on providing anonymous answers to queries posed by the users to a MOD that is maintained in-house.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Abul O, Bonchi F, Nanni M (2008) Never walk alone: uncertainty for anonymity in moving objects databases. In: Proceedings of ICDE

    Google Scholar 

  • Abul O, Bonchi F, Nanni M (2010) Anonymization of moving objects databases by clustering and perturbation. Inf Syst 35(8):884–910

    Article  Google Scholar 

  • Beresford AR, Stajano F (2003) Location privacy in pervasive computing. IEEE Pervasive Comput 2(1):46–55

    Article  Google Scholar 

  • Cavoukian A (2012) Privacy by design [leading edge]. IEEE Technol Soc Mag 31(4):18–19

    Article  Google Scholar 

  • Cheng R, Zhang Y, Bertino E, Prabhakar S (2006) Preserving user location privacy in mobile data management infrastructures. In: Proceedings of PET

    Google Scholar 

  • Chow CY, Mokbel M (2007) Enabling private continuous queries for revealed user locations. In: Proceedings of SSTD

    Google Scholar 

  • Chow CY, Mokbel MF (2011) Trajectory privacy in location-based services and data publication. ACM SIGKDD Explor 13(1):19–29

    Article  Google Scholar 

  • Freudiger J, Raya M, Félegyházi M, Papadimitratos P (2007) Mix-zones for location privacy in vehicular networks. In: Proceedings of Win-ITS

    Google Scholar 

  • Gkoulalas-Divanis A, Verykios VS (2008) A privacy–aware trajectory tracking query engine. SIGKDD Explor 10(1):40–49

    Article  Google Scholar 

  • Gkoulalas-Divanis A, Kalnis P, Verykios VS (2010) Providing k-anonymity in location based services. ACM SIGKDD Explor 12(1):3–10

    Article  Google Scholar 

  • Gruteser M, Grunwald D (2003) Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of MOBISYS

    Google Scholar 

  • Hoh B, Gruteser M (2005) Protecting location privacy through path confusion. In: Proceedings of SECURECOMM

    Google Scholar 

  • Kalnis P, Ghinita G, Mouratidis K, Papadias D (2007) Preventing location-based identity inference in anonymous spatial queries. IEEE Trans Knowl Data Eng 19(12):1719–1733

    Article  Google Scholar 

  • Mokbel MF, Chow CY, Aref WG (2006) The new Casper: query processing for location services without compromising privacy. In: Proceedings of VLDB

    Google Scholar 

  • Monreale A, Andrienko G, Andrienko N, Giannotti F, Pedreschi D, Rinzivillo S, Wrobel S (2010) Movement data anonymity through generalization. Trans Data Priv 3(2):91–121

    MathSciNet  Google Scholar 

  • Monreale A, Trasarti R, Pedreschi D, Renso C, Bogorny V (2011) C-safety: a framework for the anonymization of semantic trajectories. Trans Data Priv 4(2):73–101

    MathSciNet  Google Scholar 

  • Nergiz ME, Atzori M, Saygin Y (2008) Towards trajectory anonymization: a generalization-based approach. In: Proceedings of ACM GIS workshop on security and privacy in GIS and LBS

    Google Scholar 

  • Palanisamy B, Liu L (2011) MobiMix: protecting location privacy with mix-zones over road networks. In: Proceedings of ICDE

    Google Scholar 

  • Pan X, Meng X, Xu J (2009) Distortion-based anonymity for continuous queries in location-based mobile services. In: Proceedings of GIS

    Google Scholar 

  • Pelekis N, Gkoulalas-Divanis A, Vodas M, Kopanaki D, Theodoridis Y (2011) Privacy-aware querying over sensitive trajectory data. In: Proceedings of CIKM

    Google Scholar 

  • Pelekis N, Gkoulalas-Divanis A, Vodas M, Plemenos A, Kopanaki D, Theodoridis Y (2012) Private-HERMES: a benchmark framework for privacy-preserving mobility data querying and mining methods. In: Proceedings of EDBT

    Google Scholar 

  • Terrovitis M, Mamoulis N (2008) Privacy preservation in the publication of trajectories. In: Proceedings of MDM

    Google Scholar 

  • Xu T, Cai Y (2008) Exploring historical location data for anonymity preservation in location-based services. In: Proceedings of INFOCOM

    Google Scholar 

  • Zacharouli P, Gkoulalas-Divanis A, Verykios V (2007) A k-anonymity model for spatiotemporal data. In: Proceedings of STDM

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer Science+Business Media New York

About this chapter

Cite this chapter

Pelekis, N., Theodoridis, Y. (2014). Privacy-Aware Mobility Data Exploration. In: Mobility Data Management and Exploration. Springer, New York, NY. https://doi.org/10.1007/978-1-4939-0392-4_8

Download citation

  • DOI: https://doi.org/10.1007/978-1-4939-0392-4_8

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4939-0391-7

  • Online ISBN: 978-1-4939-0392-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics