Privacy and spatial pattern preservation in masked GPS trajectory data

被引:46
|
作者
Seidl, Dara E. [1 ]
Jankowski, Piotr [1 ,2 ]
Tsou, Ming-Hsiang [1 ]
机构
[1] San Diego State Univ, Dept Geog, San Diego, CA 92182 USA
[2] Adam Mickiewicz Univ, Inst Geoecol & Geoinformat, Poznan, Poland
关键词
Privacy; GPS; masking; obfuscation; trajectory; HEALTH DATA; LOCATION PRIVACY; PROTECTION; SYSTEM;
D O I
10.1080/13658816.2015.1101767
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Personal trajectory data are increasingly collected for a variety of academic and recreational pursuits. As access to location data widens and locations are linked to other information repositories, individuals become increasingly vulnerable to identification. The quality and precision of spatially linked attributes are essential to accurate analysis; yet, there is a trade-off between privacy and geographic data resolution. Obfuscation of point data, or masking, is a solution that aims to protect privacy and maximize preservation of spatial pattern. Trajectory data, with multiple locations recorded for an entity over time, is a strong personal identifier. This study explores the balance between privacy and spatial pattern resulting from two methods of obfuscation for personal GPS data: grid masking and random perturbation. These methods are applied to travel survey GPS data in the greater metropolitan regions of Chicago and Atlanta. The rate of pattern correlation between the original and masked data sets declines as the distance thresholds for masking increase. Grid masking at the 250-m threshold preserves route anonymity better than other methods and distance thresholds tested, but preserves spatial pattern least. This study also finds via linear regression that median trip speed and road density are significant predictors of trip anonymity.
引用
收藏
页码:785 / 800
页数:16
相关论文
共 50 条
  • [1] Privacy Preservation for Trajectory Data Publishing and Heuristic Approach
    Harnsamut, Nattapon
    Natwichai, Juggapong
    ADVANCES IN NETWORK-BASED INFORMATION SYSTEMS, NBIS-2017, 2018, 7 : 787 - 797
  • [2] Trajectory privacy protection on Spatial Streaming Data with Differential Privacy
    Liu, Xiang
    Guo, Yuchun
    Chen, Yishuai
    Tan, Xiaoying
    2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2018,
  • [3] Spatial Point Pattern Analysis of Inbound Logistics Activities Based on GPS Trajectory Data
    Lv, Ao
    Sun, Baofeng
    Sun, Yu
    Yang, Chengyan
    2022 10TH INTERNATIONAL CONFERENCE ON TRAFFIC AND LOGISTIC ENGINEERING (ICTLE 2022), 2022, : 107 - 111
  • [4] A Survey on Privacy Issues and Privacy Preservation in Spatial Data Mining
    Kamakshi, P.
    2014 IEEE INTERNATIONAL CONFERENCE ON CIRCUIT, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2014), 2014, : 1759 - 1762
  • [5] On Choosing Between Privacy Preservation Mechanisms for Mobile Trajectory Data Sharing
    Singh, Rajkarn
    Theodorakopoulos, George
    Marina, Mahesh K.
    Arapinis, Myrto
    2018 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2018,
  • [6] A Cost Sharing Mechanism for Location Privacy Preservation in Big Trajectory Data
    Wu, Xiaotong
    Li, Shu
    Yang, Jun
    Dou, Wanchun
    2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017,
  • [7] Privacy Preservation for Trajectory Publication Based on Differential Privacy
    Yao, Lin
    Chen, Zhenyu
    Hu, Haibo
    Wu, Guowei
    Wu, Bin
    ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, 2022, 13 (03)
  • [8] In-Network Trajectory Privacy Preservation
    Guo, Mingming
    Jin, Xinyu
    Pissinou, Niki
    Zanlongo, Sebastian
    Carbunar, Bogdan
    Iyengar, S. S.
    ACM COMPUTING SURVEYS, 2015, 48 (02)
  • [9] An Efficient Method on Trajectory Privacy Preservation
    Zhang, Zhiqiang
    Sun, Yue
    Xie, Xiaoqin
    Pan, Haiwei
    BIG DATA COMPUTING AND COMMUNICATIONS, 2015, 9196 : 231 - 240
  • [10] A Comprehensive Validation Methodology for Trajectory Pattern Mining of GPS Data
    Cesario, Eugenio
    Comito, Carmela
    Talia, Domenico
    2016 IEEE 14TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 14TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 2ND INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/DATACOM/CYBERSC, 2016, : 819 - 826