Mobility-Aware Differentially Private Trajectory for Privacy-Preserving Continual Crowdsourcing

被引:4
|
作者
Qiu, Guoying [1 ]
Shen, Yulong [1 ]
机构
[1] Xidian Univ, Sch Comp Sci & Technol, Xian 710071, Peoples R China
来源
IEEE ACCESS | 2021年 / 9卷
基金
中国国家自然科学基金;
关键词
Task analysis; Crowdsourcing; Privacy; Spatiotemporal phenomena; Trajectory; Sensitivity; Correlation; Location privacy preservation; trajectory prediction; inferential attacks; differential privacy; continual location sharing; LOCATION PRIVACY; PRESERVATION; ATTACKS;
D O I
10.1109/ACCESS.2021.3058211
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Participating in mobile services by synthesizing trajectories with consistent lifestyle and meaningful mobility as actual traces are the most popular way to protect location privacy. However, recent trajectory synthesizing techniques are still threatened by the information that the attacker inevitably obtains, such as the locations of the accepted tasks in the crowdsourcing application. With this information and the spatiotemporal correlation hidden in the user's mobility, the attacker can infer the user's actual location and even future behaviors. It remains open to defend against such inferential attacks in the continual crowdsourcing scenarios. In this paper, we propose a mobility-aware differentially private solution, ConCrowd-DP, for achieving the privacy-preserving continual crowdsourcing application. Specifically, before starting the application, we first construct a spatiotemporal mobile model, STMarkov, to model the spatiotemporal correlation in users' mobility. Then, a perturbed location is generated for the user to participate in the crowdsourcing application, according to STMarkov and K-norm DP. Finally, we eliminate the privacy threat brought by the accepted task based on K-norm DP and Bayesian posterior theorem. With ConCrowd-DP in place, a mobility-aware differentially private trace is generated for the user to participate in the application continually. Extensive experiments with real-world datasets demonstrate that ConCrowd-DP guarantees the usability of the synthesized trajectory effectively, while providing the DP protection for defending against the inferential attacks which stem from the multiple accepted tasks.
引用
收藏
页码:26362 / 26376
页数:15
相关论文
共 50 条
  • [41] Privacy-Preserving Competitive Detour Tasking in Spatial Crowdsourcing
    Zheng, Yifeng
    Zhou, Menglun
    Wang, Songlei
    Hua, Zhongyun
    Jiang, Jinghua
    Gao, Yansong
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2025, 18 (01) : 385 - 398
  • [42] FedCrowd: A Federated and Privacy-Preserving Crowdsourcing Platform on Blockchain
    Guo, Yu
    Xie, Hongcheng
    Miao, Yinbin
    Wang, Cong
    Jia, Xiaohua
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (04) : 2060 - 2073
  • [43] A Survey on Location Privacy-Preserving Mechanisms in Mobile Crowdsourcing
    Bashanfar, Arwa
    Al-Zahrani, Eman
    Alutebei, Maram
    Aljagthami, Wejdan
    Alshehri, Suhari
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (07) : 626 - 632
  • [44] DCentroid: Location Privacy-Preserving Scheme in Spatial Crowdsourcing
    Alharthi, Raed
    Aloufi, Esam
    Alqazzaz, Ali
    Alrashdi, Ibrahim
    Zohdy, Mohamed
    2019 IEEE 9TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2019, : 715 - 720
  • [45] Optimizing rewards allocation for privacy-preserving spatial crowdsourcing
    Xiong, Ping
    Zhu, Danyang
    Zhang, Lefeng
    Ren, Wei
    Zhu, Tianqing
    COMPUTER COMMUNICATIONS, 2019, 146 : 85 - 94
  • [46] Location Privacy-Preserving Distance Computation for Spatial Crowdsourcing
    Han, Song
    Lin, Jianhong
    Zhao, Shuai
    Xu, Guangquan
    Ren, Siqi
    He, Daojing
    Wang, Licheng
    Shi, Leyun
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (08): : 7550 - 7563
  • [47] Utility-aware and Privacy-preserving Trajectory Synthesis Model that Resists Social Relationship Privacy Attacks
    Zheng, Zhirun
    Li, Zhetao
    Li, Jie
    Jiang, Hongbo
    Li, Tong
    Guo, Bin
    ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, 2022, 13 (03)
  • [48] Privacy-Preserving and Approximately Truthful Local Electricity Markets: A Differentially Private VCG Mechanism
    Hoseinpour, Milad
    Hoseinpour, Mohammad
    Haghifam, Mahdi
    Haghifam, Mahmoud-Reza
    IEEE TRANSACTIONS ON SMART GRID, 2024, 15 (02) : 1991 - 2003
  • [49] Privacy-Preserving Genomic Data Publishing via Differentially-Private Suffix Tree
    Khatri, Tanya
    Dagher, Gaby G.
    Hou, Yantian
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM, PT I, 2019, 304 : 569 - 584
  • [50] SynTF: Synthetic and Differentially Private Term Frequency Vectors for Privacy-Preserving Text Mining
    Weggenmann, Benjamin
    Kerschbaum, Florian
    ACM/SIGIR PROCEEDINGS 2018, 2018, : 305 - 314