LRM: A Location Recombination Mechanism for Achieving Trajectory $k$ -Anonymity Privacy Protection

Trajectory <inline-formula> <tex-math notation="LaTeX">$k$ </tex-math></inline-formula>-anonymity is a prevalent technique for protecting trajectory privacy. However, the existing techniques for generating fake trajectories can be easily broken by an adversary because of the failure to capture the probabilistic features and geographic features of the trajectories. They also reduce data availability. Thus, this paper proposes a location recombination mechanism (<inline-formula> <tex-math notation="LaTeX">$LRM $ </tex-math></inline-formula>) for achieving trajectory <inline-formula> <tex-math notation="LaTeX">$k$ </tex-math></inline-formula>-anonymity privacy protection. First, we propose a metric that measures the location pair similarity between location pairs. Based on this metric, we select sampling locations and divide locations into different equivalent probability classes. Locations in one equivalent probability class have the same probability as one corresponding base location. Then, we also introduce two metrics that measure the probabilistic similarity and geographic similarity between locations. Based on these metrics, we design algorithms to generate fake trajectories. These algorithms can recombine locations sampled from each equivalent probability class into trajectories. All of these trajectories meet the privacy protection requirements for both base trajectories and sampling trajectories. Finally, we evaluate our scheme thoroughly with real-world data. The results show that our method can protect the privacy of base trajectories and sampling trajectories and achieve a better performance of service provider utility and data availability than other schemes.

[1]  Xiaodong Lin,et al.  PLAM: A privacy-preserving framework for local-area mobile social networks , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[2]  Long Hu,et al.  ASA: Against statistical attacks for privacy-aware users in Location Based Service , 2017, Future Gener. Comput. Syst..

[3]  Peng Liu,et al.  A Mobile Terminal Based Trajectory Preserving Strategy for Continuous Querying LBS Users , 2012, 2012 IEEE 8th International Conference on Distributed Computing in Sensor Systems.

[4]  Ke Cheng,et al.  TMarkov: LBS Trajectory Prediction for Crowdsourcing Recommendation , 2018, 2018 International Conference on Networking and Network Applications (NaNA).

[5]  Xinwen Fu,et al.  Protection of query privacy for continuous location based services , 2011, 2011 Proceedings IEEE INFOCOM.

[6]  Reza Shokri,et al.  Synthesizing Plausible Privacy-Preserving Location Traces , 2016, 2016 IEEE Symposium on Security and Privacy (SP).

[7]  Catuscia Palamidessi,et al.  Geo-indistinguishability: differential privacy for location-based systems , 2012, CCS.

[8]  Feifei Li,et al.  Secure nearest neighbor revisited , 2013, 2013 IEEE 29th International Conference on Data Engineering (ICDE).

[9]  Qinghua Li,et al.  Achieving k-anonymity in privacy-aware location-based services , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[10]  Di Chen,et al.  PAPERS: Private and Precise Range Search for Location Based Services , 2015, 2015 IEEE International Conference on Communications (ICC).

[11]  Michael Terry,et al.  BusMate: Understanding Mobility Behavior for Trajectory-Based Advertising , 2015, 2015 16th IEEE International Conference on Mobile Data Management.

[12]  Tao Peng,et al.  Collaborative trajectory privacy preserving scheme in location-based services , 2017, Inf. Sci..

[13]  Xiaoming Fu,et al.  Trajectory Recovery From Ash: User Privacy Is NOT Preserved in Aggregated Mobility Data , 2017, WWW.

[14]  Gang Sun,et al.  The framework and algorithm for preserving user trajectory while using location-based services in IoT-cloud systems , 2017, Cluster Computing.

[15]  Ching-Nung Yang,et al.  Scalable secret image sharing scheme with essential shadows , 2017, Signal Process. Image Commun..

[16]  Ching-Nung Yang,et al.  Threshold changeable secret image sharing scheme based on interpolation polynomial , 2019, Multimedia Tools and Applications.

