Protecting Privacy in Trajectories with a User-Centric Approach

被引:4
|
作者
Romero-Tris, Cristina [1 ]
Megias, David [1 ]
机构
[1] UOC, Internet Interdisciplinary Inst IN3, CYBERCAT Ctr Cybersecur Res Catalonia, Av Carl Friedrich Gauss 5, Castelldefels 08860, Barcelona, Spain
关键词
Trajectory anonymization; user-centric protocol; privacy; DIFFERENTIAL PRIVACY; LOCATION; NETWORKS;
D O I
10.1145/3233185
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The increased use of location-aware devices, such as smartphones, generates a large amount of trajectory data. These data can be useful in several domains, like marketing, path modeling, localization of an epidemic focus, and so on. Nevertheless, since trajectory information contains personal mobility data, improper use or publication of trajectory data can threaten users' privacy. It may reveal sensitive details like habits of behavior, religious beliefs, and sexual preferences. Therefore, many users might be unwilling to share their trajectory data without a previous anonymization process. Currently, several proposals to address this problem can be found in the literature. These solutions focus on anonymizing data before its publication, i.e., when they are already stored in the server database. Nevertheless, we argue that this approach gives the user no control about the information she shares. For this reason, we propose anonymizing data in the users' mobile devices, before they are sent to a third party. This article extends our previous work which was, to the best of our knowledge, the first one to anonymize data at the client side, allowing users to select the amount and accuracy of shared data. In this article, we describe an improved version of the protocol, and we include the implementation together with an analysis of the results obtained after the simulation with real trajectory data.
引用
收藏
页数:27
相关论文
共 50 条
  • [1] Protecting trajectory privacy: A user-centric analysis
    Shen, Hang
    Bai, Guangwei
    Yang, Mei
    Wang, Zhonghui
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 82 : 128 - 139
  • [2] Designing Privacy for You: A Practical Approach for User-Centric Privacy
    Senarath, Awanthika
    Arachchilage, Nalin A. G.
    Slay, Jill
    HUMAN ASPECTS OF INFORMATION SECURITY, PRIVACY AND TRUST (HAS 2017), 2017, 10292 : 739 - 752
  • [3] Assessing Privacy Risks in Android: A User-Centric Approach
    Mylonas, Alexios
    Theoharidou, Marianthi
    Gritzalis, Dimitris
    RISK ASSESSMENT AND RISK-DRIVEN TESTING, RISK 2013, 2014, 8418 : 21 - 37
  • [4] SocioPath: Protecting privacy by self-sufficient data distribution in user-centric networks
    Hartmann, Fabian
    Baumgart, Ingmar
    2014 IEEE FOURTH INTERNATIONAL CONFERENCE ON BIG DATA AND CLOUD COMPUTING (BDCLOUD), 2014, : 394 - 401
  • [5] A Privacy-Aware and User-Centric Approach for Query Processing in Cloud
    Samanthula, Bharath K.
    Liporace, James
    Issiov, Martin
    2018 IEEE INTERNATIONAL CONFERENCE ON SMART CLOUD (SMARTCLOUD), 2018, : 54 - 59
  • [6] User-Centric Privacy Engineering for the Internet of Things
    Barhamgi, Mahmoud
    Perera, Charith
    Ghedira, Chirine
    Benslimane, Djamal
    IEEE CLOUD COMPUTING, 2018, 5 (05): : 47 - 57
  • [7] User-centric privacy framework for pervasive environments
    Bagues, Susana Alcalde
    Zeidler, Andreas
    Valdivielso, Carlos Fernandez
    Matias, Ignacio R.
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2006: OTM 2006 WORKSHOPS, PT 2, PROCEEDINGS, 2006, 4278 : 1347 - 1356
  • [8] User-Centric Privacy Controls for Smart Homes
    Chhetri C.
    Genaro Motti V.
    Proceedings of the ACM on Human-Computer Interaction, 2022, 6 (2 CSCW)
  • [9] User-centric privacy awareness in video surveillance
    Thomas Winkler
    Bernhard Rinner
    Multimedia Systems, 2012, 18 : 99 - 121
  • [10] Security, privacy and trust of user-centric solutions
    Akram, Raja Naeem
    Chen, Hsiao-Hwa
    Lopez, Javier
    Sauveron, Damien
    Yang, Laurence T.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 80 : 417 - 420