Skip to main content

Homogeneous Compressive Sensing for Privacy Preservation

  • Chapter
  • First Online:
When Compressive Sensing Meets Mobile Crowdsensing
  • 311 Accesses

Abstract

From Chaps. 4 and 5, we have learnt how compressive sensing and its extended versions effectively reconstruct incomplete data set and help tackling the data quality maintenance problem in MCS. In this chapter, we will turn around and see a new topic: privacy preservation problem. The key problem of this chapter is how to preserve the privacy without impacting the accuracy of data reconstruction.

This chapter is represented with permission from ©[2015] IEEE ref. Kong, L., He, L., Liu, X.Y., Gu, Y., Wu, M.Y. and Liu, X., 2015, June. Privacy-preserving compressive sensing for crowdsensing based trajectory recovery. In IEEE 35th International Conference on Distributed Computing Systems (pp. 31–40).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. (2005) Trippermap service in flickr. http://www.flickr.com/services/apps/5121/

  2. (2007) SUVnet data collected by Shanghai Jiao Tong University. http://wirelesslab.sjtu.edu.cn/download.html

  3. (2009) Geolife data collected by microsoft research Asia. http://research.microsoft.com/en-us/projects/geolife/default.aspx

  4. (2014) Facebook acquires company behind moves fitness app. http://www.theverge.com/2014/4/24/5647084/facebook-acquires-moves-fitness-app

  5. Alagar VS (1976) The distribution of the distance between random points. J Appl Probab 13(3):558–566

    Article  MathSciNet  Google Scholar 

  6. Asuquo P, Cruickshank H, Morley J, Ogah CPA, Lei A, Hathal W, Bao S, Sun Z (2018) Security and privacy in location-based services for vehicular and mobile communications: an overview, challenges, and countermeasures. IEEE Internet Things J 5(6):4778–4802

    Article  Google Scholar 

  7. Candes EJ, Plan Y (2010) Matrix completion with noise. Proc IEEE 98(6):925–936

    Article  Google Scholar 

  8. Chow CY, Mokbel MF, Aref WG (2009) Casper*: query processing for location services without compromising privacy. Trans Database Syst (TODS) 34(4):24

    Google Scholar 

  9. Demmel JW, Higham NJ (1993) Improved error bounds for underdetermined system solvers. J Matrix Anal Appl 14(1):1–14

    Article  MathSciNet  Google Scholar 

  10. Ghinita G, Kalnis P, Khoshgozaran A, Shahabi C, Tan KL (2008) Private queries in location based services: anonymizers are not necessary. In: International conference on management of data (SIGMOD), ACM, pp 121–132

    Google Scholar 

  11. Ghose A, Li B, Liu S (2019) Mobile targeting using customer trajectory patterns. Manag Sci

    Google Scholar 

  12. Gong YJ, Chen E, Zhang X, Ni LM, Zhang J (2018) Antmapper: an ant colony-based map matching approach for trajectory-based applications. IEEE Trans Intell Transp Syst 19(2):390–401

    Article  Google Scholar 

  13. Gruteser M, Grunwald D (2003) Anonymous usage of location-based services through spatial and temporal cloaking. In: International conference on mobile systems. ACM, Applications and Services (MobiSys), pp 31–42

    Google Scholar 

  14. Hegde C, Indyk P, Schmidt L (2014) Approximation-tolerant model-based compressive sensing. In: Proceedings of the twenty-fifth annual ACM-SIAM symposium on Discrete algorithms, Society for Industrial and Applied Mathematics, pp 1544–1561

    Google Scholar 

  15. Hoh B, Gruteser M (2005) Protecting location privacy through path confusion. In: Security and privacy for emerging areas in communications networks, IEEE, pp 194–205

    Google Scholar 

  16. Kido H, Yanagisawa Y, Satoh T (2005) An anonymous communication technique using dummies for location-based services. In: International conference on pervasive services (ICPS), IEEE, pp 88–97

    Google Scholar 

  17. Li XY, Jung T (2013) Search me if you can: privacy-preserving location query service. In: International conference on computer communications (INFOCOM), IEEE, pp 2760–2768

