Trajectory privacy protection method based on the time interval divided

Abstract Trajectory data often provides information that is well applicable to real-world scenarios such as traffic planning and location-based advertising. Individual trajectory information may disclose sensitive personal data, thus necessitating privacy protection methods. Current methods assume and utilize the same privacy requirements for all trajectories, which can impact their protection and data utilization efficiency. This paper proposes a privacy protection method based on divided time intervals which satisfy different privacy requirements. The method works by constructing a privacy requirement matrix and running trajectory pre-processing based on the different privacy requirements for trajectories in different time points and locations. It uses trajectories that satisfy the (l, δ) -constraint to construct an undirected trajectory graph. By finding the trajectory corresponding to the edge and vertex with the minimum weight, k i -anonymous sets are then constructed with trajectories which share the same or similar privacy requirements. The Manhattan distance can then be applied to calculate the space between trajectories distance, which narrows the gap between the theoretical privacy protection and the actual protective effects. Comparative experiments demonstrate that the proposed method outperforms other similar methods in regards to both privacy protection and data utilization.

[1]  Lars Kulik,et al.  The CASE histogram: privacy-aware processing of trajectory data using aggregates , 2015, GeoInformatica.

[2]  Benjamin C. M. Fung,et al.  Privacy-preserving trajectory stream publishing , 2014, Data Knowl. Eng..

[3]  Yücel Saygin,et al.  Towards trajectory anonymization: a generalization-based approach , 2008, SPRINGL '08.

[4]  Mahdi Abadi,et al.  PPTD: Preserving personalized privacy in trajectory data publishing by sensitive attribute generalization and trajectory local suppression , 2016, Knowl. Based Syst..

[5]  Josep Domingo-Ferrer,et al.  From t-closeness to differential privacy and vice versa in data anonymization , 2015, Knowl. Based Syst..

[6]  Xu Jian,et al.  A Clustering-Based Privacy-Preserving Method for Uncertain Trajectory Data , 2014, TrustCom 2014.

[7]  Cong Sun,et al.  Balancing trajectory privacy and data utility using a personalized anonymization model , 2014, J. Netw. Comput. Appl..

[8]  Vijayalakshmi Atluri,et al.  Ensuring Privacy and Security for LBS through Trajectory Partitioning , 2010, 2010 Eleventh International Conference on Mobile Data Management.

[9]  Benjamin C. M. Fung,et al.  Privacy-preserving trajectory data publishing by local suppression , 2013, Inf. Sci..

[10]  Geoffrey I. Webb,et al.  Encyclopedia of Machine Learning and Data Mining , 2017, Encyclopedia of Machine Learning and Data Mining.

[11]  Benjamin C. M. Fung,et al.  Anonymizing trajectory data for passenger flow analysis , 2014 .

[12]  Steven Furnell,et al.  A novel privacy preserving user identification approach for network traffic , 2017, Comput. Secur..

[13]  Jianjun Li,et al.  Efficient reverse spatial and textual k nearest neighbor queries on road networks , 2016, Knowl. Based Syst..

[14]  Richard O. Sinnott,et al.  Protecting personal trajectories of social media users through differential privacy , 2017, Comput. Secur..

[15]  Thomas Brinkhoff,et al.  Generating Traffic Data , 2003, IEEE Data Eng. Bull..

[16]  Francesco Bonchi,et al.  Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[17]  Laks V. S. Lakshmanan,et al.  Anonymizing moving objects: how to hide a MOB in a crowd? , 2009, EDBT '09.

[18]  Muhammad Tanveer,et al.  An efficient regularized K-nearest neighbor based weighted twin support vector regression , 2016, Knowl. Based Syst..

[19]  Ren-Hung Hwang,et al.  A Novel Time-Obfuscated Algorithm for Trajectory Privacy , 2012 .