Abstract
The smart phone evolution in the past decade has accelerated the proliferation of mobile Internet and spurred a new wave of mobile applications on smart phones. In particular, GPS is becoming part of the default configuration of any smart mobile devices, rendering location information readily available. Even in the lack of exact location information when GPS is not enabled, the coarse location can still be inferred from the network-level data. The location information alone can already enable a great variety of applications to provide personalized services (context-aware recommendation, next location prediction based traffic time estimation, etc.) and to assist public service planning (e.g., traffic flow analysis, transportation management, city zone recognition, etc.). As smart phones are equipped with a variety of sensors, personal behaviors can be further learned and monitored. In addition, mobile operators can also collect a huge amount of data to monitor the technical and transactional aspects of their networks. It has been recently recognized that such data, known as mobile big data, could well be an under-exploited gold mine for almost all societal sectors.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
X. Cheng, L. Fang, X. Hong, and L. Yang, “Exploiting mobile big data: Sources, features, and applications,” IEEE Network, vol. 31, no. 1, pp. 72–79, Jan. 2017.
Y. Cao, P. Hou, D. Brown, J. Wang, and S. Chen, “Distributed analytics and edge intelligence: Pervasive health monitoring at the era of fog computing,” in Proceedings of the 2015 Workshop on Mobile Big Data, Hangzhou, China, Jun. 22–25, 2015, pp. 43–48.
R. LiKamWa, Y. Liu, N. D. Lane, and L. Zhong, “Moodscope: Building a mood sensor from smartphone usage patterns,” in Proceedings of the 11th Annual International Conference on Mobile Systems, Applications, and Services, Taipei, Taiwan, Jun. 25–28, 2013, pp. 389–402.
Q. Han, S. Liang, and H. Zhang, “Mobile cloud sensing, big data, and 5G networks make an intelligent and smart world,” IEEE Network, vol. 29, no. 2, pp. 40–45, Mar. 2015.
D. Laney, “3D data management: Controlling data volume, velocity and variety,” META Group Research Note, vol. 6, p. 70, Feb. 2001.
X. Dong and D. Srivastava, “Big data integration,” in Proceedings of the 29th IEEE International Conference on Data Engineering (ICDE), Brisbane, Australia, Apr. 8–12, 2013, pp. 1245–1248.
J. Gantz and D. Reinsel, “Extracting value from chaos,” IDC iView, no. 1142, pp. 9–10, 2011.
M. Ficek and L. Kencl, “Inter-call mobility model: a spatio-temporal refinement of call data records using a Gaussian mixture model,” in Proceedings of IEEE International Conference on Computer Communications (INFOCOM), Orlando, FL, Mar. 25–30, 2012, pp. 469–477.
A. Ladd, K. Bekris, G. Marceau, A. Rudys, D. Wallach, and L. Kavraki, “Using wireless Ethernet for localization,” in Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, Lausanne, Switzerland, Sep. 30–Oct. 4, 2002, pp. 402–408.
B. Ferris, D. Fox, and N. D. Lawrence, “WiFi-SLAM using Gaussian process latent variable models,” in Proceedings of the 20th International Joint Conference on Artificial Intelligence (IJCAI), vol. 7, Hyderabad, India, Jan. 6–12, 2007, pp. 2480–2485.
J. Huang, D. Millman, M. Quigley, D. Stavens, S. Thrun, and A. Aggarwal, “Efficient, generalized indoor WiFi GraphSLAM,” in Proceedings of IEEE International Conference on Robotics and Automation (ICRA), Shanghai, China, May 9–13, 2011, pp. 1038–1043.
M. Balakrishnan, I. Mohomed, and V. Ramasubramanian, “Where’s that phone?: geolocating IP addresses on 3G networks,” in Proceedings of the 9th ACM SIGCOMM conference on Internet Measurement Conference, Chicago, Illinois, Nov. 4–6, 2009, pp. 294–300.
A. Metwally and M. Paduano, “Estimating the number of users behind IP addresses for combating abusive traffic,” in Proceedings of the 17th ACM International Conference on Knowledge Discovery and Data Mining, San Diego, CA, Aug. 21–24, 2011, pp. 249–257.
L. T. Le, T. Eliassi-Rad, F. Provost, and L. Moores, “Hyperlocal: Inferring location of IP addresses in real-time bid requests for mobile Ads,” in Proceedings of the 6th ACM SIGSPATIAL International Workshop on Location-Based Social Networks, Orlando, FL, Nov. 5, 2013, pp. 24–33.
H. Hu and D.-L. Lee, “Semantic location modeling for location navigation in mobile environment,” in Proceeding of IEEE International Conference on Mobile Data Management (MDM), Berkeley, CA, Jan. 19–22, 2004, pp. 52–61.
B. Shaw, J. Shea, S. Sinha, and A. Hogue, “Learning to rank for spatiotemporal search,” in Proceedings of the 6th ACM International Conference on Web Search and Data Mining, Rome, Italy, Feb. 4–8, 2013, pp. 717–726.
J. Goncalves, S. Hosio, D. Ferreira, and V. Kostakos, “Game of words: Tagging places through crowdsourcing on public displays,” in Proceedings of the 2014 Conference on Designing Interactive Systems, Vancouver, Canada, Jun. 7–11, 2014, pp. 705–714.
