Privacy-Preserving Trajectory Publication Against Parking Point Attacks

被引:2
作者
Sui, Peipei [1 ]
Wo, Tianyu [1 ]
Wen, Zhangle [1 ]
Li, Xianxian [2 ]
机构
[1] Beihang Univ, State Key Lab Software Dev Environm, Beijing 100191, Peoples R China
[2] Guangxi Normal Univ, Coll Comp Sci & Informat Technol, Guilin, Peoples R China
来源
2013 IEEE 10TH INTERNATIONAL CONFERENCE ON AND 10TH INTERNATIONAL CONFERENCE ON AUTONOMIC AND TRUSTED COMPUTING (UIC/ATC) UBIQUITOUS INTELLIGENCE AND COMPUTING | 2013年
关键词
GPS data; privacy protection; parking point; swap;
D O I
10.1109/UIC-ATC.2013.75
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
GPS data is becoming more and more popular due to massive usage of global positioning systems, other location-based devices and services. However, publishing original GPS data to the public or a third party for data mining and analysis could cause serious privacy issues. In this paper, we perform a study on taxi GPS data and identify a new type of attack called a parking points attack. In a parking points attack, an adversary utilizes parking habits of taxi drivers to re-identify related victims in a published taxi trajectory dataset. To against such attacks, we introduce the concept of spatial-temporal tunnel to swap sub-trajectories of taxis. Using real GPS trajectories from more than 12,000 taxis, we demonstrate that the proposed approach effectively limits parking point attacks. As a result, more than 55% of trajectories can be re-identified at a probability of 1 in original trajectory dataset, but only 8.6% of trajectories can be re-identified in our swapped trajectory dataset.
引用
收藏
页码:569 / 574
页数:6
相关论文
共 19 条
[1]  
Abul O, 2008, PROC INT CONF DATA, P376, DOI 10.1109/ICDE.2008.4497446
[2]  
Amorim A. M., 2012, P 13 ANN BRAZ S GEOI, P96
[3]  
Cao X., 2010, J P VLDB ENDOWMENT, V3, P1009
[4]   Privacy-preserving trajectory data publishing by local suppression [J].
Chen, Rui ;
Fung, Benjamin C. M. ;
Mohammed, Noman ;
Desai, Bipin C. ;
Wang, Ke .
INFORMATION SCIENCES, 2013, 231 :83-97
[5]  
Chow C.-Y., 2011, ACM SIGKDD Explor. Newsl., V13, P19
[6]  
Domingo-Ferrer J., 2010, P 3 ACM SIGSPATIAL I, P26
[7]   Protecting location privacy through path confusion [J].
Hoh, B ;
Gruteser, M .
First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Proceedings, 2005, :194-205
[8]  
Hoh B, 2006, IEEE PERVAS COMPUT, V5, P38, DOI 10.1109/MPRV.2006.69
[9]  
Hoh B, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P161
[10]  
Huo Z., 2012, INT C DAT SYST ADV A, V7238, P351