Protecting Privacy in Trajectories with a User-Centric Approach

被引:4
|
作者
Romero-Tris, Cristina [1 ]
Megias, David [1 ]
机构
[1] UOC, Internet Interdisciplinary Inst IN3, CYBERCAT Ctr Cybersecur Res Catalonia, Av Carl Friedrich Gauss 5, Castelldefels 08860, Barcelona, Spain
关键词
Trajectory anonymization; user-centric protocol; privacy; DIFFERENTIAL PRIVACY; LOCATION; NETWORKS;
D O I
10.1145/3233185
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The increased use of location-aware devices, such as smartphones, generates a large amount of trajectory data. These data can be useful in several domains, like marketing, path modeling, localization of an epidemic focus, and so on. Nevertheless, since trajectory information contains personal mobility data, improper use or publication of trajectory data can threaten users' privacy. It may reveal sensitive details like habits of behavior, religious beliefs, and sexual preferences. Therefore, many users might be unwilling to share their trajectory data without a previous anonymization process. Currently, several proposals to address this problem can be found in the literature. These solutions focus on anonymizing data before its publication, i.e., when they are already stored in the server database. Nevertheless, we argue that this approach gives the user no control about the information she shares. For this reason, we propose anonymizing data in the users' mobile devices, before they are sent to a third party. This article extends our previous work which was, to the best of our knowledge, the first one to anonymize data at the client side, allowing users to select the amount and accuracy of shared data. In this article, we describe an improved version of the protocol, and we include the implementation together with an analysis of the results obtained after the simulation with real trajectory data.
引用
收藏
页数:27
相关论文
共 50 条
  • [41] A USER-CENTRIC APPROACH FOR FEDERATED IDENTITY MANAGEMENT
    Bergadano, Francesco
    Accornero, Renato
    Lucisano, Giovanna
    Rispoli, Daniele
    INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2013, 5 (01): : 3 - 18
  • [42] A declarative approach for specifying user-centric communication
    Clarke, Peter J.
    Hristidis, Vagelis
    Wang, Yingbo
    Prabakar, Nagarajan
    Deng, Yi
    2006 INTERNATIONAL SYMPOSIUM ON COLLABORATIVE TECHNOLOGIES AND SYSTEMS, PROCEEDINGS, 2006, : 89 - +
  • [43] OpenID as an Approach for User-centric Identity Management
    Bitzer, Stefan
    Klein, Marco
    Schumann, Matthias
    AMCIS 2010 PROCEEDINGS, 2010,
  • [44] A User-Centric Approach for Developing Mobile Applications
    Cernezel, Ales
    Hericko, Marjan
    7TH INTERNATIONAL CONFERENCE ON KNOWLEDGE MANAGEMENT IN ORGANIZATIONS: SERVICE AND CLOUD COMPUTING, 2013, 172 : 455 - 465
  • [45] User-centric approach of detecting temporary community
    Boujlaleb, Loubna
    Idarrou, Ali
    Mammass, Driss
    Sarr, Idrissa
    PROCEEDINGS OF 2015 THIRD IEEE WORLD CONFERENCE ON COMPLEX SYSTEMS (WCCS), 2015,
  • [46] Coordination for the Internet of Services: a user-centric approach
    Boari, M.
    Corradi, A.
    Lodolo, E.
    Monti, S.
    Pasini, S.
    2008 3RD INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEM SOFTWARE AND MIDDLEWARE AND WORKSHOPS, VOLS 1 AND 2, 2008, : 434 - 441
  • [47] User-centric Design
    Fuchs, Andreas
    Fuchs, Andreas, 1600, Springer Vieweg (13) : 8 - 9
  • [48] User-centric broadband
    Lombard, D
    ALCATEL TELECOMMUNICATIONS REVIEW, 2005, (01): : 2 - 3
  • [49] A user-centric view
    Slayton, Derek
    COMMUNICATIONS NEWS, 2006, 43 (08): : 21 - 21
  • [50] User-Centric Security
    Feth, Denis
    2015 10TH JOINT MEETING OF THE EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND THE ACM SIGSOFT SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (ESEC/FSE 2015) PROCEEDINGS, 2015, : 1034 - 1037