Skip to main content

Mobile Big Data

  • Chapter
  • First Online:

Part of the book series: Wireless Networks ((WN))

Abstract

The smart phone evolution in the past decade has accelerated the proliferation of mobile Internet and spurred a new wave of mobile applications on smart phones. In particular, GPS is becoming part of the default configuration of any smart mobile devices, rendering location information readily available. Even in the lack of exact location information when GPS is not enabled, the coarse location can still be inferred from the network-level data. The location information alone can already enable a great variety of applications to provide personalized services (context-aware recommendation, next location prediction based traffic time estimation, etc.) and to assist public service planning (e.g., traffic flow analysis, transportation management, city zone recognition, etc.). As smart phones are equipped with a variety of sensors, personal behaviors can be further learned and monitored. In addition, mobile operators can also collect a huge amount of data to monitor the technical and transactional aspects of their networks. It has been recently recognized that such data, known as mobile big data, could well be an under-exploited gold mine for almost all societal sectors.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. X. Cheng, L. Fang, X. Hong, and L. Yang, “Exploiting mobile big data: Sources, features, and applications,” IEEE Network, vol. 31, no. 1, pp. 72–79, Jan. 2017.

    Article  Google Scholar 

  2. Y. Cao, P. Hou, D. Brown, J. Wang, and S. Chen, “Distributed analytics and edge intelligence: Pervasive health monitoring at the era of fog computing,” in Proceedings of the 2015 Workshop on Mobile Big Data, Hangzhou, China, Jun. 22–25, 2015, pp. 43–48.

    Google Scholar 

  3. R. LiKamWa, Y. Liu, N. D. Lane, and L. Zhong, “Moodscope: Building a mood sensor from smartphone usage patterns,” in Proceedings of the 11th Annual International Conference on Mobile Systems, Applications, and Services, Taipei, Taiwan, Jun. 25–28, 2013, pp. 389–402.

    Google Scholar 

  4. Q. Han, S. Liang, and H. Zhang, “Mobile cloud sensing, big data, and 5G networks make an intelligent and smart world,” IEEE Network, vol. 29, no. 2, pp. 40–45, Mar. 2015.

    Article  Google Scholar 

  5. D. Laney, “3D data management: Controlling data volume, velocity and variety,” META Group Research Note, vol. 6, p. 70, Feb. 2001.

    Google Scholar 

  6. X. Dong and D. Srivastava, “Big data integration,” in Proceedings of the 29th IEEE International Conference on Data Engineering (ICDE), Brisbane, Australia, Apr. 8–12, 2013, pp. 1245–1248.

    Google Scholar 

  7. J. Gantz and D. Reinsel, “Extracting value from chaos,” IDC iView, no. 1142, pp. 9–10, 2011.

    Google Scholar 

  8. M. Ficek and L. Kencl, “Inter-call mobility model: a spatio-temporal refinement of call data records using a Gaussian mixture model,” in Proceedings of IEEE International Conference on Computer Communications (INFOCOM), Orlando, FL, Mar. 25–30, 2012, pp. 469–477.

    Google Scholar 

  9. A. Ladd, K. Bekris, G. Marceau, A. Rudys, D. Wallach, and L. Kavraki, “Using wireless Ethernet for localization,” in Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, Lausanne, Switzerland, Sep. 30–Oct. 4, 2002, pp. 402–408.

    Google Scholar 

  10. B. Ferris, D. Fox, and N. D. Lawrence, “WiFi-SLAM using Gaussian process latent variable models,” in Proceedings of the 20th International Joint Conference on Artificial Intelligence (IJCAI), vol. 7, Hyderabad, India, Jan. 6–12, 2007, pp. 2480–2485.

    Google Scholar 

  11. J. Huang, D. Millman, M. Quigley, D. Stavens, S. Thrun, and A. Aggarwal, “Efficient, generalized indoor WiFi GraphSLAM,” in Proceedings of IEEE International Conference on Robotics and Automation (ICRA), Shanghai, China, May 9–13, 2011, pp. 1038–1043.