[17]  Nasser Yazdani,et al.  Hierarchical anonymization algorithms against background knowledge attack in data releasing , 2016, Knowl. Based Syst..

[18]  Hai Liu,et al.  Spatiotemporal correlation-aware dummy-based privacy protection scheme for location-based services , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.

[19]  Guangzhong Sun,et al.  A Novel Dummy-Based Mechanism to Protect Privacy on Trajectories , 2014, 2014 IEEE International Conference on Data Mining Workshop.

[20]  Ian Goldberg,et al.  Revisiting the Computational Practicality of Private Information Retrieval , 2011, Financial Cryptography.

[21]  Hui Lin,et al.  A Trajectory Privacy-Preserving Algorithm Based on Road Networks in Continuous Location-Based Services , 2017, 2017 IEEE Trustcom/BigDataSE/ICESS.

[22]  Ching-Nung Yang,et al.  Enhanced embedding capacity for the SMSD-based data-hiding method , 2019, Signal Process. Image Commun..

[23]  Elisa Bertino,et al.  Practical k nearest neighbor queries with location privacy , 2014, 2014 IEEE 30th International Conference on Data Engineering.

[24]  Benjamin C. M. Fung,et al.  Anonymizing trajectory data for passenger flow analysis , 2014 .

[25]  Jemal H. Abawajy,et al.  A trajectory privacy-preserving scheme based on query exchange in mobile social networks , 2018, Soft Comput..

[26]  Zhiqiang Xie,et al.  The privacy preserving method for dynamic trajectory releasing based on adaptive clustering , 2017, Inf. Sci..

[27]  Isao Echizen,et al.  Lightweight Collaborative Semantic Scheme for Generating an Obfuscated Region to Ensure Location Privacy , 2018, 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC).

[28]  Qiong Wu,et al.  Trajectory Protection Schemes Based on a Gravity Mobility Model in IoT , 2019, Electronics.

[29]  Luis Martínez-López,et al.  Analyzing the performance of classical consensus models in large scale group decision making: A comparative study , 2017, Appl. Soft Comput..

[30]  Rupak Kharel,et al.  An energy efficient long hop (LH) first scheduling algorithm for scalable Internet of Things (IoT) networks , 2017, 2017 Eleventh International Conference on Sensing Technology (ICST).

[31]  Xiaofeng Meng,et al.  You Can Walk Alone: Trajectory Privacy-Preserving through Significant Stays Protection , 2012, DASFAA.

[32]  Eugenio Cesario,et al.  Trajectory Pattern Mining for Urban Computing in the Cloud , 2017, IEEE Transactions on Parallel and Distributed Systems.

[33]  Wen-Chih Peng,et al.  Dummy-Based Schemes for Protecting Movement Trajectories , 2012, J. Inf. Sci. Eng..

[34]  John D. Kelleher,et al.  Examining the Limits of Predictability of Human Mobility , 2019, Entropy.

[35]  Cong Sun,et al.  Balancing trajectory privacy and data utility using a personalized anonymization model , 2014, J. Netw. Comput. Appl..

[36]  Francisco Herrera,et al.  MENTOR: A graphical monitoring tool of preferences evolution in large-scale group decision making , 2014, Knowl. Based Syst..

[37]  Benjamin C. M. Fung,et al.  Privacy-preserving trajectory data publishing by local suppression , 2013, Inf. Sci..

[38]  Jianfeng Ma,et al.  TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing , 2013, IEEE Transactions on Information Forensics and Security.

[39]  Marco Fiore,et al.  Preserving mobile subscriber privacy in open datasets of spatiotemporal trajectories , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.

[40]  Takahiro Hara,et al.  A dummy-based anonymization method based on user trajectory with pauses , 2012, SIGSPATIAL/GIS.

[41]  Cecilia Mascolo,et al.  Mining User Mobility Features for Next Place Prediction in Location-Based Services , 2012, 2012 IEEE 12th International Conference on Data Mining.

[42]  Qinghua Li,et al.  A novel attack to spatial cloaking schemes in location-based services , 2015, Future Gener. Comput. Syst..