Skip to main content
Top

2015 | OriginalPaper | Chapter

KUR-Algorithm: From Position to Trajectory Privacy Protection in Location-Based Applications

Authors : Trong Nhan Phan, Josef Küng, Tran Khanh Dang

Published in: Database and Expert Systems Applications

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Some obfuscation techniques may fail to protect user privacy because of the moving context as well as the background knowledge of adversaries. In this paper, we propose a novel scheme to distinctly protect user privacy not only from user position but also from user trajectory. Furthermore, we present kUR-algorithm, which is context-aware and can be employed as either an independent method or a supportive technique, to give the high-level user privacy protection against privacy disclosure and privacy leak. Last but not least, we analyse other potential privacy problems which usually emerge as outliers and show how well our proposed solution overcomes these scenarios.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Abul, O., Bonchi, F., Nanni, M.: Never walk alone: uncertainty for anonymity in moving objects databases. In: Proceedings of the IEEE 24th International Conference on Data Engineering, pp. 376–385 (2008) Abul, O., Bonchi, F., Nanni, M.: Never walk alone: uncertainty for anonymity in moving objects databases. In: Proceedings of the IEEE 24th International Conference on Data Engineering, pp. 376–385 (2008)
2.
go back to reference Chen, J., Meng, X.: Indexing future trajectories of moving objects in a constrained network. J. Comput. Sci. Technol. 22(2), 245–251 (2007)CrossRefMATH Chen, J., Meng, X.: Indexing future trajectories of moving objects in a constrained network. J. Comput. Sci. Technol. 22(2), 245–251 (2007)CrossRefMATH
3.
go back to reference Chow, C.Y., Mokbel, M.F.: Trajectory privacy in location-based services and data publication. SIGKDD Explor. Newsl. 13(1), 19–29 (2011)CrossRef Chow, C.Y., Mokbel, M.F.: Trajectory privacy in location-based services and data publication. SIGKDD Explor. Newsl. 13(1), 19–29 (2011)CrossRef
4.
go back to reference Divanis, A.G., Verykios, V.S., Mokbel, M.F.: Identifying unsafe routes for network-based trajectory privacy. In: Proceedings of the SIAM International Conference on Data Mining, pp. 942–953 (2009) Divanis, A.G., Verykios, V.S., Mokbel, M.F.: Identifying unsafe routes for network-based trajectory privacy. In: Proceedings of the SIAM International Conference on Data Mining, pp. 942–953 (2009)
5.
go back to reference Fung, B.C.M., Chen, K.W.R., Yu, P.S.: Privacy-preserving data publishing: a survey of recent developments. ACM Comput. Surv. 42(4), 1–53 (2010)CrossRef Fung, B.C.M., Chen, K.W.R., Yu, P.S.: Privacy-preserving data publishing: a survey of recent developments. ACM Comput. Surv. 42(4), 1–53 (2010)CrossRef
6.
go back to reference Gao, S., Ma, J., Shi, W., Zhan, G., Sun, C.: TrPF: a trajectory privacy-preserving framework for participatory sensing. IEEE Trans. Inf. Forensics Secur. 8(6), 874–887 (2013)CrossRef Gao, S., Ma, J., Shi, W., Zhan, G., Sun, C.: TrPF: a trajectory privacy-preserving framework for participatory sensing. IEEE Trans. Inf. Forensics Secur. 8(6), 874–887 (2013)CrossRef
7.
go back to reference Ghinita, G.: Private queries and trajectory anonymization: a dual perspective on location privacy. Trans. Data Priv. 2(1), 3–19 (2009)MathSciNet Ghinita, G.: Private queries and trajectory anonymization: a dual perspective on location privacy. Trans. Data Priv. 2(1), 3–19 (2009)MathSciNet
9.
go back to reference Huo, Z., Meng, X., Hu, H., Huang, Y.: You can walk alone: trajectory privacy-preserving through significant stays protection. In: Proceedings of the 17th International Conference on Database Systems for Advanced Applications, pp. 351–366 (2012) Huo, Z., Meng, X., Hu, H., Huang, Y.: You can walk alone: trajectory privacy-preserving through significant stays protection. In: Proceedings of the 17th International Conference on Database Systems for Advanced Applications, pp. 351–366 (2012)
10.
go back to reference Kaplan, E., Pedersen, T.B., Savas, E., Saygın, Y.: Discovering private trajectories using background information. J. Data Knowl. Eng. 69(7), 723–736 (2010)CrossRef Kaplan, E., Pedersen, T.B., Savas, E., Saygın, Y.: Discovering private trajectories using background information. J. Data Knowl. Eng. 69(7), 723–736 (2010)CrossRef
11.
go back to reference Lin, D., Bertino, E., Cheng, R., Prabhakar, S.: Location privacy in moving-object environments. Trans. Data Priv. 2(1), 21–46 (2009)MathSciNetMATH Lin, D., Bertino, E., Cheng, R., Prabhakar, S.: Location privacy in moving-object environments. Trans. Data Priv. 2(1), 21–46 (2009)MathSciNetMATH
12.
go back to reference Liu, L.: From data privacy to location privacy: models and algorithms. In: Proceedings of the 33rd International Conference on Very Large Databases, pp. 1429–1430 (2007) Liu, L.: From data privacy to location privacy: models and algorithms. In: Proceedings of the 33rd International Conference on Very Large Databases, pp. 1429–1430 (2007)
13.
go back to reference Liu, X., Karimi, H.A.: Location awareness through trajectory prediction. In: Proceedings of Computers, Environment and Urban Systems, pp. 741–756 (2006) Liu, X., Karimi, H.A.: Location awareness through trajectory prediction. In: Proceedings of Computers, Environment and Urban Systems, pp. 741–756 (2006)
14.
go back to reference Nergiz, M.E., Atzori, M., Saygin, Y.: Towards trajectory anonymization: a generalization-based approach. In: Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS (2008) Nergiz, M.E., Atzori, M., Saygin, Y.: Towards trajectory anonymization: a generalization-based approach. In: Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS (2008)
15.
go back to reference Phan, T.N., Dang, T.K.: A novel trajectory privacy-preserving future time index structure in moving object databases. In: Proceedings of the 4th International Conference on Computational Collective Intelligence Technologies and Applications, Part I, pp. 124–134 (2012) Phan, T.N., Dang, T.K.: A novel trajectory privacy-preserving future time index structure in moving object databases. In: Proceedings of the 4th International Conference on Computational Collective Intelligence Technologies and Applications, Part I, pp. 124–134 (2012)
16.
go back to reference Phan, T.N., Dang, T.K., Küng, J.: User privacy protection from trajectory perspective in location-based applications. In: Proceedings of the 19th Interdisciplinary Information Management Talks, Jindřichův Hradec, Czech Republic, pp. 281–288 (2011) Phan, T.N., Dang, T.K., Küng, J.: User privacy protection from trajectory perspective in location-based applications. In: Proceedings of the 19th Interdisciplinary Information Management Talks, Jindřichův Hradec, Czech Republic, pp. 281–288 (2011)
17.
go back to reference Samarati, P., Sweeney, L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical report, SRI-CSL-98–04, SRI Computer Science Laboratory (1998) Samarati, P., Sweeney, L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical report, SRI-CSL-98–04, SRI Computer Science Laboratory (1998)
18.
go back to reference Shokri, R., Theodorakopoulos, G., Le Boudec, J.-Y., Hubaux J.-P.: Quantifying location privacy. In: Proceedings of the 2011 IEEE Symposium on Security and Privacy, pp. 247–262 (2011) Shokri, R., Theodorakopoulos, G., Le Boudec, J.-Y., Hubaux J.-P.: Quantifying location privacy. In: Proceedings of the 2011 IEEE Symposium on Security and Privacy, pp. 247–262 (2011)
19.
go back to reference To, Q.C., Dang, T.K., Küng, J.: A Hilbert-based framework for preserving privacy in location-based services. Int. J. Intell. Inf. Database Syst. 7(2), 113–134 (2013) To, Q.C., Dang, T.K., Küng, J.: A Hilbert-based framework for preserving privacy in location-based services. Int. J. Intell. Inf. Database Syst. 7(2), 113–134 (2013)
20.
go back to reference Xu, T., Cai, Y.: Exploring historical location data for anonymity preservation in location-based services. In: Proceedings of the 27th IEEE International Conference on Computer Communications (2008) Xu, T., Cai, Y.: Exploring historical location data for anonymity preservation in location-based services. In: Proceedings of the 27th IEEE International Conference on Computer Communications (2008)
21.
go back to reference Yigitoglu, E., Damiani, M.L., Abul, O., Silvestri, C.: Privacy-preserving sharing of sensitive semantic locations under road-network constraints. In: Proceedings of the IEEE 13th International Conference on Mobile Data Management, pp. 186–195 (2012) Yigitoglu, E., Damiani, M.L., Abul, O., Silvestri, C.: Privacy-preserving sharing of sensitive semantic locations under road-network constraints. In: Proceedings of the IEEE 13th International Conference on Mobile Data Management, pp. 186–195 (2012)
22.
go back to reference You, T.H., Peng, W.C., Lee, W.C.: Protecting moving trajectories with dummies. In: Proceedings of the 2007 International Conference on Mobile Data Management, pp. 278–282 (2007) You, T.H., Peng, W.C., Lee, W.C.: Protecting moving trajectories with dummies. In: Proceedings of the 2007 International Conference on Mobile Data Management, pp. 278–282 (2007)
Metadata
Title
KUR-Algorithm: From Position to Trajectory Privacy Protection in Location-Based Applications
Authors
Trong Nhan Phan
Josef Küng
Tran Khanh Dang
Copyright Year
2015
DOI
https://doi.org/10.1007/978-3-319-22852-5_8

Premium Partner