More Value, Less Privacy, How to Evaluate the Privacy Based on Trajectories Visualization & Analyzation

The trade-off among individual privacy, data utility and data feature of service has been a great concern when designing and evaluating privacy preserving schemes in trajectories publishing. The trajectories data is spatial and temporal correlated strongly. So, Privacy-preserving over them should take the human behaviors and their status into account. In this paper, we develop a novel method to investigate and analyze users' behaviors as well as the crowd density after abstracting users' ROIs. Finally, we evaluate the privacy stress via a well-designed indictor based on the trajectories visualization and analyzation. Experiments show that the method is capable of effectively finding both crowd living patterns and distribution, and the proposed indictor can quantize the mobility data utility precisely in grid.

[1]  Karim Emara,et al.  On evaluation of location privacy preserving schemes for VANET safety applications , 2015, Comput. Commun..

[2]  Zhonghui Wang,et al.  Protecting trajectory privacy: A user-centric analysis , 2017, J. Netw. Comput. Appl..

[3]  John Krumm,et al.  A survey of computational location privacy , 2009, Personal and Ubiquitous Computing.

[4]  Xiaoru Yuan,et al.  Visual Analysis of Multiple Route Choices Based on General GPS Trajectories , 2017, IEEE Transactions on Big Data.

[5]  Peter Nijkamp,et al.  Mobile phone data from GSM networks for traffic parameter and urban spatial pattern assessment: a review of applications and opportunities , 2011, GeoJournal.

[6]  Ling Liu,et al.  Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms , 2008, IEEE Transactions on Mobile Computing.

[7]  César A. Hidalgo,et al.  Unique in the Crowd: The privacy bounds of human mobility , 2013, Scientific Reports.

[8]  Nikos Mamoulis,et al.  Local Suppression and Splitting Techniques for Privacy Preserving Publication of Trajectories , 2017, IEEE Transactions on Knowledge and Data Engineering.

[9]  Meng Xiao PrivateCheckIn:Trajectory Privacy-Preserving for Check-In Services in MSNS , 2013 .

[10]  Benjamin C. M. Fung,et al.  Privacy-preserving trajectory data publishing by local suppression , 2013, Inf. Sci..

[11]  Suman Nath,et al.  Differentially private aggregation of distributed time-series with transformation and encryption , 2010, SIGMOD Conference.

[12]  Reza Shokri,et al.  Evaluating the Privacy Risk of Location-Based Services , 2011, Financial Cryptography.

[13]  Bingru Yang,et al.  A Personalized Privacy Preserving Parallel (alpha, k) -anonymity Model , 2012 .

[14]  K. Premalatha,et al.  A survey on privacy preserving data mining , 2015, 2015 2nd International Conference on Electronics and Communication Systems (ICECS).

[15]  Matthew Roughan,et al.  Multi-Observer Privacy-Preserving Hidden Markov Models , 2012, IEEE Transactions on Signal Processing.