Abstract
The increasing availability of data due to the explosion of mobile devices and positioning technologies has led to the development of efficient management and mining techniques for mobility data. However, the analysis of such data may result in significant risks regarding individuals’ privacy. A typical approach for privacy-aware mobility data sharing aims at publishing an anonymized version of the mobility dataset, operating under the assumption that most of the information in the original dataset can be disclosed without causing any privacy violation. On the other hand, an alternative strategy considers that data stays in-house to the hosting organization and privacy-preserving mobility data management systems are in charge of privacy-aware sharing of the mobility data. In this chapter, we present the state-of-the-art of the latter approach, including systems such as HipStream, Hermes++, and Private-Hermes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Abul, O., Bonchi, F., and Nanni, M. (2008) Never walk alone: Uncertainty for anonymity in moving objects databases. In Proceedings of ICDE, pages 376–385.
Abul, O., Bonchi, F., and Nanni, M. (2010) Anonymization of moving objects databases by clustering and perturbation. Information Systems, 35(8), pages 884–910.
Adam, N.R. and Worthmann, J. C. (1989) Security-control methods for statistical databases: A comparative study. ACM Computing Surveys, 21(4), pages 515–556.
Agrawal, R., Kiernan, J., Srikant, R., & Xu, Y. (2002) Hippocratic databases. In Proceedings of VLDB Endowment, pages 143–154
Brakatsoulas, S., Pfoser, D., Salas, R. and Wenk, C. (2005) On map-matching vehicle tracking data. In Proceedings of VLDB Endowment, pages 853–864.
Douglas, D. and Peucker, T. (1973) Algorithms for the reduction of the number of points required to represent a digitized line or its caricature. Cartographica: The International Journal for Geographic Information and Geovisualization, 10(2), pages 112–122.
Giannotti, F., Nanni, M., Pedreschi, D., and Pinelli, F. (2007) Trajectory Pattern Mining. In Proceedings of SIGKDD, pages 330–339.
Gkoulalas-Divanis, A. and Verykios, V. S. (2008) A privacy–aware trajectory tracking query engine. ACM SIGKDD Explorations Newsletter, 10(1), pages 40–49.
Hoh, B. and Gruteser, M. (2005) Protecting location privacy through path confusion. In SECURECOMM, pages 194–205.
Hoh, B., Gruteser, M., Xiong, H. and Alrabady, A. (2007) Preserving privacy in GPS traces via uncertainty-aware path cloaking. In Proceedings of CCS, pages 161–171.
Kaufman, L., Rousseeuw, P. J. (1990) Finding Groups in Data: An Introduction to Cluster Analysis. Wiley, NY, Vol. 334.
Lee, J. G., Han, J., and Whang, K. Y. (2007) Trajectory clustering: a partition-and-group framework. In Proceedings of SIGMOD, pages 593–604.
LeFevre, K., DeWitt, D. and Ramakrishnan, R. (2006) Mondrian multidimensional k-anonymity. In Proceedings of ICDE, page 25.
Nanni, M. and Pedreschi, D. (2006) Time-focused clustering of trajectories of moving objects. Journal of Intelligent Information Systems, 27(3), pages 267–289.
NASA, World Wind Java SDK. URL: http://worldwind.arc.nasa.gov/java. (accessed: 6 Oct. 2011).
Nergiz, M. E., Atzori, M. and Saygin, Y. (2008) Towards trajectory anonymization: A generalization-based approach. In Proceedings of the SIGSPATIAL, pages 52–61.
Object Refinery, the JFreeChart project. URL: http://www.jfree.org/jfreechart. (accessed: 6 Oct. 2011)
Oracle, The Swing Tutorial. URL: http://download.oracle.com/javase/tutorial/uiswing. (accessed: 6 Oct. 2011).
Ortale, R., Ritacco, E., Pelekis, N., Trasarti, R., Costa, G., Giannotti, F., Manco, G., Renso, C., and Theodoridis, Y. (2008) The DAEDALUS Framework: Progressive Querying and Mining of Movement Data. In Proceedings of ACM SIGSPATIAL, page 52.
Pelekis, N., Andrienko, G., Andrienko, N., Kopanakis, I., Marketos, G., and Theodoridis, Y. (2011) Visually Exploring Movement Data via Similarity-based Analysis. Journal of Intelligent Information Systems, 38(2), pages 343–391.
Pelekis, N., Frentzos, E., Giatrakos, N., and Theodoridis, Y. (2008) Hermes: Aggregative LBS via a trajectory DB engine. In Proceedings of SIGMOD, pages 1255–1258.
Pelekis, N., Gkoulalas-Divanis, A., Vodas, M., Kopanaki, D., and Theodoridis, Y. (2011). Privacy-aware querying over sensitive trajectory data. In Proceedings of CIKM, pages 895–904.
Pelekis, N., Gkoulalas-Divanis, A., Vodas, M., Plemenos, A., Kopanaki, D., and Theodoridis, Y. (2012) Private-Hermes: A Benchmark Framework for Privacy-Preserving Mobility Data Querying and Mining Methods. In Proceedings of EDBT, pages 598–601.
Pelekis, N., Kopanakis, I., Kotsifakos, E., Frentzos, E. and Theodoridis, Y. (2011) Clustering uncertain trajectories. Knowledge and Information Systems, 28(1), pages 117–147.
Pelekis, N., Panagiotakis, C., Kopanakis, I., and Theodoridis, Y. (2010) Unsupervised trajectory sampling. In Proceedings of ECML PKDD, pages 17–33.
Pfoser, D., Jensen, C. S., and Theodoridis, Y. (2000) Novel approaches to the indexing of moving object trajectories. In Proceedings of VLDB, pages 395–406.
Samarati, P. (2001) Protecting respondents’ identities in microdata release. Transactions on Knowledge and Data Engineering, 13(6), pages 1010–1027.
Steinbach, M., Karypis, G., Kumar, V. (2000). A comparison of document clustering techniques. In Proceedings of KDD Workshop on Text Mining, 400(1), pages 525–526.
Sweeney, L. (2002) k-anonymity: A model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge Based Systems, 10(5), pages 557–570.
Terrovitis, M. and Mamoulis, N. (2008) Privacy preservation in the publication of trajectories. In Proceedings of Mobile Data Management, pages 65–72.
Wu, H., Xiang, S., Ng, W. S., Wu, W., & Xue, M. (2014) HipStream: A Privacy-Preserving System for Managing Mobility Data Streams. In Proceedings of Mobile Data Management, Vol. 1, pages 360–363.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Kopanaki, D., Pelekis, N., Theodoridis, Y. (2018). Systems for Privacy-Preserving Mobility Data Management. In: Gkoulalas-Divanis, A., Bettini, C. (eds) Handbook of Mobile Data Privacy . Springer, Cham. https://doi.org/10.1007/978-3-319-98161-1_11
Download citation
DOI: https://doi.org/10.1007/978-3-319-98161-1_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-98160-4
Online ISBN: 978-3-319-98161-1
eBook Packages: Computer ScienceComputer Science (R0)