ABSTRACT
Existing approaches for privacy-aware mobility data sharing aim at publishing an anonymized version of the mobility dataset, operating under the assumption that most of the information in the original dataset can be disclosed without causing any privacy violations. In this paper, we assume that the majority of the information that exists in the mobility dataset must remain private and the data has to stay in-house to the hosting organization. To facilitate privacy-aware sharing of the mobility data we develop a trajectory query engine that allows subscribed users to gain restricted access to the database to accomplish various analysis tasks. The proposed engine (i) audits queries for trajectory data to block potential attacks to user privacy, (ii) supports range, distance, and k-nearest neighbors spatial and spatiotemporal queries, and (iii) preserves user anonymity in answers to queries by (a) augmenting the real trajectories with a set of carefully crafted, realistic fake trajectories, and (b) ensuring that no user-specific sensitive locations are reported as part of the returned trajectories.
- O. Abul, , F. Bonchi, and M. Nanni. Never walk alone: Uncertainty for anonymity in moving objects databases. In ICDE, pages 376--385, 2008. Google ScholarDigital Library
- N. R. Adam and J. C. Worthmann. Security--control methods for statistical databases: A comparative study. ACM Computing Surveys, 21(4):515--556, 1989. Google ScholarDigital Library
- S. Brakatsoulas, D. Pfoser, R. Salas, and C. Wenk. On map--matching vehicle tracking data. In VLDB, pages 853--864, 2005. Google ScholarDigital Library
- T. Brinkhoff. A framework for generating network-based moving objects. Geoinformatica, 6(2):153--180, 2002. Google ScholarDigital Library
- D. Douglas and T. Peucker. Algorithms for the reduction of the number of points required to represent a digitized line or its caricature. Canadian Cartographer, 10(2):112--122, 1973.Google ScholarCross Ref
- A. Gkoulalas-Divanis and V. S. Verykios. A privacy-aware trajectory tracking query engine. SIGKDD Explorations, 10(1):40--49, 2008. Google ScholarDigital Library
- B. Hoh and M. Gruteser. Protecting location privacy through path confusion. In SECURECOMM, pages 194--205, 2005. Google ScholarDigital Library
- B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady. Preserving privacy in \mboxGPS traces via uncertainty-aware path cloaking. In CCS, pages 161--171, 2007. Google ScholarDigital Library
- J.-G. Lee, J. Han, and K.-Y. Whang. Trajectory clustering: A partition-and-group framework. In SIGMOD, pages 593--604, 2007. Google ScholarDigital Library
- K. LeFevre, D. DeWitt, and R. Ramakrishnan. Mondrian multidimensional k-anonymity. In ICDE, page 25, 2006. Google ScholarDigital Library
- M. E. Nergiz, M. Atzori, and Y. Saygin. Towards trajectory anonymization: A generalization-based approach. In \mboxACM GIS Workshop on Security and Privacy in GIS and LBS, pages 1--10, 2008. Google ScholarDigital Library
- N. Pelekis, E. Frentzos, N. Giatrakos, and Y. Theodoridis. HERMES: Aggregative LBS via a trajectory DB engine. In SIGMOD, pages 1255--1258, 2008. Google ScholarDigital Library
- N. Pelekis, I. Kopanakis, E. E. Kotsifakos, E. Frentzos, and Y. Theodoridis. Clustering uncertain trajectories. KAIS. to appear. Google ScholarDigital Library
- D. Pfoser, C. S. Jensen, and Y. Theodoridis. Novel approaches to the indexing of moving object trajectories. In VLDB, pages 395--406, 2000. Google ScholarDigital Library
- P. Samarati. Protecting respondents' identities in microdata release. TKDE, 13(6):1010--1027, 2001. Google ScholarDigital Library
- L. Sweeney. K-anonymity: A model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge Based Systems, 10(5):557--570, 2002. Google ScholarDigital Library
- M. Terrovitis and N. Mamoulis. Privacy preservation in the publication of trajectories. In MDM, pages 65--72, 2008. Google ScholarDigital Library
Index Terms
- Privacy-aware querying over sensitive trajectory data
Recommendations
Personalized semantic trajectory privacy preservation through trajectory reconstruction
AbstractTrajectory data gathered by mobile positioning techniques and location-aware devices contain plenty of sensitive spatial-temporal and semantic information, and can support many applications through data analysing and mining. However, attribute-...
Protecting sensitive place visits in privacy-preserving trajectory publishing
Highlights- We propose a method for privacy-preserving trajectory publishing.
- It aims at ...
AbstractThe rise of mobile computing has generated huge amount of trajectory data. Since these data are valuable for many people, publishing them while providing adequate individual privacy protection has been a challenging task. In this paper,...
Privacy-preserving data sharing in cloud computing
Storing and sharing databases in the cloud of computers raise serious concern of individual privacy. We consider two kinds of privacy risk: presence leakage, by which the attackers can explicitly identify individuals in (or not in) the database, and ...
Comments