Protecting Privacy in Trajectories with a User-Centric Approach

被引:4
|
作者
Romero-Tris, Cristina [1 ]
Megias, David [1 ]
机构
[1] UOC, Internet Interdisciplinary Inst IN3, CYBERCAT Ctr Cybersecur Res Catalonia, Av Carl Friedrich Gauss 5, Castelldefels 08860, Barcelona, Spain
关键词
Trajectory anonymization; user-centric protocol; privacy; DIFFERENTIAL PRIVACY; LOCATION; NETWORKS;
D O I
10.1145/3233185
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The increased use of location-aware devices, such as smartphones, generates a large amount of trajectory data. These data can be useful in several domains, like marketing, path modeling, localization of an epidemic focus, and so on. Nevertheless, since trajectory information contains personal mobility data, improper use or publication of trajectory data can threaten users' privacy. It may reveal sensitive details like habits of behavior, religious beliefs, and sexual preferences. Therefore, many users might be unwilling to share their trajectory data without a previous anonymization process. Currently, several proposals to address this problem can be found in the literature. These solutions focus on anonymizing data before its publication, i.e., when they are already stored in the server database. Nevertheless, we argue that this approach gives the user no control about the information she shares. For this reason, we propose anonymizing data in the users' mobile devices, before they are sent to a third party. This article extends our previous work which was, to the best of our knowledge, the first one to anonymize data at the client side, allowing users to select the amount and accuracy of shared data. In this article, we describe an improved version of the protocol, and we include the implementation together with an analysis of the results obtained after the simulation with real trajectory data.
引用
收藏
页数:27
相关论文
共 50 条
  • [41] UNIQuE: A User-Centric Framework for Network Identity Management
    Altmann, Joern
    Sampath, Rajarajan
    2006 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, VOLS 1 AND 2, 2006, : 495 - 506
  • [42] Towards Transparent and Secure IoT: Improving the Security and Privacy through a User-Centric Rules-Based System
    Lola, Joao
    Serrao, Carlos
    Casal, Joao
    ELECTRONICS, 2023, 12 (12)
  • [43] A user-centric federated single sign-on system
    Suriadi, Suriadi
    Foo, Ernest
    Josang, Audun
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2009, 32 (02) : 388 - 401
  • [44] User-centric identity management using trusted modules
    Vossaert, J.
    Lapon, J.
    De Decker, B.
    Naessens, V.
    MATHEMATICAL AND COMPUTER MODELLING, 2013, 57 (7-8) : 1592 - 1605
  • [45] User-Centric Identity Management Using Trusted Modules
    Vossaert, Jan
    Lapon, Jorn
    De Decker, Bart
    Naessens, Vincent
    PUBLIC KEY INFRASTRUCTURES, SERVICES AND APPLICATIONS, 2011, 6711 : 155 - +
  • [46] Ethical-Legal Challenges in User-Centric AmI Services
    Kosta, E.
    Pitkanen, O.
    Niemela, M.
    Kaasinen, E.
    2008 3RD INTERNATIONAL CONFERENCE ON INTERNET AND WEB APPLICATIONS AND SERVICES (ICIW 2008), 2008, : 19 - +
  • [47] A Smart Card Based Solution for User-Centric Identity Management
    Vossaert, Jan
    Verhaeghe, Pieter
    De Decker, Bart
    Naessens, Vincent
    PRIVACY AND IDENTITY MANAGEMENT FOR LIFE, 2011, 352 : 164 - +
  • [48] A User-Centric Perspective of 6G Networks: A Survey
    Drampalou, Stamatia F.
    Uzunidis, Dimitris
    Vetsos, Anastasios
    Miridakis, Nikolaos I.
    Karkazis, Panagiotis
    IEEE ACCESS, 2024, 12 : 190255 - 190294
  • [49] Protection of Personal Information in User-centric Converged Service Platforms
    Yelmo, J. C.
    Martinez, C.
    del Alamo, J. M.
    Monjas, M. A.
    IEEE LATIN AMERICA TRANSACTIONS, 2010, 8 (02) : 127 - 134
  • [50] Dynamic Traffic Congestion Pricing Mechanism with User-Centric Considerations
    Kim Thien Bui
    Vu Anh Huynh
    Frazzoli, Emilio
    2012 15TH INTERNATIONAL IEEE CONFERENCE ON INTELLIGENT TRANSPORTATION SYSTEMS (ITSC), 2012, : 147 - 154