The current methods of locationbased privacy preserving focus on protecting the location of users, but do not consider transportation modes such as BUS, WALK and CAR. Being one key attribute of moving objects, transportation mode reflects the feature of mobile users and can be used to analyze their behavior. This paper proposes a method including cloaking location and reset modes to preserve transportation modes of moving objects for range queries. Such a technique prevents modes from being disclosed and avoids returning precise data to illegal users. We analyze the two methods and introduce how to integrate the solution into the existing system. In addition, cloaking location and reset modes with different preserving granularity is proposed to have a flexible and tunable method for different applications.
XU Jian-Qiu
,
HUANG Huo-Rong
. Privacy preserving for moving objects with transportation modes[J]. Journal of East China Normal University(Natural Science), 2015
, 2015(5)
: 77
-87
.
DOI: 10.3969/j.issn.1000-5641.2015.05.006
[1]〖ZK(#〗ZHENG Y, LIU L, WANG L, et al. Learning transportation mode from raw GPS data for geographic applications on the web[C]Proceedings of the 17th International Conference on World Wide Web. New York: ACM, 2008: 247256.
[2]ZHENG Y, CHEN Y, XIE X, et al. Understanding transportation modes based on GPS data for Web applications [J]. ACM Transactions on the Web, 2010, 4(1): 495507.
[3]REDDY S, MUN M, BURKE J, et al. Using mobile phones to determine transportation modes[J]. ACM Transactions on Sensor Networks (TOSN), 2010, 6(2): article 13.
[4]STENNETH L, WOLFSON O, YU P S, et al. Transportation mode detection using mobile phones and GIS information [C]Proceedings of the 19th ACM SIGSPATIAC International Conference on Advances in Geographic Information Systems. New York: ACM, 2011: 5463.
[5]BETTINI C, WANG X S, JAJODIA S. Protecting privacy against locationbased personal identification[C]2nd VLDB Workshop Secure Data Management. Berlin: SpringerVerlag, 2005: 185199.
[6]薛娇,刘向宇,杨晓春,等. 一种面向公路网络的位置隐私保护方法[J].计算机学报,2011,34(5): 865878.
[7]霍峥,孟小峰.轨迹隐私保护技术研究[J].计算机学报;2011,34(10):18201930.
[8]田秀霞,王晓玲,高明,等.数据库服务—安全与隐私保护[J].软件学报,2010,21(5):9911006.
[9]CICEK A E, NERGIZ M E, SAYGIN Y. Ensuring location diversity in privacypreserving spatiotemporal data publishing[J]. the VLDB J, 2014, 23(4): 609625.
[10]XU J, GTING R H. A generic data model for moving objects[J]. Geoinformatica, 2013, 17(1): 125172.
[11]XU J, GTING R H, QIN X. et al. Benchmarking generic moving objects [J]. Geoinformatica, 2015, 19(2): 227276.
[12]LIU L. From data privacy to location privacy: Models and algorithms[C]Proceedings of the 33rd International Conference on Very Large Data Bases. Seoul: VLDB Endowment.2007: 14291430.
[13]MOKBEL M F, CHOW C Y, AREF W G. The new casper: Query processing for location services without compromising privacy[C]Proceeding of the 32nd International Conference on Very Large Data Bases. Seoul: VLDB Endowment, 2006: 763774.
[14]SAMARATI P. Protecting respondent’s privacy in microdata release[J]. IEEE Trans. on Knowl. and Data Eng, 2011, 13(6): 10101027.
[15]GHINITA G, DAMIANI M L, BERTINO E, et al. Interactive location cloaking with the PROBE obfuscator[C]Mobile Data Management: System, Services and Middleware. Tenth International Conference on IEEE. [s. l.]: IEEE, 2009: 355356.
[16]GKOULALASDIVANIS A, VERYKIOS V S. A Free Terrain Model for Trajectory KAnonymity[M]Database and Expert Systems Applications. New York: Springer, 2008: 4956.
[17]GRUTESER M, GRUNWALD D. Anonymous usage of locationbased services through spatial and temporalcloaking [C]Proceedings of the 1st International Conference on Mobile Systems, Applications and Services. New York: ACM, 2003: 3142.
[18]KHOSHGOZARAN A, SHAHABI C, MEHR H S. Location privacy: Going beyond kanonymity, cloaking and anonymizers[J]. Knowl. and Inf. Syst, 2011, 26(3): 43546.
[19]GONG Z Q, SUN G Z, XIE X. Protecting privacy in locationbased services using kanonymity without cloaked region[C]11th International Conference on Mobile Data Management. USA: DBLP, 2010: 366371.
[20]YUNG D, LO E, YIU M L. Authentication of moving range queries[C]Proceedings of the 21st ACM International Conference on Information and Knowledge Management. New York: ACM, 2012: 13721381.
[21]XU J L, CHEN Q, HU H B. VERDICT: Privacypreserving authentication of range queries in locationbased services[C]Proceedings of the 2013 IEEE International Conference on Data Engineering. Washington, DC: IEEE, 2013: 13121315.
[22]HU H B, XU J L, CHEN Q, et al. Authenticating locationbased services without compromising location privacy [C] Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data. New York: ACM, 2012: 301312.
[23]YAO B, LI F F, XIAO X K. Secure nearest neighbor revisited[M]29th International Conference on Data Engineering (ICDE).[s. l.]: IEEE, 2013: 733744.
[24]YI X, PAULET R, BERTINO E, et al. Practical k nearest neighbor queries with location privacy[M]30th International Conference on Data Engineering (ICDE)[s. l.]: IEEE, 2014: 640651.
[25]SHAO D X, JIANG K F, KISTER T, et al. Publishing trajectory with differential privacy: A priori vs. A posteriori sampling mechanisms[M]Database and Expert Systems Applications. New York: Springer, 2013: 357365.
[26]PELEKIS N, DIVANIS A G, VODAS M, et al. Privacyaware querying over sensitive trajectory data[C]Proceedings of the 20th ACM International Conference on Information and Knowledge Management. New York: ACM, 2011: 895904.