Abstract

The ubiquity of GPS-enabled devices has resulted in an abundance of data about individual trajectories. Releasing trajectories enables a range of data analysis tasks, such as urban planning, but it also poses a risk in compromising individual location privacy. To tackle this issue, a number of location privacy protection algorithms are proposed. However, existing works are primarily concerned with maintaining the trajectory data geographic utility and neglect the semantic utility. Thus, many data analysis tasks relying on utility, e.g., semantic annotation, suffer from poor performance. Furthermore, the released trajectories are vulnerable to location inference attacks and de-anonymization attacks due to insufficient privacy guarantee. In this paper, to design a location privacy protection algorithm for releasing an offline trajectory dataset to potentially untrusted analyzers, we propose a utility-optimized and differentially private trajectory synthesizer (UDPT) with two novel features. First, UDPT simultaneously preserves both geographical utility and semantic utility by solving a data utility optimization problem with a genetic algorithm. Second, UDPT provides a formal and provable guarantee against privacy attacks by synthesizing obfuscated trajectories in a differentially private manner. Extensive experimental evaluations on real-world datasets demonstrate UDPT’s outperformance against state-of-the-art works in terms of data utility and privacy.

Highlights

  • The ubiquity of GPS-equipped devices, from airplanes and automobiles to smartphones and wearable technology, along with the popularity of location-based services (LBSs), such as automobile navigation and searching nearby restaurants, has greatly eased the collection of individual trajectories, where a trajectory is a sequence of locations visited by an individual over time

  • We propose a utility-optimized and differentially private trajectory synthesis algorithm named utility-optimized and differentially private trajectory synthesizer (UDPT), which is composed of three sequential phases as follows. (i) To provide an effective defense against the location inference attacks, locations in the actual trajectories are blurred into regions by private location clustering. (ii) To simultaneously preserve both the geographical utility and semantic utility, we privately select a sequence of utility-optimized candidate obfuscated location sets from the clusters

  • Three real-world datasets were used for the experimental evaluations . (i) The GeoLife [30] dataset contains a large number of moving trajectories collected from 182 mobile individuals over three years. (ii) The Gowalla dataset contains an undirected social network and check-ins collected by the Stanford Network Analysis Project (SNAP) from Gowalla, a popular location-based social network (LBSN), throughout 20082010 [33]

Read more

Summary

Introduction

The ubiquity of GPS-equipped devices, from airplanes and automobiles to smartphones and wearable technology, along with the popularity of location-based services (LBSs), such as automobile navigation and searching nearby restaurants, has greatly eased the collection of individual trajectories, where a trajectory is a sequence of locations visited by an individual over time. New York City Taxi and Limousine Commission publicly releases a trajectory dataset of taxi passengers every month The data analyzers, such as urban planners, can improve the community division with the help of the spatial–temporal regularity of human movement patterns [2]. Actual trajectories are usually obfuscated by location privacy protection methods (LPPMs), e.g., location perturbation [4], cryptography [5], trajectory synthesis [6], before being released. Among these works, the trajectory synthesis has been widely accepted for offline releasing trajectories because of its good preservation of population mobility patterns [6].

Objectives
Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call