    Google Scholar 

  12. M. Balakrishnan, I. Mohomed, and V. Ramasubramanian, “Where’s that phone?: geolocating IP addresses on 3G networks,” in Proceedings of the 9th ACM SIGCOMM conference on Internet Measurement Conference, Chicago, Illinois, Nov. 4–6, 2009, pp. 294–300.

    Google Scholar 

  13. A. Metwally and M. Paduano, “Estimating the number of users behind IP addresses for combating abusive traffic,” in Proceedings of the 17th ACM International Conference on Knowledge Discovery and Data Mining, San Diego, CA, Aug. 21–24, 2011, pp. 249–257.

    Google Scholar 

  14. L. T. Le, T. Eliassi-Rad, F. Provost, and L. Moores, “Hyperlocal: Inferring location of IP addresses in real-time bid requests for mobile Ads,” in Proceedings of the 6th ACM SIGSPATIAL International Workshop on Location-Based Social Networks, Orlando, FL, Nov. 5, 2013, pp. 24–33.

    Google Scholar 

  15. H. Hu and D.-L. Lee, “Semantic location modeling for location navigation in mobile environment,” in Proceeding of IEEE International Conference on Mobile Data Management (MDM), Berkeley, CA, Jan. 19–22, 2004, pp. 52–61.

    Google Scholar 

  16. B. Shaw, J. Shea, S. Sinha, and A. Hogue, “Learning to rank for spatiotemporal search,” in Proceedings of the 6th ACM International Conference on Web Search and Data Mining, Rome, Italy, Feb. 4–8, 2013, pp. 717–726.

    Google Scholar 

  17. J. Goncalves, S. Hosio, D. Ferreira, and V. Kostakos, “Game of words: Tagging places through crowdsourcing on public displays,” in Proceedings of the 2014 Conference on Designing Interactive Systems, Vancouver, Canada, Jun. 7–11, 2014, pp. 705–714.

    Google Scholar 

  18. N. Stojanovic, L. Stojanovic, Y. Xu, and B. Stajic, “Mobile CEP in real-time big data processing: Challenges and opportunities,” in Proceedings of the 8th ACM International Conference on Distributed Event-Based Systems, Mumbai, India, May 26–29, 2014, pp. 256–265.

    Google Scholar 

  19. M. Mardani, G. Mateos, and G. B. Giannakis, “Subspace learning and imputation for streaming big data matrices and tensors,” IEEE Transactions on Signal Processing, vol. 63, no. 10, pp. 2663–2677, May 2015.

    Article  MathSciNet  Google Scholar 

  20. A. Tajer, V. V. Veeravalli, and H. V. Poor, “Outlying sequence detection in large data sets: A data-driven approach,” IEEE Signal Processing Magazine, vol. 31, no. 5, pp. 44–56, Sep. 2014.

    Article  Google Scholar 

  21. D. Z. Yazti and S. Krishnaswamy, “Mobile big data analytics: Research, practice, and opportunities,” in Proceedings of the 15th IEEE International Conference on Mobile Data Management (MDM), Brisbane, QLD, Jul. 14–18, 2014, pp. 1–2.

    Google Scholar 

  22. L. Sweeney, “K-anonymity: A model for protecting privacy,” International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10, no. 5, pp. 557–570, Oct. 2002.

    Article  MathSciNet  Google Scholar 

  23. H. Zang and J. Bolot, “Anonymization of location data does not work: A large-scale measurement study,” in Proceedings of the 17th Annual International Conference on Mobile Computing and Networking, Las Vegas, Nevada, USA, Sep. 19–23, 2011, pp. 145–156.

    Google Scholar 

  24. Y.-A. de Montjoye, C. A. Hidalgo, M. Verleysen, and V. D. Blondel, “Unique in the crowd: The privacy bounds of human mobility,” Scientific Reports, vol. 3, Mar. 2013.

