Skip to main content

Region of Interest Discovery in Location-Based Social Networking Services with Protected Locations

  • Conference paper
Intelligence and Security Informatics (PAISI 2013)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8039))

Included in the following conference series:

Abstract

Region of Interest (ROI) discovery is one of the most common interests in Location-based social networking services (LBSNS). While former researches mainly utilize the accurate location history, this paper explores the methods to extract those regions with protected locations. A spatial-temporal cloaking check-in model following k-anonymity principle is introduced. And methods to extract two kinds of ROIs, popular regions and personal regions, are proposed respectively. Experimental results illustrate that by analyzing the characteristics of those protected locations, ROIs are able to be discovered as well. Furthermore, our work shows that privacy protection and personalized services can be both achieved in LBSNS.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Karki, B.R., Hamalainen, A., Porras, J.: Social networking on mobile environment. In: Proc. ACM/IFIP/USENIX Middleware Conf. Companion, pp. 93–94 (2008)

    Google Scholar 

  2. Gu, J.Z., He, L., Yang, J., Lu, Z.: Location aware mobile cooperation design and system. Int’l Journal of Signal Processing, Image Processing and Pattern Recognition 2(4), 49–60 (2009)

    Google Scholar 

  3. Kayastha, N., Niyato, D., Wang, P., Hossain, E.: Applications, Architectures, and Protocol Design Issues for Mobile Social Networks: A Survey. Proc. of the IEEE 99(12) (December 2011)

    Google Scholar 

  4. Zhou, C., Frankowski, D., Ludford, P., Shekhar, S., Terveen, L.: Discovering personally meaningful places: An interactive clustering approach. ACM Trans. Inf. Syst. 25, 12 (2007)

    Article  Google Scholar 

  5. Ashbrook, D., Starner, T.: Learning significant locations and predicting user movement with GPS. In: Proc. IEEE Sixth International Symposium on Wearable Computing (2002)

    Google Scholar 

  6. Cranshaw, J., Toch, E., Hong, J., Kittur, A., Sadeh, N.: Bridging the Gap Between Physical Location and Online Social Networks. In: 12th International Conference on Ubiquitous Computing, Ubicomp 2010 (2010)

    Google Scholar 

  7. Zheng, Y., Zhang, L., Ma, Z., Xie, X., Ma, W.Y.: Recommending friends and locations based on individual location history. ACM Transaction on the Web (2011)

    Google Scholar 

  8. Hightower, J., Consolvo, S., LaMarca, A., Smith, I., Hughes, J.: Learning and Recognizing the Places We Go. In: Beigl, M., Intille, S.S., Rekimoto, J., Tokuda, H. (eds.) UbiComp 2005. LNCS, vol. 3660, pp. 159–176. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  9. Mokbel, M.F.: Privacy in location-based services: start-of-the-art and research directions. In: 8th International Conference on Mobile Data Management (MDM 2007), Mannheim, Germany (May 2007)

    Google Scholar 

  10. Crespo, A., Mndez, R., Liesebach, K.: Climbing towards trust and privacy management in social mobile communities. In: Proc. W3C Workshop Future Social Netw. (January 2009)

    Google Scholar 

  11. Beach, A., Gartrell, M., Han, R.: Solutions to security and privacy issues in mobile social networking. In: IEEE Int. Conf. Comput. Sci. Eng., pp. 1036–1042 (August 2009)

    Google Scholar 

  12. Sweeney, L.: K-anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems 10(5), 557–570 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  13. Gedik, B., Liu, L.: Protecting location privacy with personalized k-anonymity: Architecture and algorithms. IEEE Trans. on Mobile Computing 7(1), 1–18 (2008)

    Article  Google Scholar 

  14. Schönfelder, S.: Between routines and variety seeking: The characteristics of locational choice in daily travel. In: 10th Intl. Conf. on Travel Behaviour, Lucerne (August 2003)

    Google Scholar 

  15. Cho, E., Myers, S.A., Leskovec, J.: Friendship and mobility: User movement in location-based social networks. In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD) (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Tan, R., Gu, J., Chen, P., Zhong, Z. (2013). Region of Interest Discovery in Location-Based Social Networking Services with Protected Locations. In: Wang, G.A., Zheng, X., Chau, M., Chen, H. (eds) Intelligence and Security Informatics. PAISI 2013. Lecture Notes in Computer Science, vol 8039. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39693-9_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-39693-9_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-39692-2

  • Online ISBN: 978-3-642-39693-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics