Trajectory Protection Schemes Based on a Gravity Mobility Model in IoT

With the proliferation of the Internet-of-Things (IoT), the users’ trajectory data containing privacy information in the IoT systems are easily exposed to the adversaries in continuous location-based services (LBSs) and trajectory publication. Existing trajectory protection schemes generate dummy trajectories without considering the user mobility pattern accurately. This would cause that the adversaries can easily exclude the dummy trajectories according to the obtained geographic feature information. In this paper, the continuous location entropy and the trajectory entropy are defined based on the gravity mobility model to measure the level of trajectory protection. Then, two trajectory protection schemes are proposed based on the defined entropy metrics to protect the trajectory data in continuous LBSs and trajectory publication, respectively. Experimental results demonstrate that the proposed schemes have a higher level than the enhanced dummy-location selection (enhance-DLS) scheme and the random scheme.

[1]  Benjamin C. M. Fung,et al.  Differentially Private Trajectory Data Publication , 2011, ArXiv.

[2]  Cong Sun,et al.  Balancing trajectory privacy and data utility using a personalized anonymization model , 2014, J. Netw. Comput. Appl..

[3]  Ruggero G. Pensa,et al.  Pattern-Preserving k-Anonymization of Sequences and its Application to Mobil- ity Data Mining , 2008, PiLBA.

[4]  Jordi Forné,et al.  Measuring the privacy of user profiles in personalized information systems , 2014, Future Gener. Comput. Syst..

[5]  Ying Cai,et al.  Feeling-based location privacy protection for location-based services , 2009, CCS.

[6]  Reza Shokri,et al.  Synthesizing Plausible Privacy-Preserving Location Traces , 2016, 2016 IEEE Symposium on Security and Privacy (SP).

[7]  Khaled Ben Letaief,et al.  Coordinated Beamforming With Artificial Noise for Secure SWIPT Under Non-Linear EH Model: Centralized and Distributed Designs , 2018, IEEE Journal on Selected Areas in Communications.

[8]  Tao Peng,et al.  Enhanced Location Privacy Preserving Scheme in Location-Based Services , 2017, IEEE Systems Journal.

[9]  Xing Xie,et al.  GeoLife: A Collaborative Social Networking Service among User, Location and Trajectory , 2010, IEEE Data Eng. Bull..

[10]  Christian Kray,et al.  Attacking location privacy: exploring human strategies , 2012, UbiComp '12.

[11]  Yukio Hayashi,et al.  Spatial analysis of centralization and decentralization in the population migration network , 2006, APVIS.

[12]  Ke Xiong,et al.  Optimal coordinated beamforming with artificial noise for secure SWIPT in multi-cell networks , 2018, EURASIP J. Wirel. Commun. Netw..

[13]  Gang Qu,et al.  Group Cooperation With Optimal Resource Allocation in Wireless Powered Communication Networks , 2017, IEEE Transactions on Wireless Communications.

[14]  Khaled Ben Letaief,et al.  Energy Efficiency With Proportional Rate Fairness in Multirelay OFDM Networks , 2015, IEEE Journal on Selected Areas in Communications.

[15]  Pingzhi Fan,et al.  Optimal Power Allocation With Delay Constraint for Signal Transmission From a Moving Train to Base Stations in High-Speed Railway Scenarios , 2015, IEEE Transactions on Vehicular Technology.

[16]  Chi-Yin Chow,et al.  Spatiotemporal Sequential Influence Modeling for Location Recommendations , 2015, ACM Trans. Intell. Syst. Technol..

[17]  Ying Cai,et al.  Exploring Historical Location Data for Anonymity Preservation in Location-Based Services , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[18]  E. Jaynes Information Theory and Statistical Mechanics , 1957 .

[19]  Wen-Chih Peng,et al.  Dummy-Based Schemes for Protecting Movement Trajectories , 2012, J. Inf. Sci. Eng..

[20]  Yücel Saygin,et al.  Towards trajectory anonymization: a generalization-based approach , 2008, SPRINGL '08.

[21]  Khaled Ben Letaief,et al.  Robust Transmit Beamforming With Artificial Redundant Signals for Secure SWIPT System Under Non-Linear EH Model , 2018, IEEE Transactions on Wireless Communications.

[22]  Nicholas Jing Yuan,et al.  Regularity and Conformity: Location Prediction Using Heterogeneous Mobility Data , 2015, KDD.

[23]  Khaled Ben Letaief,et al.  Global Energy Efficiency in Secure MISO SWIPT Systems With Non-Linear Power-Splitting EH Model , 2019, IEEE Journal on Selected Areas in Communications.

[24]  Pingyi Fan,et al.  Delay-Constrained Optimal Link Scheduling in Wireless Sensor Networks , 2010, IEEE Transactions on Vehicular Technology.

[25]  Rosen Ivanov Real-time GPS track simplification algorithm for outdoor navigation of visually impaired , 2012, J. Netw. Comput. Appl..

[26]  H. Stanley,et al.  Gravity model in the Korean highway , 2007, 0710.1274.

[27]  Fenghua Li,et al.  Protection of location privacy in continuous LBSs against adversaries with background information , 2016, 2016 International Conference on Computing, Networking and Communications (ICNC).

[28]  Wayne K.D. Davies,et al.  Urban connectivity in Montana , 1979 .

[29]  Muthu Ramachandran,et al.  Efficient location privacy algorithm for Internet of Things (IoT) services and applications , 2017, J. Netw. Comput. Appl..

[30]  K. J. Ray Liu,et al.  Rate-Energy Region of SWIPT for MIMO Broadcasting Under Nonlinear Energy Harvesting Model , 2017, IEEE Transactions on Wireless Communications.

[31]  Qinghua Li,et al.  Achieving k-anonymity in privacy-aware location-based services , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[32]  Zhigang Cao,et al.  Flexible construction of irregular partitioned permutation LDPC codes with low, error floors , 2005, IEEE Commun. Lett..

[33]  Mao Ye,et al.  Exploiting geographical influence for collaborative point-of-interest recommendation , 2011, SIGIR.

[34]  Guangzhong Sun,et al.  A Novel Dummy-Based Mechanism to Protect Privacy on Trajectories , 2014, 2014 IEEE International Conference on Data Mining Workshop.

[35]  Hyun Jung La,et al.  A conceptual framework for trajectory-based medical analytics with IoT contexts , 2016, J. Comput. Syst. Sci..

[36]  S. A. Kulkarni,et al.  Real time implementation of k fake location generation algorithm to protect location privacy in location based services , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[37]  Tetsuji Satoh,et al.  An anonymous communication technique using dummies for location-based services , 2005, ICPS '05. Proceedings. International Conference on Pervasive Services, 2005..

[38]  F. Calabrese,et al.  Urban gravity: a model for inter-city telecommunication flows , 2009, 0905.0692.

[39]  Francesco Bonchi,et al.  Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[40]  Qiang Li,et al.  Influential spatial facility prediction over large scale cyber-physical vehicles in smart city , 2016, EURASIP J. Wirel. Commun. Netw..

[41]  Nikos Mamoulis,et al.  Privacy Preservation in the Publication of Trajectories , 2008, The Ninth International Conference on Mobile Data Management (mdm 2008).