Skip to main content

Advertisement

Log in

Personalized semantic trajectory privacy preservation through trajectory reconstruction

  • Published:
World Wide Web Aims and scope Submit manuscript

Abstract

Trajectory data gathered by mobile positioning techniques and location-aware devices contain plenty of sensitive spatial-temporal and semantic information, and can support many applications through data analysing and mining. However, attribute-linkage and re-identification attacks on such data may cause privacy leakage, and lead to unexpected serious consequences. Existing privacy preserving techniques for trajectory data often ignore the different privacy requirements of different moving objects or largely scarify the availability of trajectory data. In view of these issues, we propose an effective personalized trajectory privacy preserving method which can strike a good balance between user-defined privacy requirement and data availability in off-line trajectory publishing scenario. The main idea is to firstly label semantic attributes of all sampling points on the trajectory and build a corresponding taxonomy tree, next extract sensitive stop points, then for different types of sensitive stop points, adopt different strategies to select the appropriate points of user interests to replace while considering user speed and avoiding reverse mutation, and finally publish the reconstructed trajectory. Besides, to make our method more realistic we further consider possible obstacles appeared in the user space environment. In the experiments, average identification possibility, trajectory semantic consistency and trajectory shape similarity are taken as evaluation criteria, and the performance of our method is comprehensively evaluated. The results show that our method can improve the user trajectory availability as much as possible, while effectively achieving the different trajectory privacy requirements.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Figure 1
Figure 2
Figure 3
Figure 4
Figure 5
Figure 6
Figure 7
Figure 8
Figure 9
Figure 10
Figure 11
Figure 12
Figure 13

Similar content being viewed by others

References

  1. Abul, O., Bonchi, F., Nanni, M.: Never walk alone: uncertainty for anonymity in moving objects databases. In: Proceedings of the 24th International Conference on Data Engineering, ICDE 2008, April 7–12, 2008, Cancún, México, pp. 376–385 (2008)

  2. Beresford, A.R., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Comput. 2(1), 46–55 (2003)

    Article  Google Scholar 

  3. Domingo-Ferrer, J., Trujillo-Rasua, R.: Microaggregation- and permutation-based anonymization of movement data. Inf. Sci. 208, 55–80 (2012)

    Article  Google Scholar 

  4. Duckham, M., Kulik, L.: A formal model of obfuscation and negotiation for location privacy. In: Pervasive Computing, Third International Conference, PERVASIVE 2005, Munich, Germany, May 8–13, 2005, Proceedings, pp. 152–170 (2005)

  5. Dwork, C.: Differential privacy. In: Automata, Languages and Programming, 33rd International Colloquium, ICALP 2006, Venice, Italy, July 10–14, 2006, Proceedings, Part II, pp. 1–12 (2006)

  6. Fu, Z., Huang, F., Ren, K., Weng, J., Wang, C.: Privacy-preserving smart semantic search based on conceptual graphs over encrypted outsourced data. IEEE Trans. Inf. Forensics Secur. 12(8), 1874–1884 (2017)

    Article  Google Scholar 

  7. Fu, Z., Ren, K., Shu, J., Sun, X., Huang, F.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. 27(9), 2546–2559 (2016)

    Article  Google Scholar 

  8. Fu, Z., Wu, X., Guan, C., Sun, X., Ren, K.: Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans. Inf. Forensics Secur. 11(12), 2706–2716 (2016)

    Article  Google Scholar 

  9. Gao, S., Ma, J., Shi, W., Zhan, G., Sun, C.: Trpf: a trajectory privacy-preserving framework for participatory sensing. IEEE Trans. Inf. Forensics Secur. 8(6), 874–887 (2013)

    Article  Google Scholar 

  10. Gao, S., Ma, J., Sun, C., Li, X.: Balancing trajectory privacy and data utility using a personalized anonymization model. J. Netw. Comput. Appl. 38, 125–134 (2014)

    Article  Google Scholar 

  11. Gidófalvi, G., Huang, X., Pedersen, T.B.: Privacy: preserving trajectory collection. In: 16th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, ACM-GIS 2008, November 5-7, 2008, Irvine, California, USA, Proceedings, p 46 (2008)

  12. Gkoulalas-Divanis, A., Verykios, V.S., Mokbel, M.F.: Identifying unsafe routes for network-based trajectory privacy. In: Proceedings of the SIAM International Conference on Data Mining, SDM 2009, April 30–May 2, 2009, Sparks, Nevada, USA, pp. 942–953 (2009)

  13. Gramaglia, M., Fiore, M., Tarable, A., Banchs, A.: kτ, 𝜖-anonymity: towards privacy-preserving publishing of spatiotemporal trajectory data. arXiv:1701.02243 (2017)

  14. Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the First International Conference on Mobile Systems, Applications, and Services, Mobisys 2003, San Francisco, CA, USA, May 5–8, 2003 (2003)

  15. Gruteser, M., Liu, X.: Protecting privacy in continuous location-tracking applications. IEEE Secur. Priv. 2(2), 28–34 (2004)

    Article  Google Scholar 

  16. Han, P., Tsai, H.: SST: privacy preserving for semantic trajectories. In: 16Th IEEE International Conference on Mobile Data Management, MDM 2015, Pittsburgh, PA, USA, June 15–18, 2015, vol. 2, pp. 80–85 (2015)

  17. Hazzard, A., Benford, S., Burnett, G. E.: You’ll never walk alone: composing location-based soundtracks. In: 14th International Conference on New Interfaces for Musical Expression, NIME 2014, London, United Kingdom, June 30–July 4, 2014, pp. 411–414 (2014)

  18. Huo, Z., Meng, X., Hu, H., Huang, Y.: You can walk alone: trajectory privacy-preserving through significant stays protection. In: Database Systems for Advanced Applications - 17th International Conference, DASFAA 2012, Busan, South Korea, April 15–19, 2012, Proceedings, Part I, pp. 351–366 (2012)

  19. Komishani, E.G., Abadi, M., Deldar, F.: PPTD: Preserving personalized privacy in trajectory data publishing by sensitive attribute generalization and trajectory local suppression. Knowl.-Based Syst. 94, 43–59 (2016)

    Article  Google Scholar 

  20. Krumm, J.: A survey of computational location privacy. Pers. Ubiquit. Comput. 13(6), 391–399 (2009)

    Article  Google Scholar 

  21. Li, M., Zhu, L., Zhang, Z., Xu, R.: Achieving differential privacy of trajectory data publishing in participatory sensing. Inf. Sci. 400, 1–13 (2017)

    Google Scholar 

  22. Liu, A., Zheng, K., Li, L., Liu, G., Zhao, L., Zhou, X.: Efficient secure similarity computation on encrypted trajectory data. In: 31st IEEE International Conference on Data Engineering, ICDE 2015, Seoul, South Korea, April 13–17, 2015, pp. 66–77 (2015)

  23. Liu, X., Xie, Q., Wang, L.: Personalized extended (α, k)-anonymity model for privacy-preserving data publishing. Concurrency and Computation: Practice and Experience 29(6) (2017)

  24. Luper, D., Cameron, D., Miller, J., Arabnia, H.R.: Spatial and temporal target association through semantic analysis and gps data mining. In: Proceedings of the 2007 International Conference on Information & Knowledge Engineering, IKE 2007, June 25–28, 2007, Las Vegas, Nevada, USA, pp. 251–257 (2007)

  25. Monreale, A., Trasarti, R., Renso, C., Pedreschi, D., Bogorny, V.: Preserving privacy in semantic-rich trajectories of human mobility. In: Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, SPRINGL 2010, November 2, 2010, San Jose, California, USA, Proceedings, pp. 47–54 (2010)

  26. Naghizade, E., Kulik, L., Tanin, E.: Protection of sensitive trajectory datasets through spatial and temporal exchange. In: Conference on Scientific and Statistical Database Management, SSDBM ’14, Aalborg, Denmark, June 30–July 02, 2014, pp. 40:1–40:4 (2014)

  27. Nergiz, M.E., Atzori, M., Saygin, Y., Güç, B.: Towards trajectory anonymization: a generalization-based approach. Transactions on Data Privacy 2(1), 47–75 (2009)

    MathSciNet  Google Scholar 

  28. Tu, Z., Zhao, K., Xu, F., Li, Y., Su, L., Jin, D.: Beyond k-anonymity: protect your trajectory from semantic attack. In: 14th Annual IEEE International Conference on Sensing, Communication, and Networking, SECON 2017, San Diego, CA, USA, June 12–14, 2017, pp. 1–9 (2017)

  29. Xu, T., Cai, Y.: Exploring historical location data for anonymity preservation in location-based services. In: INFOCOM 2008. 27tH IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 13–18 April 2008, Phoenix, AZ, USA, pp. 547–555 (2008)

  30. Yarovoy, R., Bonchi, F., Lakshmanan, L.V.S., Wang, W.H.: Anonymizing moving objects: how to hide a MOB in a crowd?. In: EDBT 2009, 12th International Conference on Extending Database Technology, Saint Petersburg, Russia, March 24-26, 2009, Proceedings, pp. 72–83 (2009)

  31. Yurtsever, E., Takeda, K., Miyajima, C.: Traffic trajectory history and drive path generation using GPS data cloud. In: 2015 IEEE Intelligent Vehicles Symposium, IV 2015, Seoul, South Korea, June 28–July 1, 2015, pp. 229–234 (2015)

  32. Zheng, Y., Xie, X., Ma, W.: Geolife: a collaborative social networking service among user, location and trajectory. IEEE Data Eng. Bull. 33(2), 32–39 (2010)

    Google Scholar 

Download references

Acknowledgements

This work is supported by the National Nature Science Foundation of China (grants No. 61672133, No. 61602087 and No. 61632007), the Fundamental Research Funds for the Central Universities (grants No. ZYGX2015J058 and No. ZYGX2014Z007), and a project funded by the Priority Academic Program Development of Jiangsu Higher Education Institutions and Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jie Shao.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Dai, Y., Shao, J., Wei, C. et al. Personalized semantic trajectory privacy preservation through trajectory reconstruction. World Wide Web 21, 875–914 (2018). https://doi.org/10.1007/s11280-017-0489-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11280-017-0489-2

Keywords