4.7 Article

Balancing trajectory privacy and data utility using a personalized anonymization model

Journal

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
Volume 38, Issue -, Pages 125-134

Publisher

ACADEMIC PRESS LTD- ELSEVIER SCIENCE LTD
DOI: 10.1016/j.jnca.2013.03.010

Keywords

Trajectory k-anonymity set; Trajectory similarity and direction; Trajectory distance; A personalized anonymization model

Funding

  1. Program for Changjiang Scholars and Innovative Research Team in University [IRT1078]
  2. NSFC-Guangdong Union Foundation [U1135002]
  3. Major National ST Program [2011ZX03005-002]
  4. Natural Science Foundation of China [61072066]
  5. Fundamental Research Funds for the Central Universities [JY10000903001, K5051203010]

Ask authors/readers for more resources

With the widespread use of location-based services (LBS), the number of trajectories gathered by location service providers is dynamically growing. On the one hand, mining and analyzing these spatiotemporal trajectories can help to work out a mobile-related strategic planning; on the other hand, knowledge of each trajectory can be used by adversaries to identify the user's sensitive information and lead to an unpredictable harm. The concept of trajectory k-anonymity extends from location k-anonymity that has been widely used to address this issue. The main challenge of trajectory k-anonymity is the selection of a trajectory k-anonymity set. However, existing anonymity methods ignore the trajectory similarity and direction, assuming that it has little impact on privacy. Thus, it cannot provide a preferable trajectory k-anonymity set. In this paper, we propose to use trajectory angle to evaluate trajectory similarity and direction, and construct an anonymity region on the basis of trajectory distance. Considering the various preference settings on the proportion of trajectory privacy and data utility in different scenarios, we propose a personalized anonymization model to select the trajectory k-anonymity set. Experiment results prove that our method can provide an effective trajectory k-anonymity set under various proportions of trajectory privacy and data utility requirements, while the efficiency just reduces a little. (C) 2013 Elsevier Ltd. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available