Protecting Privacy in Trajectories with a User-Centric Approach

被引:4
|
作者
Romero-Tris, Cristina [1 ]
Megias, David [1 ]
机构
[1] UOC, Internet Interdisciplinary Inst IN3, CYBERCAT Ctr Cybersecur Res Catalonia, Av Carl Friedrich Gauss 5, Castelldefels 08860, Barcelona, Spain
关键词
Trajectory anonymization; user-centric protocol; privacy; DIFFERENTIAL PRIVACY; LOCATION; NETWORKS;
D O I
10.1145/3233185
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The increased use of location-aware devices, such as smartphones, generates a large amount of trajectory data. These data can be useful in several domains, like marketing, path modeling, localization of an epidemic focus, and so on. Nevertheless, since trajectory information contains personal mobility data, improper use or publication of trajectory data can threaten users' privacy. It may reveal sensitive details like habits of behavior, religious beliefs, and sexual preferences. Therefore, many users might be unwilling to share their trajectory data without a previous anonymization process. Currently, several proposals to address this problem can be found in the literature. These solutions focus on anonymizing data before its publication, i.e., when they are already stored in the server database. Nevertheless, we argue that this approach gives the user no control about the information she shares. For this reason, we propose anonymizing data in the users' mobile devices, before they are sent to a third party. This article extends our previous work which was, to the best of our knowledge, the first one to anonymize data at the client side, allowing users to select the amount and accuracy of shared data. In this article, we describe an improved version of the protocol, and we include the implementation together with an analysis of the results obtained after the simulation with real trajectory data.
引用
收藏
页数:27
相关论文
共 50 条
  • [21] P2F: A User-Centric Privacy Protection Framework
    Jafari-Lafti, Maryam
    Huang, Chin-Tser
    Farkas, Csilla
    2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 386 - 391
  • [22] Enhancing privacy policy comprehension through Privacify: : A user-centric approach using advanced language models
    Woodring, Justin
    Perez, Katherine
    Ali-Gombe, Aisha
    COMPUTERS & SECURITY, 2024, 145
  • [23] Towards Privacy-Preserving Web Metering via User-Centric Hardware
    Alarifi, Fahad
    Fernandez, Maribel
    INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT II, 2015, 153 : 329 - 340
  • [24] A User-Centric Mechanism for Sequentially Releasing Graph Datasets under Blowfish Privacy
    Chicha, Elie
    Al Bouna, Bechara
    Nassar, Mohamed
    Chbeir, Richard
    Haraty, Ramzi A.
    Oussalah, Mourad
    Benslimane, Djamal
    Alraja, Mansour Naser
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2021, 21 (01)
  • [25] Efficient User-Centric Privacy-Friendly and Flexible Wearable Data Aggregation and Sharing
    Jastaniah, Khlood
    Zhang, Ning
    Mustafa, Mustafa A.
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2024, 12 (04) : 967 - 982
  • [26] A privacy enabled service authorization based on a user-centric virtual identity management system
    Chen, Zhikui
    2007 SECOND INTERNATIONAL CONFERENCE IN COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1 AND 2, 2007, : 583 - 587
  • [27] User-Centric Quality of Service Provisioning
    Culverhouse, M. E.
    Ghita, B. V.
    Reynolds, P.
    2011 IEEE 36TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2011, : 35 - 41
  • [28] Large-scale k-means clustering with user-centric privacy preservation
    Sakuma, Jun
    Kobayashi, Shigenobu
    ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2008, 5012 : 320 - 332
  • [29] User-centric Android Flexible Permissions
    Scoccia, Gian Luca
    Malavolta, Ivano
    Autili, Marco
    Di Salle, Amleto
    Inverardi, Paola
    PROCEEDINGS OF THE 2017 IEEE/ACM 39TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING COMPANION (ICSE-C 2017), 2017, : 365 - 367
  • [30] Large-scale k-means clustering with user-centric privacy-preservation
    Jun Sakuma
    Shigenobu Kobayashi
    Knowledge and Information Systems, 2010, 25 : 253 - 279