Privacy-Preserving Trajectory Data Publishing by Dynamic Anonymization with Bounded Distortion

被引:10
作者
Li, Songyuan [1 ]
Tian, Hui [2 ]
Shen, Hong [1 ]
Sang, Yingpeng [1 ]
机构
[1] Sun Yat Sen Univ, Sch Comp Sci, Guangzhou 510275, Peoples R China
[2] Griffith Univ, Sch Informat & Commun Technol, Nathan, Qld 4111, Australia
基金
国家重点研发计划;
关键词
trajectory data; data publishing; privacy-preserving; bounded distortion; attack preventing;
D O I
10.3390/ijgi10020078
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Publication of trajectory data that contain rich information of vehicles in the dimensions of time and space (location) enables online monitoring and supervision of vehicles in motion and offline traffic analysis for various management tasks. However, it also provides security holes for privacy breaches as exposing individual's privacy information to public may results in attacks threatening individual's safety. Therefore, increased attention has been made recently on the privacy protection of trajectory data publishing. However, existing methods, such as generalization via anonymization and suppression via randomization, achieve protection by modifying the original trajectory to form a publishable trajectory, which results in significant data distortion and hence a low data utility. In this work, we propose a trajectory privacy-preserving method called dynamic anonymization with bounded distortion. In our method, individual trajectories in the original trajectory set are mixed in a localized manner to form synthetic trajectory data set with a bounded distortion for publishing, which can protect the privacy of location information associated with individuals in the trajectory data set and ensure a guaranteed utility of the published data both individually and collectively. Through experiments conducted on real trajectory data of Guangzhou City Taxi statistics, we evaluate the performance of our proposed method and compare it with the existing mainstream methods in terms of privacy preservation against attacks and trajectory data utilization. The results show that our proposed method achieves better performance on data utilization than the existing methods using globally static anonymization, without trading off the data security against attacks.
引用
收藏
页数:20
相关论文
共 31 条
[1]  
Abul O, 2008, PROC INT CONF DATA, P376, DOI 10.1109/ICDE.2008.4497446
[2]   Mix zones: User privacy in location-aware services [J].
Beresford, AR ;
Stajano, F .
SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2004, :127-131
[3]   Synthesizing Plausible Privacy-Preserving Location Traces [J].
Bindschaedler, Vincent ;
Shokri, Reza .
2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2016, :546-563
[4]  
Bonchi F., 2011, ACM SIGKDD Explor. Newsl, V13, P30, DOI [DOI 10.1145/2031331.2031336, 10.1145/2031331.2031336]
[5]  
Chow R., 2009, P ACM WORKSH PRIV EL
[6]  
Dai J., 2015, P 2015 2 INT C INF S
[7]   Balancing trajectory privacy and data utility using a personalized anonymization model [J].
Gao, Sheng ;
Ma, Jianfeng ;
Sun, Cong ;
Li, Xinghua .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 38 :125-134
[8]   TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing [J].
Gao, Sheng ;
Ma, Jianfeng ;
Shi, Weisong ;
Zhan, Guoxing ;
Sun, Cong .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (06) :874-887
[9]   Differentially Private and Utility Preserving Publication of Trajectory Data [J].
Gursoy, Mehmet Emre ;
Liu, Ling ;
Truex, Stacey ;
Yu, Lei .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2019, 18 (10) :2315-2329
[10]  
Heechang Shin, 2010, Proceedings 11th International Conference on Mobile Data Management (MDM 2010), P224, DOI 10.1109/MDM.2010.29