skip to main content
10.1145/2063576.2063706acmconferencesArticle/Chapter ViewAbstractPublication PagescikmConference Proceedingsconference-collections
research-article

Privacy-aware querying over sensitive trajectory data

Published:24 October 2011Publication History

ABSTRACT

Existing approaches for privacy-aware mobility data sharing aim at publishing an anonymized version of the mobility dataset, operating under the assumption that most of the information in the original dataset can be disclosed without causing any privacy violations. In this paper, we assume that the majority of the information that exists in the mobility dataset must remain private and the data has to stay in-house to the hosting organization. To facilitate privacy-aware sharing of the mobility data we develop a trajectory query engine that allows subscribed users to gain restricted access to the database to accomplish various analysis tasks. The proposed engine (i) audits queries for trajectory data to block potential attacks to user privacy, (ii) supports range, distance, and k-nearest neighbors spatial and spatiotemporal queries, and (iii) preserves user anonymity in answers to queries by (a) augmenting the real trajectories with a set of carefully crafted, realistic fake trajectories, and (b) ensuring that no user-specific sensitive locations are reported as part of the returned trajectories.

References

  1. O. Abul, , F. Bonchi, and M. Nanni. Never walk alone: Uncertainty for anonymity in moving objects databases. In ICDE, pages 376--385, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. N. R. Adam and J. C. Worthmann. Security--control methods for statistical databases: A comparative study. ACM Computing Surveys, 21(4):515--556, 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. S. Brakatsoulas, D. Pfoser, R. Salas, and C. Wenk. On map--matching vehicle tracking data. In VLDB, pages 853--864, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. T. Brinkhoff. A framework for generating network-based moving objects. Geoinformatica, 6(2):153--180, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. D. Douglas and T. Peucker. Algorithms for the reduction of the number of points required to represent a digitized line or its caricature. Canadian Cartographer, 10(2):112--122, 1973.Google ScholarGoogle ScholarCross RefCross Ref
  6. A. Gkoulalas-Divanis and V. S. Verykios. A privacy-aware trajectory tracking query engine. SIGKDD Explorations, 10(1):40--49, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. B. Hoh and M. Gruteser. Protecting location privacy through path confusion. In SECURECOMM, pages 194--205, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady. Preserving privacy in \mboxGPS traces via uncertainty-aware path cloaking. In CCS, pages 161--171, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. J.-G. Lee, J. Han, and K.-Y. Whang. Trajectory clustering: A partition-and-group framework. In SIGMOD, pages 593--604, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. K. LeFevre, D. DeWitt, and R. Ramakrishnan. Mondrian multidimensional k-anonymity. In ICDE, page 25, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. M. E. Nergiz, M. Atzori, and Y. Saygin. Towards trajectory anonymization: A generalization-based approach. In \mboxACM GIS Workshop on Security and Privacy in GIS and LBS, pages 1--10, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. N. Pelekis, E. Frentzos, N. Giatrakos, and Y. Theodoridis. HERMES: Aggregative LBS via a trajectory DB engine. In SIGMOD, pages 1255--1258, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. N. Pelekis, I. Kopanakis, E. E. Kotsifakos, E. Frentzos, and Y. Theodoridis. Clustering uncertain trajectories. KAIS. to appear. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. D. Pfoser, C. S. Jensen, and Y. Theodoridis. Novel approaches to the indexing of moving object trajectories. In VLDB, pages 395--406, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. P. Samarati. Protecting respondents' identities in microdata release. TKDE, 13(6):1010--1027, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. L. Sweeney. K-anonymity: A model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge Based Systems, 10(5):557--570, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. M. Terrovitis and N. Mamoulis. Privacy preservation in the publication of trajectories. In MDM, pages 65--72, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Privacy-aware querying over sensitive trajectory data

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        CIKM '11: Proceedings of the 20th ACM international conference on Information and knowledge management
        October 2011
        2712 pages
        ISBN:9781450307178
        DOI:10.1145/2063576

        Copyright © 2011 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 24 October 2011

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate1,861of8,427submissions,22%

        Upcoming Conference

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader