Protecting Sensitive Location Visits Against Inference Attacks in Trajectory Publishing

With an increasing popularity of Location-Based Services (LBSs), people's trajectories are continuously recorded and collected. The trajectory data are often shared or published for improving user experience, such as personalized recommendations and activity mining. However, releasing the trajectory data makes users' sensitive location visits vulnerable to inference attacks. In this paper, we study the problem of protecting sensitive location visits in the publication of trajectory data, assuming an adversary can do inference attacks using association rules derived from the data. We propose a methodology of anonymizing trajectories employing both generalizations and suppressions, to sanitize the trajectory data and protect sensitive location visits against inference attacks. We design a number of techniques to make our trajectory anonymizing algorithm efficient meanwhile maintaining the utility. We have conducted an empirical study to show that our algorithms can efficiently prevent inference attacks for real datasets while preserving the accuracy of aggregate querying on the published data.

[1]  Stephen A. Cook,et al.  The complexity of theorem-proving procedures , 1971, STOC.

[2]  Yonghong Chen,et al.  Trajectory Privacy Preservation Based on a Fog Structure for Cloud Location Services , 2017, IEEE Access.

[3]  Elisa Bertino,et al.  Privacy-Preserving and Content-Protecting Location Based Queries , 2014, IEEE Trans. Knowl. Data Eng..

[4]  Xiaochun Yang,et al.  Protecting Individual Information Against Inference Attacks in Data Publishing , 2007, DASFAA.

[5]  Cyrus Shahabi,et al.  A Framework for Protecting Worker Location Privacy in Spatial Crowdsourcing , 2014, Proc. VLDB Endow..

[6]  Yücel Saygin,et al.  Ensuring location diversity in privacy-preserving spatio-temporal data publishing , 2013, The VLDB Journal.

[7]  Xiaofeng Meng,et al.  Feel Free to Check-in: Privacy Alert against Hidden Location Inference Attacks in GeoSNs , 2013, DASFAA.

[8]  Chengqi Zhang,et al.  Protecting Location Privacy in Spatial Crowdsourcing using Encrypted Data , 2017, EDBT.

[9]  Qiong Wu,et al.  Trajectory Protection Schemes Based on a Gravity Mobility Model in IoT , 2019, Electronics.

[10]  Spiros Skiadopoulos,et al.  Apriori-based algorithms for km-anonymizing trajectory data , 2014, Trans. Data Priv..

[11]  Elisa Bertino,et al.  Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy , 2016, IEEE Transactions on Knowledge and Data Engineering.

[12]  Xiangliang Zhang,et al.  Privacy-Preserving Task Assignment in Spatial Crowdsourcing , 2017, Journal of Computer Science and Technology.

[13]  Elisa Bertino,et al.  Association rule hiding , 2004, IEEE Transactions on Knowledge and Data Engineering.

[14]  Nikos Mamoulis,et al.  Local Suppression and Splitting Techniques for Privacy Preserving Publication of Trajectories , 2017, IEEE Transactions on Knowledge and Data Engineering.