Abstract
From Chaps. 4 and 5, we have learnt how compressive sensing and its extended versions effectively reconstruct incomplete data set and help tackling the data quality maintenance problem in MCS. In this chapter, we will turn around and see a new topic: privacy preservation problem. The key problem of this chapter is how to preserve the privacy without impacting the accuracy of data reconstruction.
This chapter is represented with permission from ©[2015] IEEE ref. Kong, L., He, L., Liu, X.Y., Gu, Y., Wu, M.Y. and Liu, X., 2015, June. Privacy-preserving compressive sensing for crowdsensing based trajectory recovery. In IEEE 35th International Conference on Distributed Computing Systems (pp. 31–40).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
(2005) Trippermap service in flickr. http://www.flickr.com/services/apps/5121/
(2007) SUVnet data collected by Shanghai Jiao Tong University. http://wirelesslab.sjtu.edu.cn/download.html
(2009) Geolife data collected by microsoft research Asia. http://research.microsoft.com/en-us/projects/geolife/default.aspx
(2014) Facebook acquires company behind moves fitness app. http://www.theverge.com/2014/4/24/5647084/facebook-acquires-moves-fitness-app
Alagar VS (1976) The distribution of the distance between random points. J Appl Probab 13(3):558–566
Asuquo P, Cruickshank H, Morley J, Ogah CPA, Lei A, Hathal W, Bao S, Sun Z (2018) Security and privacy in location-based services for vehicular and mobile communications: an overview, challenges, and countermeasures. IEEE Internet Things J 5(6):4778–4802
Candes EJ, Plan Y (2010) Matrix completion with noise. Proc IEEE 98(6):925–936
Chow CY, Mokbel MF, Aref WG (2009) Casper*: query processing for location services without compromising privacy. Trans Database Syst (TODS) 34(4):24
Demmel JW, Higham NJ (1993) Improved error bounds for underdetermined system solvers. J Matrix Anal Appl 14(1):1–14
Ghinita G, Kalnis P, Khoshgozaran A, Shahabi C, Tan KL (2008) Private queries in location based services: anonymizers are not necessary. In: International conference on management of data (SIGMOD), ACM, pp 121–132
Ghose A, Li B, Liu S (2019) Mobile targeting using customer trajectory patterns. Manag Sci
Gong YJ, Chen E, Zhang X, Ni LM, Zhang J (2018) Antmapper: an ant colony-based map matching approach for trajectory-based applications. IEEE Trans Intell Transp Syst 19(2):390–401
Gruteser M, Grunwald D (2003) Anonymous usage of location-based services through spatial and temporal cloaking. In: International conference on mobile systems. ACM, Applications and Services (MobiSys), pp 31–42
Hegde C, Indyk P, Schmidt L (2014) Approximation-tolerant model-based compressive sensing. In: Proceedings of the twenty-fifth annual ACM-SIAM symposium on Discrete algorithms, Society for Industrial and Applied Mathematics, pp 1544–1561
Hoh B, Gruteser M (2005) Protecting location privacy through path confusion. In: Security and privacy for emerging areas in communications networks, IEEE, pp 194–205
Kido H, Yanagisawa Y, Satoh T (2005) An anonymous communication technique using dummies for location-based services. In: International conference on pervasive services (ICPS), IEEE, pp 88–97
Li XY, Jung T (2013) Search me if you can: privacy-preserving location query service. In: International conference on computer communications (INFOCOM), IEEE, pp 2760–2768
Liu J, Priyantha B, Hart T, Ramos HS, Loureiro AA, Wang Q (2012) Energy efficient gps sensing with cloud offloading. In: Conference on embedded network sensor systems (SenSys), ACM, pp 85–98
Liu S, Wang S, Jayarajah K, Misra A, Krishnan R (2013) Todmis: mining communities from trajectories. In: International conference on information & knowledge management (CIKM), ACM, pp 2109–2118
Ma CY, Yau DK, Yip NK, Rao NS (2013) Privacy vulnerability of published anonymous mobility traces. Trans Netw (TON) 21(3):720–733
Newson P, Krumm J (2009) Hidden markov map matching through noise and sparseness. In: International conference on advances in geographic information systems (SIGSPATIAL), ACM, pp 336–343
Quercia D, Leontiadis I, McNamara L, Mascolo C, Crowcroft J (2011) Spotme if you can: randomized responses for location obfuscation on mobile phones. In: International conference on distributed computing systems (ICDCS), IEEE, pp 363–372
Rallapalli S, Qiu L, Zhang Y, Chen YC (2010) Exploiting temporal stability and low-rank structure for localization in mobile networks. In: International conference on mobile computing and networking (MOBICOM), ACM, pp 161–172
Rosales R, Sclaroff S (1999) 3d trajectory recovery for tracking multiple objects and trajectory guided recognition of actions. In: Conference on computer vision and pattern recognition, IEEE, vol 2, pp 117–123
Scaglia G, Rosales A, Quintero L, Mut V, Agarwal R (2010) A linear-interpolation-based controller design for trajectory tracking of mobile robots. Control Eng Pract 18(3):318–329
Singh I, Butkiewicz M, Madhyastha HV, Krishnamurthy SV, Addepalli S (2013) Twitsper: tweeting privately. IEEE Secur Priv 11(3):46–50
Thiagarajan A, Ravindranath L, Balakrishnan H, Madden S, Girod L (2011) Accurate, low-energy trajectory mapping for mobile devices. USENIX
Wang J, Wang Y, Zhang D, Helal S (2018) Energy saving techniques in mobile crowd sensing: Current state and future opportunities. IEEE Commun Mag 56(5):164–169
White CE, Bernstein D, Kornhauser AL (2000) Some map matching algorithms for personal navigation assistants. Transp Res Part C: Emerg Technol 8(1):91–108
Wong WK, Cheung DWl, Kao B, Mamoulis N (2009) Secure knn computation on encrypted databases. In: International conference on management of data (SIGMOD), ACM, pp 139–152
Xia M, Gong L, Lyu Y, Qi Z, Liu X (2015) Effective real-time android application auditing. In: Symposium on security and privacy (SP), IEEE, pp 899–914
Xu T, Cai Y (2009) Feeling-based location privacy protection for location-based services. In: Conference on computer and communications security (CCS), ACM, pp 348–357
Zang H, Bolot J (2011) Anonymization of location data does not work: a large-scale measurement study. In: International conference on mobile computing and networking (MOBICOM), ACM, pp 145–156
Zhu J, Kim KH, Mohapatra P, Congdon P (2013) An adaptive privacy-preserving scheme for location tracking of a mobile user. Conference on sensor. Mesh and Ad Hoc Communications and Networks (SECON), IEEE, pp 140–148
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Kong, L., Wang, B., Chen, G. (2019). Homogeneous Compressive Sensing for Privacy Preservation. In: When Compressive Sensing Meets Mobile Crowdsensing. Springer, Singapore. https://doi.org/10.1007/978-981-13-7776-1_6
Download citation
DOI: https://doi.org/10.1007/978-981-13-7776-1_6
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-7775-4
Online ISBN: 978-981-13-7776-1
eBook Packages: Computer ScienceComputer Science (R0)