    Google Scholar 

  18. Liu J, Priyantha B, Hart T, Ramos HS, Loureiro AA, Wang Q (2012) Energy efficient gps sensing with cloud offloading. In: Conference on embedded network sensor systems (SenSys), ACM, pp 85–98

    Google Scholar 

  19. Liu S, Wang S, Jayarajah K, Misra A, Krishnan R (2013) Todmis: mining communities from trajectories. In: International conference on information & knowledge management (CIKM), ACM, pp 2109–2118

    Google Scholar 

  20. Ma CY, Yau DK, Yip NK, Rao NS (2013) Privacy vulnerability of published anonymous mobility traces. Trans Netw (TON) 21(3):720–733

    Article  Google Scholar 

  21. Newson P, Krumm J (2009) Hidden markov map matching through noise and sparseness. In: International conference on advances in geographic information systems (SIGSPATIAL), ACM, pp 336–343

    Google Scholar 

  22. Quercia D, Leontiadis I, McNamara L, Mascolo C, Crowcroft J (2011) Spotme if you can: randomized responses for location obfuscation on mobile phones. In: International conference on distributed computing systems (ICDCS), IEEE, pp 363–372

    Google Scholar 

  23. Rallapalli S, Qiu L, Zhang Y, Chen YC (2010) Exploiting temporal stability and low-rank structure for localization in mobile networks. In: International conference on mobile computing and networking (MOBICOM), ACM, pp 161–172

    Google Scholar 

  24. Rosales R, Sclaroff S (1999) 3d trajectory recovery for tracking multiple objects and trajectory guided recognition of actions. In: Conference on computer vision and pattern recognition, IEEE, vol 2, pp 117–123

    Google Scholar 

  25. Scaglia G, Rosales A, Quintero L, Mut V, Agarwal R (2010) A linear-interpolation-based controller design for trajectory tracking of mobile robots. Control Eng Pract 18(3):318–329

    Article  Google Scholar 

  26. Singh I, Butkiewicz M, Madhyastha HV, Krishnamurthy SV, Addepalli S (2013) Twitsper: tweeting privately. IEEE Secur Priv 11(3):46–50

    Article  Google Scholar 

  27. Thiagarajan A, Ravindranath L, Balakrishnan H, Madden S, Girod L (2011) Accurate, low-energy trajectory mapping for mobile devices. USENIX

    Google Scholar 

  28. Wang J, Wang Y, Zhang D, Helal S (2018) Energy saving techniques in mobile crowd sensing: Current state and future opportunities. IEEE Commun Mag 56(5):164–169

    Article  Google Scholar 

  29. White CE, Bernstein D, Kornhauser AL (2000) Some map matching algorithms for personal navigation assistants. Transp Res Part C: Emerg Technol 8(1):91–108

    Article  Google Scholar 

  30. Wong WK, Cheung DWl, Kao B, Mamoulis N (2009) Secure knn computation on encrypted databases. In: International conference on management of data (SIGMOD), ACM, pp 139–152

    Google Scholar 

  31. Xia M, Gong L, Lyu Y, Qi Z, Liu X (2015) Effective real-time android application auditing. In: Symposium on security and privacy (SP), IEEE, pp 899–914

    Google Scholar 

  32. Xu T, Cai Y (2009) Feeling-based location privacy protection for location-based services. In: Conference on computer and communications security (CCS), ACM, pp 348–357

    Google Scholar 

  33. Zang H, Bolot J (2011) Anonymization of location data does not work: a large-scale measurement study. In: International conference on mobile computing and networking (MOBICOM), ACM, pp 145–156

    Google Scholar 

  34. Zhu J, Kim KH, Mohapatra P, Congdon P (2013) An adaptive privacy-preserving scheme for location tracking of a mobile user. Conference on sensor. Mesh and Ad Hoc Communications and Networks (SECON), IEEE, pp 140–148

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Linghe Kong .

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Kong, L., Wang, B., Chen, G. (2019). Homogeneous Compressive Sensing for Privacy Preservation. In: When Compressive Sensing Meets Mobile Crowdsensing. Springer, Singapore. https://doi.org/10.1007/978-981-13-7776-1_6

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-7776-1_6

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-7775-4

  • Online ISBN: 978-981-13-7776-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics