A Novel Time-Obfuscated Algorithm for Trajectory Privacy Protection

被引:110
作者
Hwang, Ren-Hung [1 ]
Hsueh, Yu-Ling [1 ]
Chung, Hao-Wei [1 ]
机构
[1] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, Minxiong, Taiwan
关键词
Computer society; security and privacy; LOCATION PRIVACY;
D O I
10.1109/TSC.2013.55
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Location-based services (LBS) which bring so much convenience to our daily life have been intensively studied over the years. Generally, an LBS query processing can be categorized into snapshot and continuous queries which access user location information and return search results to the users. An LBS has full control of the location information, causing user privacy concerns. If an LBS provider has a malicious intention to breach the user privacy by tracking the users' routes to their destinations, it incurs a serious threat. Most existing techniques have addressed privacy protection mainly for snapshot queries. However, providing privacy protection for continuous queries is of importance, since a malicious LBS can easily obtain complete user privacy information by observing a sequence of successive query requests. In this paper, we propose a comprehensive trajectory privacy technique and combine ambient conditions to cloak location information based on the user privacy profile to avoid a malicious LBS reconstructing a user trajectory. We first propose an r-anonymity mechanism which preprocesses a set of similar trajectories R to blur the actual trajectory of a service user. We then combine k-anonymity with s road segments to protect the user's privacy. We introduce a novel time-obfuscated technique which breaks the sequence of the query issuing time for a service user to confuse the LBS so it does not know the user trajectory, by sending a query randomly from a set of locations residing at the different trajectories in R. Despite the randomness incurred from the obfuscation process for providing strong trajectory privacy protection, the experimental results show that our trajectory privacy technique maintains the correctness of the query results at a competitive computational cost.
引用
收藏
页码:126 / 139
页数:14
相关论文
共 36 条
[1]  
[Anonymous], P 15 ANN ACM INT S A
[2]  
[Anonymous], 2012, P 2012 ACM C COMP CO, DOI DOI 10.1145/2382196.2382261
[3]  
Chow C.-Y., 2011, ACM SIGKDD Explor. Newsl., V13, P19
[4]  
Chow CY, 2007, LECT NOTES COMPUT SC, V4605, P258
[5]  
Chow Chi-Yin., 2006, P 14 ANN ACM INT S A, P171, DOI DOI 10.1145/1183471.1183500
[6]  
Chow R., 2009, P 8 ACM WORKSH PRIV, P105, DOI DOI 10.1145/1655188.1655204
[7]  
Dahl M, 2010, LECT NOTES COMPUT SC, V6345, P55, DOI 10.1007/978-3-642-15497-3_4
[8]  
Freudiger J., 2007, P 1 INT WORKSH WIN I
[9]   Protecting location privacy with personalized k-anonymity:: Architecture and algorithms [J].
Gedik, Bugra ;
Liu, Ling .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2008, 7 (01) :1-18
[10]  
Ghinita G., 2008, P ACM SIGMOD INT C M, P121, DOI DOI 10.1145/1376616.1376631