Trajectory Privacy Preserving for LBS in P2P Environment

This paper presents a trajectory similarity measurement method based on user's local anonymous area. This method can protect the location privacy among users between each other in an anonymous group. Based on the trajectory similarity and real user's location data, some users' IDs are replaced by others to protect trajectory privacy. This method can resist some background attacks.

[1]  Nikos Mamoulis,et al.  Local Suppression and Splitting Techniques for Privacy Preserving Publication of Trajectories , 2017, IEEE Transactions on Knowledge and Data Engineering.

[2]  Tanzima Hashem,et al.  "Don't trust anyone": Privacy protection for location-based services , 2011, Pervasive Mob. Comput..

[3]  Ming-Syan Chen,et al.  Developing Data Allocation Schemes by Incremental Mining of User Moving Patterns in a Mobile Computing System , 2003, IEEE Trans. Knowl. Data Eng..

[4]  Tetsuji Satoh,et al.  An anonymous communication technique using dummies for location-based services , 2005, ICPS '05. Proceedings. International Conference on Pervasive Services, 2005..

[5]  Ying Cai,et al.  Exploring Historical Location Data for Anonymity Preservation in Location-Based Services , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[6]  Meng Xiao A Survey of Trajectory Privacy-Preserving Techniques , 2011 .

[7]  Yücel Saygin,et al.  Towards trajectory anonymization: a generalization-based approach , 2008, SPRINGL '08.

[8]  John Krumm,et al.  Inference Attacks on Location Tracks , 2007, Pervasive.

[9]  Javam C. Machado,et al.  A Distributed Approach for Privacy Preservation in the Publication of Trajectory Data , 2015, GeoPrivacy@SIGSPATIAL.

[10]  Wang-Chien Lee,et al.  Protecting Moving Trajectories with Dummies , 2007, 2007 International Conference on Mobile Data Management.

[11]  Tao Peng,et al.  Collaborative trajectory privacy preserving scheme in location-based services , 2017, Inf. Sci..

[12]  Xiaofeng Meng,et al.  History trajectory privacy-preserving through graph partition , 2011, MLBS '11.

[13]  Marco Gruteser,et al.  USENIX Association , 1992 .

[14]  Xiao-Feng Meng,et al.  A Survey of Trajectory Privacy-Preserving Techniques: A Survey of Trajectory Privacy-Preserving Techniques , 2011 .

[15]  Francesco Bonchi,et al.  Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[16]  Xiaofeng Meng,et al.  You Can Walk Alone: Trajectory Privacy-Preserving through Significant Stays Protection , 2012, DASFAA.

[17]  Wang-Chien Lee,et al.  On Mining Moving Patterns for Object Tracking Sensor Networks , 2006, 7th International Conference on Mobile Data Management (MDM'06).