    Google Scholar 

  25. M. Gramaglia, M. Fiore, A. Tarable, and A. Banchs, “Preserving mobile subscriber privacy in open datasets of spatiotemporal trajectories,” in Proceedings of IEEE International Conference on Computer Communications (INFOCOM), Atlanta, GA, USA, May 1–4, 2017, pp. 1–9.

    Google Scholar 

  26. F. M. Naini, J. Unnikrishnan, P. Thiran, and M. Vetterli, “Where you are is who you are: User identification by matching statistics,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 2, pp. 358–372, Feb. 2016.

    Article  Google Scholar 

  27. C. Riederer, Y. Kim, A. Chaintreau, N. Korula, and S. Lattanzi, “Linking users across domains with location data: Theory and validation,” in Proceedings of the 25th International Conference on World Wide Web, Montreal, Quebec, Canada, Apr. 11–15, 2016, pp. 707–719.

    Google Scholar 

  28. A. Narayanan and V. Shmatikov, “Robust de-anonymization of large sparse datasets,” in Proceedings of IEEE Symposium on Security and Privacy, Oakland, CA, May 18–22, 2008, pp. 111–125.

    Google Scholar 

  29. Y. De Mulder, G. Danezis, L. Batina, and B. Preneel, “Identification via location-profiling in GSM networks,” in Proceedings of the 7th ACM Workshop on Privacy in the Electronic Society, Alexandria, Virginia, USA, 2008, pp. 23–32.

    Google Scholar 

  30. A. Cavoukian, “Introduction to privacy by design,” 2016. [Online]. Available: https://www.ipc.on.ca/english/Privacy/Introduction-to-PbD/

  31. J. K. Laurila, D. Gatica-Perez, I. Aad, J. Blom, O. Bornet, T.-M.-T. Do, O. Dousse, J. Eberle, and M. Miettinen, “The mobile data challenge: Big data for mobile computing research,” in Proceedings of Nokia Workshop on Mobile Data Challenge in conjunction with International Conference on Pervasive Computing, Newcastle, UK, Jun. 18–20, 2012.

    Google Scholar 

  32. N. Kiukkonen, J. Blom, O. Dousse, D. Gatica-Perez, and J. Laurila, “Towards rich mobile phone datasets: Lausanne data collection campaign,” in Proceedings of ACM International Conference on Pervasive Services, Berlin, German, Jul. 13–16, 2010, pp. 1–7.

    Google Scholar 

  33. I. Aad and V. Niemi, “NRC data collection and the privacy by design principles,” Phone Sense, pp. 41–45, Nov. 2010.

    Google Scholar 

  34. M. Musolesi, “Big mobile data mining: Good or evil?” IEEE Internet Computing, vol. 18, no. 1, pp. 78–81, Jan. 2014.

    Article  MathSciNet  Google Scholar 

  35. M. L. Damiani, E. Bertino, and C. Silvestri, “The PROBE framework for the personalized cloaking of private locations,” ACM Transactions on Data Privacy, vol. 3, no. 2, pp. 123–148, Aug. 2010.

    Google Scholar 

  36. M. Damiani, C. Silvestri, and E. Bertino, “Fine-grained cloaking of sensitive positions in location-sharing applications,” IEEE Pervasive Computing, vol. 10, no. 4, pp. 64–72, Apr. 2011.

    Article  Google Scholar 

  37. L. Fang, X. Cheng, H. Wang, and L. Yang “Mobile Demand Forecasting via Deep Graph-Sequence Spatiotemporal Modeling in Cellular Networks,” IEEE Internet of Things Journal, vol. 99, no. 99, 2018.

    Google Scholar 

  38. L. Fang, H. Wang, X. Cheng, and L. Yang “Mobile Privacy: User Identification via Ensemble Matching on Spatiotemporal Features,” IEEE Transactions on Information Forensics and Security, vol. 99, no. 99, 2018.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Cheng, X., Fang, L., Yang, L., Cui, S. (2018). Mobile Big Data. In: Mobile Big Data. Wireless Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-96116-3_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-96116-3_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-96115-6

  • Online ISBN: 978-3-319-96116-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics