Trajectory Analysis for Mobile Users with Cloaked Locations

被引:0
|
作者
Zhu, Xiaoling [1 ]
Cao, Chenglong [2 ]
机构
[1] Hefei Univ Technol, Sch Comp & Informat, Hefei 230009, Anhui, Peoples R China
[2] Anhui Finance & Trade Vocat Coll, Hefei 230601, Anhui, Peoples R China
关键词
location privacy; k-anonymity; trajectory analysis; privacy metric; hidden Markov model;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Location based services (LBS) bring great convenience to mobile users. But, user privacy is threatened since a LBS server knows location information of all LBS requester, and it might leak location data in order to obtain extra profits. Some cloaked location methods were presented to ensure that user location cannot be obtained, but it might be inferred indirectly. In this paper, a trajectory analysis method is proposed to infer a real trajectory from a cloaked trajectory. First, prior knowledge base for geographical situation is constructed. Then, a hidden Markov model for trajectory analysis is established and trajectory recovery problem is reduced to the optimal state sequence prediction problem. Finally, trajectory analysis is fulfilled using the dynamic programming algorithm. Experiments show that there are still privacy disclosure risks even if a user adopts location cloaking approaches. In addition, our method provides a new way to evaluate the degree of privacy protection for LBS users. And it provides a reference to evaluate of privacy risks and improve privacy level from the view of privacy analysis.
引用
收藏
页码:390 / 394
页数:5
相关论文
共 50 条
  • [1] Using Mobile Positioning Data to Model Locations Meaningful to Users of Mobile Phones
    Ahas, Rein
    Silm, Siiri
    Jarv, Olle
    Saluveer, Erki
    Tiru, Margus
    [J]. JOURNAL OF URBAN TECHNOLOGY, 2010, 17 (01) : 3 - 27
  • [2] Predicting Locations of Mobile Users Based on Behavior Semantic Mining
    Lung, Huei-Yu
    Chung, Chih-Heng
    Dai, Bi-Ru
    [J]. TRENDS AND APPLICATIONS IN KNOWLEDGE DISCOVERY AND DATA MINING, 2014, 8643 : 168 - 180
  • [3] Improving location management for mobile users with frequently visited locations
    Lee, C
    Ke, CH
    Chen, CC
    [J]. PERFORMANCE EVALUATION, 2001, 43 (01) : 15 - 38
  • [4] A Bidirectional Trajectory Prediction Model for Users in Mobile Networks
    Bahra, Nasrin
    Pierre, Samuel
    [J]. IEEE ACCESS, 2022, 10 : 1921 - 1935
  • [5] Spatial Task Assignment for Crowd Sensing with Cloaked Locations
    Pournajaf, Layla
    Xiong, Li
    Sunderam, Vaidy
    Goryczka, Slawomir
    [J]. 2014 IEEE 15TH INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT (MDM), VOL 1, 2014, : 73 - 82
  • [6] Predicting mobile users' behaviors and locations using dynamic Bayesian networks
    Hou, Jianrong
    Zhao, Hui
    Zhao, Xiaofeng
    Zhang, Jie
    [J]. JOURNAL OF MANAGEMENT ANALYTICS, 2016, 3 (03) : 191 - 205
  • [7] Trajectory Aware Macro-cell Planning for Mobile Users
    Mitra, Shubhadip
    Ranu, Sayan
    Kolar, Vinay
    Telang, Aditya
    Bhattacharya, Arnab
    Kokku, Ravi
    Raghavan, Sriram
    [J]. 2015 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (INFOCOM), 2015,
  • [8] A cost efficient location management technique for mobile users with frequently visited locations
    Khalil, Rashed
    Elkilani, Wail
    Ismail, Nabil
    Hadhoud, Mohie
    [J]. CNSR 2006: Communication Networks and Services Research Conference, Proceedings, 2006, : 259 - 266
  • [9] Automated Discovery of Mobile Users Locations with Improved K-means Clustering
    Bobek, Szymon
    Nalepa, Grzegorz J.
    Grodzki, Olgierd
    [J]. ARTIFICIAL INTELLIGENCE AND SOFT COMPUTING, PT II (ICAISC 2015), 2015, 9120 : 565 - 577
  • [10] Protecting Location Privacy of Users Based on Trajectory Obfuscation in Mobile Crowdsensing
    Gao, Zhigang
    Huang, Yucai
    Zheng, Leilei
    Lu, Huijuan
    Wu, Bo
    Zhang, Jianhui
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (09) : 6290 - 6299