Ensuring location diversity in privacy-preserving spatio-temporal data publishing

被引:46
作者
Cicek, A. Ercument [1 ]
Nergiz, Mehmet Ercan [2 ]
Saygin, Yucel [3 ]
机构
[1] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
[2] Zirve Univ, Gaziantep, Turkey
[3] Sabanci Univ Tuzla, TR-34956 Istanbul, Turkey
关键词
Privacy; Spatial data; Anonymization; PROTECTING PRIVACY;
D O I
10.1007/s00778-013-0342-x
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The rise of mobile technologies in the last decade has led to vast amounts of location information generated by individuals. From the knowledge discovery point of view, these data are quite valuable, but the inherent personal information in the data raises privacy concerns. There exists many algorithms in the literature to satisfy the privacy requirements of individuals, by generalizing, perturbing, and suppressing their data. Current techniques that try to ensure a level of indistinguishability between trajectories in a dataset are direct applications of -anonymity, thus suffer from the shortcomings of -anonymity such as the lack of diversity in sensitive regions. Moreover, these techniques fail to incorporate some common background knowledge, an adversary might have such as the underlying map, the traffic density, and the anonymization algorithm itself. We propose a new privacy metric -confidentiality that ensures location diversity by bounding the probability of a user visiting a sensitive location with the input parameter. We perform our probabilistic analysis based on the background knowledge of the adversary. Instead of grouping the trajectories, we anonymize the underlying map, that is, we group nodes (points of interest) to create obfuscation areas around sensitive locations. The groups are formed in such a way that the parts of trajectories entering the groups, coupled with the adversary background, do not increase the adversary's belief in violating the -confidentiality. We then use the map anonymization as a model to anonymize the trajectories. We prove that our algorithm is resistant to reverse-engineering attacks when the statistics required for map anonymization is publicly available. We empirically evaluate the performance of our algorithm and show that location diversity can be satisfied effectively.
引用
收藏
页码:609 / 625
页数:17
相关论文
共 56 条
[1]  
Alvares L. O., 2007, Proceedings of the 15th annual ACM international symposium on Advances in geographic information systems, DOI [DOI 10.1145/1341041, DOI 10.1145/1341012.1341041]
[2]  
[Anonymous], 2006, 22 INT C DAT ENG WOR, DOI DOI 10.1109/ICDEW.2006.116
[3]  
[Anonymous], VLDB PHD WORKSH
[4]  
[Anonymous], 2005, P 2005 ACM SIGMOD IN
[5]  
[Anonymous], 2003, P 1 INT C MOB SYST A
[6]  
Assam R, 2012, PROCEEDINGS OF THE ACM SIGSPATIAL INTERNATIONAL WORKSHOP ON GEOSTREAMING (IWGS) 2012, P68
[7]  
Baglioni M, 2008, LECT NOTES COMPUT SC, V5232, P344, DOI 10.1007/978-3-540-87991-6_41
[8]  
Bayardo RJ, 2005, PROC INT CONF DATA, P217
[9]   Location privacy in pervasive computing [J].
Beresford, AR ;
Stajano, F .
IEEE PERVASIVE COMPUTING, 2003, 2 (01) :46-55
[10]  
Bettini C, 2005, LECT NOTES COMPUT SC, V3674, P185