A Survey and Experimental Study on Privacy-Preserving Trajectory Data Publishing

被引:24
|
作者
Jin, Fengmei [1 ]
Hua, Wen [1 ]
Francia, Matteo [2 ]
Chao, Pingfu [3 ]
Orlowska, Maria E. [4 ]
Zhou, Xiaofang [5 ]
机构
[1] Univ Queensland, Brisbane, Qld 4072, Australia
[2] Univ Bologna, I-47522 Cesena, Italy
[3] Soochow Univ, Suzhou 215006, Jiangsu, Peoples R China
[4] Polish Japanese Acad Informat Technol, PL-02008 Warsaw, Poland
[5] Hong Kong Univ Sci & Technol, Kowloon, Hong Kong, Peoples R China
基金
澳大利亚研究理事会;
关键词
Trajectory; Data privacy; Privacy; Couplings; Spatiotemporal phenomena; Data models; Publishing; Trajectory data publishing; attack models; privacy protection models; privacy metrics; utility metrics; LOCATION-PRIVACY; ANONYMITY; ANONYMIZATION; UNCERTAINTY; INFORMATION; PROTECTION;
D O I
10.1109/TKDE.2022.3174204
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Trajectory data has become ubiquitous nowadays, which can benefit various real-world applications such as traffic management and location-based services. However, trajectories may disclose highly sensitive information of an individual including mobility patterns, personal profiles and gazetteers, social relationships, etc, making it indispensable to consider privacy protection when releasing trajectory data. Ensuring privacy on trajectories demands more than hiding single locations, since trajectories are intrinsically sparse and high-dimensional, and require to protect multi-scale correlations. To this end, extensive research has been conducted to design effective techniques for privacy-preserving trajectory data publishing. Furthermore, protecting privacy requires carefully balance two metrics: privacy and utility. In other words, it needs to protect as much privacy as possible and meanwhile guarantee the usefulness of the released trajectories for data analysis. In this survey, we provide a comprehensive study and a systematic summarization of existing protection models, privacy and utility metrics for trajectories developed in the literature. We also conduct extensive experiments on two real-life public trajectory datasets to evaluate the performance of several representative privacy protection models, demonstrate the trade-off between privacy and utility, and guide the choice of the right privacy model for trajectory publishing given certain privacy and utility desiderata.
引用
收藏
页码:5577 / 5596
页数:20
相关论文
共 50 条
  • [1] Personalized Privacy-Preserving Trajectory Data Publishing
    Lu Qiwei
    Wang Caimei
    Xiong Yan
    Xia Huihua
    Huang Wenchao
    Gong Xudong
    CHINESE JOURNAL OF ELECTRONICS, 2017, 26 (02) : 285 - 291
  • [2] Personalized Privacy-Preserving Trajectory Data Publishing
    LU Qiwei
    WANG Caimei
    XIONG Yan
    XIA Huihua
    HUANG Wenchao
    GONG Xudong
    Chinese Journal of Electronics, 2017, 26 (02) : 285 - 291
  • [3] Privacy-preserving trajectory data publishing by local suppression
    Chen, Rui
    Fung, Benjamin C. M.
    Mohammed, Noman
    Desai, Bipin C.
    Wang, Ke
    INFORMATION SCIENCES, 2013, 231 : 83 - 97
  • [4] STDP: Secure Privacy-Preserving Trajectory Data Publishing
    Eom, Chris Soo-Hyun
    Lee, Wookey
    Leung, Carson Kai-Sang
    IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, : 892 - 899
  • [5] Suppression techniques for privacy-preserving trajectory data publishing
    Lin, Chen-Yi
    KNOWLEDGE-BASED SYSTEMS, 2020, 206
  • [6] Privacy-preserving trajectory stream publishing
    Al-Hussaeni, Khalil
    Fung, Benjamin C. M.
    Cheung, William K.
    DATA & KNOWLEDGE ENGINEERING, 2014, 94 : 89 - 109
  • [7] Pseudonym Exchange for Privacy-Preserving Publishing of Trajectory Data Set
    Mano, Ken
    Minami, Kazuhiro
    Maruyama, Hiroshi
    2014 IEEE 3RD GLOBAL CONFERENCE ON CONSUMER ELECTRONICS (GCCE), 2014, : 691 - 695
  • [8] Privacy-Preserving Data Publishing: A Survey of Recent Developments
    Fung, Benjamin C. M.
    Wang, Ke
    Chen, Rui
    Yu, Philip S.
    ACM COMPUTING SURVEYS, 2010, 42 (04)
  • [9] Privacy-Preserving Data Publishing
    Liu, Ruilin
    Wang, Hui
    2010 IEEE 26TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING WORKSHOPS (ICDE 2010), 2010, : 305 - 308
  • [10] Privacy-Preserving Data Publishing
    Chen, Bee-Chung
    Kifer, Daniel
    LeFevre, Kristen
    Machanavajjhala, Ashwin
    FOUNDATIONS AND TRENDS IN DATABASES, 2009, 2 (1-2): : 1 - 167