Privacy preserving semantic trajectory data publishing for mobile location-based services

The development of wireless technologies and the popularity of mobile devices is responsible for generating large amounts of trajectory data for moving objects. Trajectory datasets have spatiotemporal features and are a rich information source. The mining of trajectory data can reveal interesting patterns of human activities and behaviors. However, trajectory data can also be exploited to disclose users’ privacy information, e.g., the places they live and work, which could be abused by a malicious user. Therefore, it is very important to protect the users’ privacy before publishing any trajectory data. While most previous research on this subject has only considered the privacy protection of stay points, this paper distinguishes itself by modeling and processing semantic trajectories, which not only contain spatiotemporal data but also involve POI information and the users’ motion modes such as walking, running, driving, etc. Accordingly, in this research, semantic trajectory anonymizing based on the k-anonymity model is proposed that can form sensitive areas that contain k − 1 POI points that are similar to the sensitive points. Then, trajectory ambiguity is executed based on the motion modes, road network topologies and road weights in the sensitive area. Finally, a similarity comparison is performed to obtain the recordable and releasable anonymity trajectory sets. Experimental results show that this method performs efficiently and provides high privacy levels.

[1]  David K. Y. Yau,et al.  Privacy vulnerability of published anonymous mobility traces , 2013, TNET.

[2]  Yu Zheng,et al.  Trajectory Data Mining , 2015, ACM Trans. Intell. Syst. Technol..

[3]  Xuelong Li,et al.  When Location Meets Social Multimedia , 2015, ACM Transactions on Intelligent Systems and Technology.

[4]  Xiaofeng Meng,et al.  You Can Walk Alone: Trajectory Privacy-Preserving through Significant Stays Protection , 2012, DASFAA.

[5]  Yueshen Xu,et al.  Network Location-Aware Service Recommendation with Random Walk in Cyber-Physical Systems , 2017, Sensors.

[6]  Wang-Chien Lee,et al.  Semantic trajectory mining for location prediction , 2011, GIS.

[7]  Kai-Florian Richter,et al.  Semantic trajectory compression: Representing urban movement in a nutshell , 2012, J. Spatial Inf. Sci..

[8]  Xiao-Feng Meng,et al.  A Survey of Trajectory Privacy-Preserving Techniques: A Survey of Trajectory Privacy-Preserving Techniques , 2011 .

[9]  Laurence T. Yang,et al.  A Survey on Electronic Textiles: A Survey on Electronic Textiles , 2011 .

[10]  Jure Leskovec,et al.  Friendship and mobility: user movement in location-based social networks , 2011, KDD.

[11]  郑凯,et al.  轨迹大数据:数据、应用与技术现状 , 2015 .

[12]  Diansheng Guo,et al.  Quantifying Animal Trajectories Using Spatial Aggregation and Sequence Analysis: A Case Study of Differentiating Trajectories of Multiple Species , 2016 .

[13]  Lilan Liu,et al.  Automated Quantitative Verification for Service-Based System Design: A Visualization Transform Tool Perspective , 2018, Int. J. Softw. Eng. Knowl. Eng..

[14]  Yucong Duan,et al.  Toward service selection for workflow reconfiguration: An interface-based computing solution , 2018, Future Gener. Comput. Syst..

[15]  Yucong Duan,et al.  Probabilistic Model Checking-Based Service Selection Method for Business Process Modeling , 2017, Int. J. Softw. Eng. Knowl. Eng..

[16]  Xing Xie,et al.  Social itinerary recommendation from user-generated digital trails , 2012, Personal and Ubiquitous Computing.

[17]  Aniket Kittur,et al.  Bridging the gap between physical location and online social networks , 2010, UbiComp.

[18]  Chi-Yin Chow,et al.  Trajectory privacy in location-based services and data publication , 2011, SKDD.

[19]  Dino Pedreschi,et al.  Trajectory pattern mining , 2007, KDD '07.

[20]  Meng Xiao A Survey of Trajectory Privacy-Preserving Techniques , 2011 .

[21]  Wang-Chien Lee,et al.  Protecting Moving Trajectories with Dummies , 2007, 2007 International Conference on Mobile Data Management.

[22]  Kang Zhang,et al.  Applying improved particle swarm optimization for dynamic service composition focusing on quality of service evaluations under hybrid networks , 2018, Int. J. Distributed Sens. Networks.

[23]  Yueshen Xu,et al.  Collaborative Service Selection via Ensemble Learning in Mixed Mobile Network Environments , 2017, Entropy.

[24]  Xing Xie,et al.  Discovering regions of different functions in a city using human mobility and POIs , 2012, KDD.

[25]  Nikos Mamoulis,et al.  Privacy Preservation in the Publication of Trajectories , 2008, The Ninth International Conference on Mobile Data Management (mdm 2008).

[26]  Ling Liu,et al.  From Data Privacy to Location Privacy: Models and Algorithms , 2007, VLDB.

[27]  Yucong Duan,et al.  An Approach to Data Consistency Checking for the Dynamic Replacement of Service Process , 2017, IEEE Access.

[28]  Qinghua Li,et al.  Achieving k-anonymity in privacy-aware location-based services , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[29]  Yuyu Yin,et al.  QoS Prediction for Web Service Recommendation with Network Location-Aware Neighbor Selection , 2016, Int. J. Softw. Eng. Knowl. Eng..

[30]  Jian Wan,et al.  Location-Aware Service Recommendation With Enhanced Probabilistic Matrix Factorization , 2018, IEEE Access.

[31]  Ahmed Elragal,et al.  Trajectory data mining: integrating semantics , 2013, J. Enterp. Inf. Manag..

[32]  Peter R. Stopher,et al.  Review of GPS Travel Survey and GPS Data-Processing Methods , 2014 .

[33]  Panos Kalnis,et al.  Discovery of Path Nearby Clusters in Spatial Networks , 2015, IEEE Transactions on Knowledge and Data Engineering.

[34]  Yücel Saygin,et al.  Towards trajectory anonymization: a generalization-based approach , 2008, SPRINGL '08.

[35]  Anna Monreale,et al.  WhereNext: a location predictor on trajectory pattern mining , 2009, KDD.

[36]  Honghao Gao,et al.  Applying Probabilistic Model Checking to Financial Production Risk Evaluation and Control: A Case Study of Alibaba’s Yu’e Bao , 2018, IEEE Transactions on Computational Social Systems.

[37]  Ling Liu,et al.  Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms , 2008, IEEE Transactions on Mobile Computing.