The privacy of trajectories has aroused a wide concern. In previous works, rarely have the differences between different sensitive locations been discussed, nor the differences between different applications (eg: for advertising and for emergencies). While in fact, some sensitive locations are more important and some applications ought to be granted the access. In this paper, to meet different privacy requirements and data utility requirements, we propose a finegrained privacypreserving framework which allows the users to specify which locations are visible to some applications and invisible to others at the same time. In addition, since most sensitive locations are relevant to stay points and a significant stay in a sensitive place may last longer than the ordinary places, we also propose an efficient approach to distribute invisible location samples along the nearby popular visit sequences. Experiment results indicate that our framework performs efficiently without introducing significant performance penalties.
XIONG Sheng-Chao
,
WU Xia
,
PENG Zhi-Yong
. Finegrained privacypreserving framework while ensuring data usability in trajectory databases[J]. Journal of East China Normal University(Natural Science), 2015
, 2015(5)
: 96
-103
.
DOI: 10.3969/j.issn.1000-5641.2015.05.008
[1]PELEKIS N, GKOULALASDIVANIS A, VODAS M, et al. Privacyaware querying over sensitive trajectory data[C]Proceedings of the 20th ACM International Conference on Information and Knowledge Management. ACM, 2011: 895904.
[2]FERRAIOLO D F, SANDHU R, GAVRILA S, et al.Proposed NIST standard for rolebased access control[J]. ACM Transactions on Information and System Security (TISSEC), 2001, 4(3): 224274.
[3]BERTINO E, BONATTI P A, FERRARI E. TRBAC: A temporal rolebased access control model[J]. ACM Transactions on Information and System Security (TISSEC), 2001, 4(3): 191233.
[4]BERTINO E, CATANIA B, DAMIANI M L, et al. GEORBAC:A spatially aware RBAC [C]Proceedings of the 10th ACM Symposium on Access Control Models and Technologies. ACM, 2005: 2937.
[5]CHANDRAN S M, JOSHI J B D. LoTRBAC: A location and timebased RBAC model[M]Web Information Systems Engineering. Berlin: Springer, 2005: 361375.
[6]YOU T H, PENG W C, LEE W C. Protecting moving trajectories with dummies[C]Proceedings of the 2007 International Conference on Mobile Data Management. IEEE, 2007: 278282.
[7]TERROVITIS M, MAMOULIS N. Privacy preservation in the publication of trajectories[C]Proceedings of the 9th International Conference on Mobile Data Management. IEEE, 2008: 6572.
[8]ABUL O, BONCHI F, NANNI M. Never walk alone: Uncertainty for anonymity in moving objects databases[C]Proceedings of the IEEE 24th International Conference on Data Engineering. IEEE, 2008: 376385.
[9]KROHN M, YIP A, BRODSKY M, et al. Information flow control for standard OS abstractions[J]. ACM SIGOPS Operating Systems Review, 2007, 41(6): 321334.
[10]HUO Z, MENG X, HU H, et al. You can walk alone: Trajectory privacypreserving through significant stays protection[M]Database Systems for Advanced Applications. Berlin: Springer, 2012: 351366.
[11]XIE K, DENG K, ZHOU X. From trajectories to activities: A spatiotemporal join approach[C]Proceedings of the 2009 International Workshop on LocationBased Social Networks. ACM, 2009: 2532.