Abstract
The increasing availability of data due to the explosion of mobile devices and positioning technologies has led to the development of efficient mobility data management and mining techniques. However, the analysis of such data may enhance significant risks regarding individuals’ privacy. Consider for example a user requesting a service for nearby points of interest (POI), such as restaurants or pharmacies. Even if hiding user identifier, the request contains enough information to identify the requester. By linking exact coordinates sent to the service provider with public available information about POI’s, a third party can increase the probability that the request was sent e.g. from user’s home. Consequently, location data should be kept confidential since its disclosure may represent a brutal violation of privacy protection rights. Moreover, developing techniques able to analyze and extract significant patterns from traces left by moving objects can provide insight to the data holders and support to decision-making and strategic planning activities (consider, for instance, patterns depicting typical movement behavior of people moving in an urban environment and how these patterns evolve over time). For this reason, publishing mobility data for analysis purposes is an unavoidable need. But what kinds of privacy threats rise if a MOD is released? By linking an anonymous MOD with public available information, is a malevolent user able to conclude personal behaviors or, even worse, uniquely re-identify the user behind a trajectory? This chapter provides a survey regarding privacy-preservation techniques for location and moving object data. In particular, we discuss the challenges with respect to privacy on mobility data, focusing on three categories of privacy-preservation techniques, namely (a) privacy in the context of Location-based Services (LBS), where a trusted server aims at providing the service without threatening the anonymity of the user requiring the service, (b) privacy-preserving mobility data publishing, where the goal is to release a sanitized version of the original MOD for public use, and (c) privacy-aware mobility data querying, where the focus is on providing anonymous answers to queries posed by the users to a MOD that is maintained in-house.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Abul O, Bonchi F, Nanni M (2008) Never walk alone: uncertainty for anonymity in moving objects databases. In: Proceedings of ICDE
Abul O, Bonchi F, Nanni M (2010) Anonymization of moving objects databases by clustering and perturbation. Inf Syst 35(8):884–910
Beresford AR, Stajano F (2003) Location privacy in pervasive computing. IEEE Pervasive Comput 2(1):46–55
Cavoukian A (2012) Privacy by design [leading edge]. IEEE Technol Soc Mag 31(4):18–19
Cheng R, Zhang Y, Bertino E, Prabhakar S (2006) Preserving user location privacy in mobile data management infrastructures. In: Proceedings of PET
Chow CY, Mokbel M (2007) Enabling private continuous queries for revealed user locations. In: Proceedings of SSTD
Chow CY, Mokbel MF (2011) Trajectory privacy in location-based services and data publication. ACM SIGKDD Explor 13(1):19–29
Freudiger J, Raya M, Félegyházi M, Papadimitratos P (2007) Mix-zones for location privacy in vehicular networks. In: Proceedings of Win-ITS
Gkoulalas-Divanis A, Verykios VS (2008) A privacy–aware trajectory tracking query engine. SIGKDD Explor 10(1):40–49
Gkoulalas-Divanis A, Kalnis P, Verykios VS (2010) Providing k-anonymity in location based services. ACM SIGKDD Explor 12(1):3–10
Gruteser M, Grunwald D (2003) Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of MOBISYS
Hoh B, Gruteser M (2005) Protecting location privacy through path confusion. In: Proceedings of SECURECOMM
Kalnis P, Ghinita G, Mouratidis K, Papadias D (2007) Preventing location-based identity inference in anonymous spatial queries. IEEE Trans Knowl Data Eng 19(12):1719–1733
Mokbel MF, Chow CY, Aref WG (2006) The new Casper: query processing for location services without compromising privacy. In: Proceedings of VLDB
Monreale A, Andrienko G, Andrienko N, Giannotti F, Pedreschi D, Rinzivillo S, Wrobel S (2010) Movement data anonymity through generalization. Trans Data Priv 3(2):91–121
Monreale A, Trasarti R, Pedreschi D, Renso C, Bogorny V (2011) C-safety: a framework for the anonymization of semantic trajectories. Trans Data Priv 4(2):73–101
Nergiz ME, Atzori M, Saygin Y (2008) Towards trajectory anonymization: a generalization-based approach. In: Proceedings of ACM GIS workshop on security and privacy in GIS and LBS
Palanisamy B, Liu L (2011) MobiMix: protecting location privacy with mix-zones over road networks. In: Proceedings of ICDE
Pan X, Meng X, Xu J (2009) Distortion-based anonymity for continuous queries in location-based mobile services. In: Proceedings of GIS
Pelekis N, Gkoulalas-Divanis A, Vodas M, Kopanaki D, Theodoridis Y (2011) Privacy-aware querying over sensitive trajectory data. In: Proceedings of CIKM
Pelekis N, Gkoulalas-Divanis A, Vodas M, Plemenos A, Kopanaki D, Theodoridis Y (2012) Private-HERMES: a benchmark framework for privacy-preserving mobility data querying and mining methods. In: Proceedings of EDBT
Terrovitis M, Mamoulis N (2008) Privacy preservation in the publication of trajectories. In: Proceedings of MDM
Xu T, Cai Y (2008) Exploring historical location data for anonymity preservation in location-based services. In: Proceedings of INFOCOM
Zacharouli P, Gkoulalas-Divanis A, Verykios V (2007) A k-anonymity model for spatiotemporal data. In: Proceedings of STDM
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer Science+Business Media New York
About this chapter
Cite this chapter
Pelekis, N., Theodoridis, Y. (2014). Privacy-Aware Mobility Data Exploration. In: Mobility Data Management and Exploration. Springer, New York, NY. https://doi.org/10.1007/978-1-4939-0392-4_8
Download citation
DOI: https://doi.org/10.1007/978-1-4939-0392-4_8
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4939-0391-7
Online ISBN: 978-1-4939-0392-4
eBook Packages: Computer ScienceComputer Science (R0)