Abstract

The development of wireless technologies and the popularity of mobile devices is responsible for generating large amounts of trajectory data for moving objects. Trajectory datasets have spatiotemporal features and are a rich information source. The mining of trajectory data can reveal interesting patterns of human activities and behaviors. However, trajectory data can also be exploited to disclose users’ privacy information, e.g., the places they live and work, which could be abused by a malicious user. Therefore, it is very important to protect the users’ privacy before publishing any trajectory data. While most previous research on this subject has only considered the privacy protection of stay points, this paper distinguishes itself by modeling and processing semantic trajectories, which not only contain spatiotemporal data but also involve POI information and the users’ motion modes such as walking, running, driving, etc. Accordingly, in this research, semantic trajectory anonymizing based on the k-anonymity model is proposed that can form sensitive areas that contain k − 1 POI points that are similar to the sensitive points. Then, trajectory ambiguity is executed based on the motion modes, road network topologies and road weights in the sensitive area. Finally, a similarity comparison is performed to obtain the recordable and releasable anonymity trajectory sets. Experimental results show that this method performs efficiently and provides high privacy levels.

Highlights

  • Due to the development of mobile devices and positioning technologies, various kinds of mobile positioning devices, such as car navigation systems, GPS-enabled mobileLocation data have created both benefits and problems, and of the problems, privacy disclosure is the mostWireless Networks (2020) 26:5551–5560 prominent issue [17–23]

  • In this research, semantic trajectory anonymizing based on the k-anonymity model is proposed that can form sensitive areas that contain k - 1 POI points that are similar to the sensitive points

  • For the semantic trajectory anonymity protection algorithm, we measured the algorithm efficiency in the cases of k = 3, 5, 8 and 10, and dataset amount ranges from 10 to 30 k separately and took when the grid division method is adopted for sensitive area construction

Read more

Summary

Introduction

Due to the development of mobile devices and positioning technologies, various kinds of mobile positioning devices, such as car navigation systems, GPS-enabled mobile. Potential attackers can identify the locations visited by a mobile user and discover their home address and job location by analyzing their spatiotemporal trajectories They can even derive private information such as a user’s behavioral patterns from their daily motion trajectories, thereby posing a great threat to the user’s safety and property. Researchers have proposed multiple solutions for solving privacy disclosure problems caused by LBSs. The existing privacy protection methods for LBSs mainly include data encryption, pseudoaddresses, space conversions and anonymity areas [24–29]. Lee et al imposed a threshold on the information obtainable by adversaries [34] They suggested exploring location semantics by observing users’ length of stay. The semantic trajectory is modeled based on the data it obtains including longitude, latitude, timestamp, POI yellow page information, velocity and motion mode. Similarity comparisons are performed to obtain recordable and releasable anonymity trajectory datasets

Semantic trajectory anonymity protection algorithm
Semantic trajectory modeling
Sensitive area construction
Trajectory ambiguity
Start–end point ambiguity
Stay point ambiguity
Trajectory set construction based on the K-anonymity model
Spatial distance measurement
Temporal distance measurement
Semantic distance measurement
Spatial–temporal distance measurement
Evaluation
Overall performance
Information loss rate
Query error rate
Conclusion
Compliance with ethical standards
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call