Protecting Privacy in Trajectories with a User-Centric Approach

被引:4
|
作者
Romero-Tris, Cristina [1 ]
Megias, David [1 ]
机构
[1] UOC, Internet Interdisciplinary Inst IN3, CYBERCAT Ctr Cybersecur Res Catalonia, Av Carl Friedrich Gauss 5, Castelldefels 08860, Barcelona, Spain
关键词
Trajectory anonymization; user-centric protocol; privacy; DIFFERENTIAL PRIVACY; LOCATION; NETWORKS;
D O I
10.1145/3233185
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The increased use of location-aware devices, such as smartphones, generates a large amount of trajectory data. These data can be useful in several domains, like marketing, path modeling, localization of an epidemic focus, and so on. Nevertheless, since trajectory information contains personal mobility data, improper use or publication of trajectory data can threaten users' privacy. It may reveal sensitive details like habits of behavior, religious beliefs, and sexual preferences. Therefore, many users might be unwilling to share their trajectory data without a previous anonymization process. Currently, several proposals to address this problem can be found in the literature. These solutions focus on anonymizing data before its publication, i.e., when they are already stored in the server database. Nevertheless, we argue that this approach gives the user no control about the information she shares. For this reason, we propose anonymizing data in the users' mobile devices, before they are sent to a third party. This article extends our previous work which was, to the best of our knowledge, the first one to anonymize data at the client side, allowing users to select the amount and accuracy of shared data. In this article, we describe an improved version of the protocol, and we include the implementation together with an analysis of the results obtained after the simulation with real trajectory data.
引用
收藏
页数:27
相关论文
共 50 条
  • [1] Assessing Privacy Risks in Android: A User-Centric Approach
    Mylonas, Alexios
    Theoharidou, Marianthi
    Gritzalis, Dimitris
    RISK ASSESSMENT AND RISK-DRIVEN TESTING, RISK 2013, 2014, 8418 : 21 - 37
  • [2] User-centric privacy awareness in video surveillance
    Thomas Winkler
    Bernhard Rinner
    Multimedia Systems, 2012, 18 : 99 - 121
  • [3] User-Centric Privacy Controls for Smart Homes
    Chhetri C.
    Genaro Motti V.
    Proceedings of the ACM on Human-Computer Interaction, 2022, 6 (2 CSCW)
  • [4] Security, privacy and trust of user-centric solutions
    Akram, Raja Naeem
    Chen, Hsiao-Hwa
    Lopez, Javier
    Sauveron, Damien
    Yang, Laurence T.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 80 : 417 - 420
  • [5] User-centric privacy awareness in video surveillance
    Winkler, Thomas
    Rinner, Bernhard
    MULTIMEDIA SYSTEMS, 2012, 18 (02) : 99 - 121
  • [6] User-Centric Federated Matrix Factorization Based on Differential Privacy
    Liu, Yang
    Xu, Wanyin
    Lai, Jiaxin
    Wang, Jiabo
    IEEE INTERNET COMPUTING, 2023, 27 (03) : 21 - 27
  • [7] Self-service Privacy: User-Centric Privacy for Network-Centric Identity
    del Alamo, Jose M.
    Monjas, Miguel A.
    Yelmo, Juan C.
    San Miguel, Beatriz
    Trapero, Ruben
    Fernandez, Antonio M.
    TRUST MANAGEMENT IV, 2010, 321 : 17 - +
  • [8] A User-Centric Approach to API Delegations Enforcing Privacy Policies on OAuth Delegations
    Kalantari, Shirin
    Philippaerts, Pieter
    Dimova, Yana
    Hughes, Danny
    Joosen, Wouter
    De Decker, Bart
    COMPUTER SECURITY - ESORICS 2023, PT II, 2024, 14345 : 318 - 337
  • [9] Cloud Computing Privacy Issues and User-Centric Solution
    Lijo, V. P.
    Kalady, Saidalavi
    COMPUTER NETWORKS AND INTELLIGENT COMPUTING, 2011, 157 : 448 - 456
  • [10] Tangible Privacy: Towards User-Centric Sensor Designs for Bystander Privacy
    Ahmad I.
    Farzan R.
    Kapadia A.
    Lee A.J.
    1600, Association for Computing Machinery (04):