N. Stojanovic, L. Stojanovic, Y. Xu, and B. Stajic, “Mobile CEP in real-time big data processing: Challenges and opportunities,” in Proceedings of the 8th ACM International Conference on Distributed Event-Based Systems, Mumbai, India, May 26–29, 2014, pp. 256–265.
M. Mardani, G. Mateos, and G. B. Giannakis, “Subspace learning and imputation for streaming big data matrices and tensors,” IEEE Transactions on Signal Processing, vol. 63, no. 10, pp. 2663–2677, May 2015.
A. Tajer, V. V. Veeravalli, and H. V. Poor, “Outlying sequence detection in large data sets: A data-driven approach,” IEEE Signal Processing Magazine, vol. 31, no. 5, pp. 44–56, Sep. 2014.
D. Z. Yazti and S. Krishnaswamy, “Mobile big data analytics: Research, practice, and opportunities,” in Proceedings of the 15th IEEE International Conference on Mobile Data Management (MDM), Brisbane, QLD, Jul. 14–18, 2014, pp. 1–2.
L. Sweeney, “K-anonymity: A model for protecting privacy,” International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10, no. 5, pp. 557–570, Oct. 2002.
H. Zang and J. Bolot, “Anonymization of location data does not work: A large-scale measurement study,” in Proceedings of the 17th Annual International Conference on Mobile Computing and Networking, Las Vegas, Nevada, USA, Sep. 19–23, 2011, pp. 145–156.
Y.-A. de Montjoye, C. A. Hidalgo, M. Verleysen, and V. D. Blondel, “Unique in the crowd: The privacy bounds of human mobility,” Scientific Reports, vol. 3, Mar. 2013.
M. Gramaglia, M. Fiore, A. Tarable, and A. Banchs, “Preserving mobile subscriber privacy in open datasets of spatiotemporal trajectories,” in Proceedings of IEEE International Conference on Computer Communications (INFOCOM), Atlanta, GA, USA, May 1–4, 2017, pp. 1–9.
F. M. Naini, J. Unnikrishnan, P. Thiran, and M. Vetterli, “Where you are is who you are: User identification by matching statistics,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 2, pp. 358–372, Feb. 2016.
C. Riederer, Y. Kim, A. Chaintreau, N. Korula, and S. Lattanzi, “Linking users across domains with location data: Theory and validation,” in Proceedings of the 25th International Conference on World Wide Web, Montreal, Quebec, Canada, Apr. 11–15, 2016, pp. 707–719.
A. Narayanan and V. Shmatikov, “Robust de-anonymization of large sparse datasets,” in Proceedings of IEEE Symposium on Security and Privacy, Oakland, CA, May 18–22, 2008, pp. 111–125.
Y. De Mulder, G. Danezis, L. Batina, and B. Preneel, “Identification via location-profiling in GSM networks,” in Proceedings of the 7th ACM Workshop on Privacy in the Electronic Society, Alexandria, Virginia, USA, 2008, pp. 23–32.
A. Cavoukian, “Introduction to privacy by design,” 2016. [Online]. Available: https://www.ipc.on.ca/english/Privacy/Introduction-to-PbD/
J. K. Laurila, D. Gatica-Perez, I. Aad, J. Blom, O. Bornet, T.-M.-T. Do, O. Dousse, J. Eberle, and M. Miettinen, “The mobile data challenge: Big data for mobile computing research,” in Proceedings of Nokia Workshop on Mobile Data Challenge in conjunction with International Conference on Pervasive Computing, Newcastle, UK, Jun. 18–20, 2012.
N. Kiukkonen, J. Blom, O. Dousse, D. Gatica-Perez, and J. Laurila, “Towards rich mobile phone datasets: Lausanne data collection campaign,” in Proceedings of ACM International Conference on Pervasive Services, Berlin, German, Jul. 13–16, 2010, pp. 1–7.
I. Aad and V. Niemi, “NRC data collection and the privacy by design principles,” Phone Sense, pp. 41–45, Nov. 2010.
M. Musolesi, “Big mobile data mining: Good or evil?” IEEE Internet Computing, vol. 18, no. 1, pp. 78–81, Jan. 2014.
M. L. Damiani, E. Bertino, and C. Silvestri, “The PROBE framework for the personalized cloaking of private locations,” ACM Transactions on Data Privacy, vol. 3, no. 2, pp. 123–148, Aug. 2010.
M. Damiani, C. Silvestri, and E. Bertino, “Fine-grained cloaking of sensitive positions in location-sharing applications,” IEEE Pervasive Computing, vol. 10, no. 4, pp. 64–72, Apr. 2011.
L. Fang, X. Cheng, H. Wang, and L. Yang “Mobile Demand Forecasting via Deep Graph-Sequence Spatiotemporal Modeling in Cellular Networks,” IEEE Internet of Things Journal, vol. 99, no. 99, 2018.
L. Fang, H. Wang, X. Cheng, and L. Yang “Mobile Privacy: User Identification via Ensemble Matching on Spatiotemporal Features,” IEEE Transactions on Information Forensics and Security, vol. 99, no. 99, 2018.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this chapter
Cite this chapter
Cheng, X., Fang, L., Yang, L., Cui, S. (2018). Mobile Big Data. In: Mobile Big Data. Wireless Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-96116-3_1
Download citation
DOI: https://doi.org/10.1007/978-3-319-96116-3_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-96115-6
Online ISBN: 978-3-319-96116-3
eBook Packages: Computer ScienceComputer Science (R0)