Protecting Privacy in Trajectories with a User-Centric Approach

被引:4
|
作者
Romero-Tris, Cristina [1 ]
Megias, David [1 ]
机构
[1] UOC, Internet Interdisciplinary Inst IN3, CYBERCAT Ctr Cybersecur Res Catalonia, Av Carl Friedrich Gauss 5, Castelldefels 08860, Barcelona, Spain
关键词
Trajectory anonymization; user-centric protocol; privacy; DIFFERENTIAL PRIVACY; LOCATION; NETWORKS;
D O I
10.1145/3233185
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The increased use of location-aware devices, such as smartphones, generates a large amount of trajectory data. These data can be useful in several domains, like marketing, path modeling, localization of an epidemic focus, and so on. Nevertheless, since trajectory information contains personal mobility data, improper use or publication of trajectory data can threaten users' privacy. It may reveal sensitive details like habits of behavior, religious beliefs, and sexual preferences. Therefore, many users might be unwilling to share their trajectory data without a previous anonymization process. Currently, several proposals to address this problem can be found in the literature. These solutions focus on anonymizing data before its publication, i.e., when they are already stored in the server database. Nevertheless, we argue that this approach gives the user no control about the information she shares. For this reason, we propose anonymizing data in the users' mobile devices, before they are sent to a third party. This article extends our previous work which was, to the best of our knowledge, the first one to anonymize data at the client side, allowing users to select the amount and accuracy of shared data. In this article, we describe an improved version of the protocol, and we include the implementation together with an analysis of the results obtained after the simulation with real trajectory data.
引用
收藏
页数:27
相关论文
共 50 条
  • [31] A Novel Approach for User-Centric Work Environment
    Park, Juyoung
    Noh, Sungkee
    2015 INTERNATIONAL CONFERENCE ON ICT CONVERGENCE (ICTC), 2015, : 942 - 945
  • [32] A User-Centric Method for Data Privacy Protection in Cloud Computing
    Li, Xiaohui
    He, Jingsha
    2011 INTERNATIONAL CONFERENCE ON COMPUTER, ELECTRICAL, AND SYSTEMS SCIENCES, AND ENGINEERING (CESSE 2011), 2011, : 355 - +
  • [33] PDMFRec: A Decentralised Matrix Factorisation with Tunable User-centric Privacy
    Duriakova, Erika
    Tragos, Elias Z.
    Smyth, Barry
    Hurley, Neil
    Pena, Francisco J.
    Symeonidis, Panagiotis
    Geraci, James
    Lawlor, Aonghus
    RECSYS 2019: 13TH ACM CONFERENCE ON RECOMMENDER SYSTEMS, 2019, : 457 - 461
  • [34] User-Centric Federated Matrix Factorization Based on Differential Privacy
    Liu, Yang
    Xu, Wanyin
    Lai, Jiaxin
    Wang, Jiabo
    IEEE INTERNET COMPUTING, 2023, 27 (03) : 21 - 27
  • [35] A Privacy-Preserving Platform for User-Centric Quantitative Benchmarking
    Herrmann, Dominik
    Scheuer, Florian
    Feustel, Philipp
    Nowey, Thomas
    Federrath, Hannes
    TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2009, 5695 : 32 - 41
  • [36] ULDP: A User-Centric Local Differential Privacy Optimization Method
    Yang, Wenjun
    Al-Masri, Eyhab
    2024 IEEE 5TH ANNUAL WORLD AI IOT CONGRESS, AIIOT 2024, 2024, : 0316 - 0322
  • [37] A mapping of IoT user-centric privacy preserving approaches to the GDPR
    Kounoudes, Alexia Dini
    Kapitsaki, Georgia M.
    INTERNET OF THINGS, 2020, 11
  • [38] A Practical Implementation of Veiled Certificate for User-Centric Privacy Protection
    Goss, Will
    Huang, Chin-Tser
    PROCEEDINGS OF THE 50TH ANNUAL ASSOCIATION FOR COMPUTING MACHINERY SOUTHEAST CONFERENCE, 2012,
  • [39] User-Centric Distributed Solutions for Privacy-Preserving Analytics
    Bestavros, Azer
    Lapets, Andrei
    Varia, Mayank
    COMMUNICATIONS OF THE ACM, 2017, 60 (02) : 37 - 39
  • [40] A User-Centric Privacy Control Framework for Decentralized IoT Platforms
    Tao, Xu
    Zhao, Rui
    Chehida, Salim
    Conzon, Davide
    Ferrera, Enrico
    Bensalem, Saddek
    QUALITY OF INFORMATION AND COMMUNICATIONS TECHNOLOGY, QUATIC 2024, 2024, 2178 : 408 - 415