Protecting Privacy in Trajectories with a User-Centric Approach

被引:4
|
作者
Romero-Tris, Cristina [1 ]
Megias, David [1 ]
机构
[1] UOC, Internet Interdisciplinary Inst IN3, CYBERCAT Ctr Cybersecur Res Catalonia, Av Carl Friedrich Gauss 5, Castelldefels 08860, Barcelona, Spain
关键词
Trajectory anonymization; user-centric protocol; privacy; DIFFERENTIAL PRIVACY; LOCATION; NETWORKS;
D O I
10.1145/3233185
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The increased use of location-aware devices, such as smartphones, generates a large amount of trajectory data. These data can be useful in several domains, like marketing, path modeling, localization of an epidemic focus, and so on. Nevertheless, since trajectory information contains personal mobility data, improper use or publication of trajectory data can threaten users' privacy. It may reveal sensitive details like habits of behavior, religious beliefs, and sexual preferences. Therefore, many users might be unwilling to share their trajectory data without a previous anonymization process. Currently, several proposals to address this problem can be found in the literature. These solutions focus on anonymizing data before its publication, i.e., when they are already stored in the server database. Nevertheless, we argue that this approach gives the user no control about the information she shares. For this reason, we propose anonymizing data in the users' mobile devices, before they are sent to a third party. This article extends our previous work which was, to the best of our knowledge, the first one to anonymize data at the client side, allowing users to select the amount and accuracy of shared data. In this article, we describe an improved version of the protocol, and we include the implementation together with an analysis of the results obtained after the simulation with real trajectory data.
引用
收藏
页数:27
相关论文
共 50 条
  • [21] Query Disambiguation: User-centric Approach
    Feki, Ghada
    Fakhfakh, Rim
    Ben Ammar, Anis
    Ben Amar, Chokri
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2016, 11 (03): : 144 - 156
  • [22] Privacy-enhanced User-Centric Identity Management
    Ahn, Gail-Joon
    Ko, Moonam
    Shehab, Mohamed
    2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-8, 2009, : 998 - +
  • [23] A user-centric approach to pricing information
    Rao, Divya
    Ng, Wee Keong
    PROCEEDINGS 2016 IEEE SECOND INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING SERVICE AND APPLICATIONS (BIGDATASERVICE 2016), 2016, : 202 - 209
  • [24] A User-Centric Service Composition Approach
    Vulcu, Gabriela
    Bhiri, Sami
    Hauswirth, Manfred
    Zhou, Zhangbing
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2008 WORKSHOPS, 2008, 5333 : 160 - 169
  • [25] User-Centric Multiobjective Approach to Privacy Preservation and Energy Cost Minimization in Smart Home
    Chang, Hsuan-Hao
    Chiu, Wei-Yu
    Sun, Hongjian
    Chen, Chia-Ming
    IEEE SYSTEMS JOURNAL, 2019, 13 (01): : 1030 - 1041
  • [26] Realization of a user-centric, privacy preserving permission framework for Android
    Nauman, Mohammad
    Khan, Sohail
    Othman, Abu Talib
    Musa, Shahrulniza
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (03) : 368 - 382
  • [27] FOUGERE: User-Centric Location Privacy in Mobile Crowdsourcing Apps
    Meftah, Lakhdar
    Rouvoy, Romain
    Chrisment, Isabelle
    DISTRIBUTED APPLICATIONS AND INTEROPERABLE SYSTEMS, DAIS 2019, 2019, 11534 : 116 - 132
  • [28] User-Centric Privacy for Identity Federations Based on a Recommendation System
    Villaran, Carlos
    Beltran, Marta
    ELECTRONICS, 2022, 11 (08)
  • [29] PassBio: Privacy-Preserving User-Centric Biometric Authentication
    Zhou, Kai
    Ren, Jian
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (12) : 3050 - 3063
  • [30] User-Centric Privacy Preservation in Data-Sharing Applications
    Gao, Feng
    He, Jingsha
    Peng, Shufen
    NETWORK AND PARALLEL COMPUTING, 2010, 6289 : 423 - +