Skip to main content

Privacy Preservation for Trajectory Data Publishing by Look-Up Table Generalization

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10837))

Abstract

With the increasing of location-aware devices, it is easy to collect the trajectory of a person which can be represented as a sequence of visited locations with regard to timestamps. For some applications such as traffic management and location-based advertising, the trajectory data may need to be published with other private information. However, revealing the private trajectory and sensitive information of user poses privacy concerns especially when an adversary has the background knowledge of target user, i.e., partial trajectory information. In general, data transformation is needed to ensure privacy preservation before data releasing. Not only the privacy has to be preserved, but also the data quality issue must be addressed, i.e., the impact on data quality after the transformation should be minimized. LKC-privacy model is a well-known model to anonymize the trajectory data that are published with the sensitive information. However, computing the optimal LKC-privacy solution on trajectory data by the brute-force (BF) algorithm with full-domain generalization technique is highly time-consuming. In this paper, we propose a look-up table brute-force (LT-BF) algorithm to preserve privacy and maintain the data quality based on LKC-privacy model in the scenarios which the generalization technique is applied to anonymize the trajectory data efficiently. Subsequently, our proposed algorithm is evaluated with experiments. The results demonstrate that our proposed algorithm is not only returns the optimal solution as the BF algorithm, but also it is highly efficient.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Mohammed, N., Fung, B.C.M., Debbabi, M.: Walking in the crowd: anonymizing trajectory data for pattern analysis. In: Proceeding of the 18th ACM Conference on Information and Knowledge Management, pp. 1441–1444 (2009)

    Google Scholar 

  2. Fung, B.C.M., Wang, K., Chen, R., Yu, P.S.: Privacy-preserving data publishing: a survey of recent developments. ACM Comput. Surv. 42, 1–53 (2010)

    Article  Google Scholar 

  3. Mohammed, N., Fung, B.C.M., Lee, C.K.: Centralized and distributed anonymization for high-dimensional healthcare data. ACM Trans. Knowl. Discov. Data 4, 1–33 (2010)

    Article  Google Scholar 

  4. Chen, R., Fung, B.C., Mohammed, N., Desai, B.C., Wang, K.: Privacy-preserving trajectory data publishing by local suppression. Inf. Sci. 231, 83–97 (2013)

    Article  Google Scholar 

  5. Ghasemzadeh, M., Fung, B.C.M., Chen, R., Awasthi, A.: Anonymizing trajectory data for passenger flow analysis. Transp. Res. Part C: Emerg. Technol. 39, 63–79 (2014)

    Article  Google Scholar 

  6. Bangkok Insurance: Data security policy. http://www.bangkokinsurance.com/service/service_privacy.php (2015)

  7. O’Halloran, M., Glavin, M.: RFID patient tagging and database system. In: International Conference on Networking, Systems, Mobile Communications and Learning Technologies, p. 162 (2006)

    Google Scholar 

  8. Robin, D., Saravanan, S., Wanlei, Z.: A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems. Ad Hoc Netw. 11, 383–396 (2013)

    Article  Google Scholar 

  9. Zhu, T., Xiong, P., Li, G.K., Zhou, W.: Correlated differential privacy: hiding information in non-IID data set. IEEE Trans. Inf. Forensics Secur. 10, 229–242 (2015)

    Article  Google Scholar 

  10. Fung, B., Al-Hussaeni, K., Cao, M.: Preserving RFID data privacy. In: 2009 IEEE International Conference on RFID, pp. 200–207 (2009)

    Google Scholar 

  11. Fung, B.C.M., Cao, M., Desai, B.C., Xu, H.: Privacy protection for RFID data. In: Proceedings of the ACM Symposium on Applied Computing, pp. 1528–1535 (2009)

    Google Scholar 

  12. Al-Hussaeni, K., Fung, B.C., Cheung, W.K.: Privacy-preserving trajectory stream publishing. Data Knowl. Eng. 94, 89–109 (2014)

    Article  Google Scholar 

  13. Harnsamut, N., Natwichai, J.: Privacy preservation for trajectory data publishing and heuristic approach. In: Barolli, L., Enokido, T., Takizawa, M. (eds.) NBiS 2017. LNDECT, vol. 7, pp. 787–797. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-65521-5_71

    Chapter  Google Scholar 

  14. Wong, R., Li, J., Fu, A., Wang, K.: (\(\alpha \), K)-anonymous data publishing. J. Intell. Inf. Syst. 33, 209–234 (2009)

    Article  Google Scholar 

  15. Mohammed, N., Fung, B.C.M., Debbabi, M.: Preserving privacy and utility in RFID data publishing. Technical report 6850 (2010)

    Google Scholar 

  16. Komishani, E.G., Abadi, M., Deldar, F.: PPTD: preserving personalized privacy in trajectory data publishing by sensitive attribute generalization and trajectory local suppression. Knowl.-Based Syst. 94, 43–59 (2016)

    Article  Google Scholar 

  17. Aggarwal, C.C.: On K-anonymity and the curse of dimensionality. In: Proceedings of the 31st International Conference on Very Large Databases, pp. 901–909 (2005)

    Google Scholar 

Download references

Acknowledgment

This work was supported by the Graduate School, Chiang Mai University, Thailand.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Juggapong Natwichai .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Harnsamut, N., Natwichai, J., Riyana, S. (2018). Privacy Preservation for Trajectory Data Publishing by Look-Up Table Generalization. In: Wang, J., Cong, G., Chen, J., Qi, J. (eds) Databases Theory and Applications. ADC 2018. Lecture Notes in Computer Science(), vol 10837. Springer, Cham. https://doi.org/10.1007/978-3-319-92013-9_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-92013-9_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-92012-2

  • Online ISBN: 978-3-319-92013-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics