Article

Finegrained privacypreserving framework while ensuring  data usability in trajectory databases

  • XIONG Sheng-Chao ,
  • WU Xia ,
  • PENG Zhi-Yong
Expand

Received date: 2015-07-09

  Online published: 2015-10-08

Abstract

The privacy of trajectories has aroused a wide concern. In previous works, rarely have the differences between different sensitive locations been discussed, nor the differences between different applications (eg: for advertising and for emergencies). While in fact, some sensitive locations are more important and some applications ought to be granted the access. In this paper, to meet different privacy requirements and data utility requirements, we propose a finegrained privacypreserving framework which allows the users to specify which locations are visible to some applications and invisible to others at the same time. In addition, since most sensitive locations are relevant to stay points and a significant stay in a sensitive place may last longer than the ordinary places, we also propose an efficient approach to distribute invisible location samples along the nearby popular visit sequences. Experiment results indicate that our framework performs efficiently without introducing significant performance penalties.

Cite this article

XIONG Sheng-Chao , WU Xia , PENG Zhi-Yong . Finegrained privacypreserving framework while ensuring  data usability in trajectory databases[J]. Journal of East China Normal University(Natural Science), 2015 , 2015(5) : 96 -103 . DOI: 10.3969/j.issn.1000-5641.2015.05.008

References

[1]PELEKIS N, GKOULALASDIVANIS A, VODAS M, et al. Privacyaware querying over sensitive trajectory data[C]Proceedings of the 20th ACM International Conference on Information and Knowledge Management. ACM, 2011: 895904.

[2]FERRAIOLO D F, SANDHU R, GAVRILA S, et al.Proposed NIST standard for rolebased access control[J]. ACM Transactions on Information and System Security (TISSEC), 2001, 4(3): 224274.

[3]BERTINO E, BONATTI P A, FERRARI E. TRBAC: A temporal rolebased access control model[J]. ACM Transactions on Information and System Security (TISSEC), 2001, 4(3): 191233.

[4]BERTINO E, CATANIA B, DAMIANI M L, et al. GEORBAC:A spatially aware RBAC [C]Proceedings of the  10th ACM Symposium on Access Control Models and Technologies. ACM, 2005: 2937.

[5]CHANDRAN S M, JOSHI J B D. LoTRBAC: A location and timebased RBAC model[M]Web Information Systems Engineering. Berlin: Springer, 2005: 361375.

[6]YOU T H, PENG W C, LEE W C. Protecting moving trajectories with dummies[C]Proceedings of the 2007 International Conference on Mobile Data Management. IEEE, 2007: 278282.

[7]TERROVITIS M, MAMOULIS N. Privacy preservation in the publication of trajectories[C]Proceedings of the 9th International Conference on Mobile Data Management.  IEEE, 2008: 6572.

[8]ABUL O, BONCHI F, NANNI M. Never walk alone: Uncertainty for anonymity in moving objects databases[C]Proceedings of the IEEE 24th International Conference on Data Engineering.  IEEE, 2008: 376385.

[9]KROHN M, YIP A, BRODSKY M, et al. Information flow control for standard OS abstractions[J]. ACM SIGOPS Operating Systems Review, 2007, 41(6): 321334.

[10]HUO Z, MENG X, HU H, et al. You can walk alone: Trajectory privacypreserving through significant stays protection[M]Database Systems for Advanced Applications. Berlin: Springer, 2012: 351366.

[11]XIE K, DENG K, ZHOU X. From trajectories to activities: A spatiotemporal join approach[C]Proceedings of the 2009 International Workshop on LocationBased Social Networks. ACM, 2009: 2532.
Outlines

/