4.6 Article

Structured Sparsity Model Based Trajectory Tracking Using Private Location Data Release

Journal

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
Volume 18, Issue 6, Pages 2983-2995

Publisher

IEEE COMPUTER SOC
DOI: 10.1109/TDSC.2020.2972334

Keywords

Trajectory; Hidden Markov models; Differential privacy; Privacy; Data models; Location privacy; differential privacy; multiple trajectory recovery; structured sparsity model

Funding

  1. China NSFC program [61872022, 61421003]
  2. Beijing Advanced Innovation Center for Big Data and Brain Computing

Ask authors/readers for more resources

Mobile devices have become an important part of daily life, with increasing concerns about potential privacy leakage, especially location privacy. This article introduces a novel location inference attack framework, iTracker, which can recover multiple trajectories simultaneously using a structured sparsity model, outperforming existing recovery algorithms.
Mobile devices have been an integral part of our everyday lives. Users' increasing interaction with mobile devices brings in significant concerns on various types of potential privacy leakage, among which location privacy draws the most attention. Specifically, mobile users' trajectories constructed by location data may be captured by adversaries to infer sensitive information. In previous studies, differential privacy has been utilized to protect published trajectory data with rigorous privacy guarantee. Strong protection provided by differential privacy distorts the original locations or trajectories using stochastic noise to avoid privacy leakage. In this article, we propose a novel location inference attack framework, iTracker, which simultaneously recovers multiple trajectories from differentially private trajectory data using the structured sparsity model. Compared with the traditional recovery methods based on single trajectory prediction, iTracker, which takes advantage of the correlation among trajectories discovered by the structured sparsity model, is more effective in recovering multiple private trajectories simultaneously. iTracker successfully attacks the existing privacy protection mechanisms based on differential privacy. We theoretically demonstrate the near-linear runtime of iTracker, and the experimental results using two real-world datasets show that iTracker outperforms existing recovery algorithms in recovering multiple trajectories.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available