Abstract
Region of Interest (ROI) discovery is one of the most common interests in Location-based social networking services (LBSNS). While former researches mainly utilize the accurate location history, this paper explores the methods to extract those regions with protected locations. A spatial-temporal cloaking check-in model following k-anonymity principle is introduced. And methods to extract two kinds of ROIs, popular regions and personal regions, are proposed respectively. Experimental results illustrate that by analyzing the characteristics of those protected locations, ROIs are able to be discovered as well. Furthermore, our work shows that privacy protection and personalized services can be both achieved in LBSNS.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Karki, B.R., Hamalainen, A., Porras, J.: Social networking on mobile environment. In: Proc. ACM/IFIP/USENIX Middleware Conf. Companion, pp. 93–94 (2008)
Gu, J.Z., He, L., Yang, J., Lu, Z.: Location aware mobile cooperation design and system. Int’l Journal of Signal Processing, Image Processing and Pattern Recognition 2(4), 49–60 (2009)
Kayastha, N., Niyato, D., Wang, P., Hossain, E.: Applications, Architectures, and Protocol Design Issues for Mobile Social Networks: A Survey. Proc. of the IEEEÂ 99(12) (December 2011)
Zhou, C., Frankowski, D., Ludford, P., Shekhar, S., Terveen, L.: Discovering personally meaningful places: An interactive clustering approach. ACM Trans. Inf. Syst. 25, 12 (2007)
Ashbrook, D., Starner, T.: Learning significant locations and predicting user movement with GPS. In: Proc. IEEE Sixth International Symposium on Wearable Computing (2002)
Cranshaw, J., Toch, E., Hong, J., Kittur, A., Sadeh, N.: Bridging the Gap Between Physical Location and Online Social Networks. In: 12th International Conference on Ubiquitous Computing, Ubicomp 2010 (2010)
Zheng, Y., Zhang, L., Ma, Z., Xie, X., Ma, W.Y.: Recommending friends and locations based on individual location history. ACM Transaction on the Web (2011)
Hightower, J., Consolvo, S., LaMarca, A., Smith, I., Hughes, J.: Learning and Recognizing the Places We Go. In: Beigl, M., Intille, S.S., Rekimoto, J., Tokuda, H. (eds.) UbiComp 2005. LNCS, vol. 3660, pp. 159–176. Springer, Heidelberg (2005)
Mokbel, M.F.: Privacy in location-based services: start-of-the-art and research directions. In: 8th International Conference on Mobile Data Management (MDM 2007), Mannheim, Germany (May 2007)
Crespo, A., Mndez, R., Liesebach, K.: Climbing towards trust and privacy management in social mobile communities. In: Proc. W3C Workshop Future Social Netw. (January 2009)
Beach, A., Gartrell, M., Han, R.: Solutions to security and privacy issues in mobile social networking. In: IEEE Int. Conf. Comput. Sci. Eng., pp. 1036–1042 (August 2009)
Sweeney, L.: K-anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems 10(5), 557–570 (2002)
Gedik, B., Liu, L.: Protecting location privacy with personalized k-anonymity: Architecture and algorithms. IEEE Trans. on Mobile Computing 7(1), 1–18 (2008)
Schönfelder, S.: Between routines and variety seeking: The characteristics of locational choice in daily travel. In: 10th Intl. Conf. on Travel Behaviour, Lucerne (August 2003)
Cho, E., Myers, S.A., Leskovec, J.: Friendship and mobility: User movement in location-based social networks. In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD) (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Tan, R., Gu, J., Chen, P., Zhong, Z. (2013). Region of Interest Discovery in Location-Based Social Networking Services with Protected Locations. In: Wang, G.A., Zheng, X., Chau, M., Chen, H. (eds) Intelligence and Security Informatics. PAISI 2013. Lecture Notes in Computer Science, vol 8039. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39693-9_2
Download citation
DOI: https://doi.org/10.1007/978-3-642-39693-9_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-39692-2
Online ISBN: 978-3-642-39693-9
eBook Packages: Computer ScienceComputer Science (R0)