Trajectory Analysis for Mobile Users with Cloaked Locations

被引:0
|
作者
Zhu, Xiaoling [1 ]
Cao, Chenglong [2 ]
机构
[1] Hefei Univ Technol, Sch Comp & Informat, Hefei 230009, Anhui, Peoples R China
[2] Anhui Finance & Trade Vocat Coll, Hefei 230601, Anhui, Peoples R China
关键词
location privacy; k-anonymity; trajectory analysis; privacy metric; hidden Markov model;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Location based services (LBS) bring great convenience to mobile users. But, user privacy is threatened since a LBS server knows location information of all LBS requester, and it might leak location data in order to obtain extra profits. Some cloaked location methods were presented to ensure that user location cannot be obtained, but it might be inferred indirectly. In this paper, a trajectory analysis method is proposed to infer a real trajectory from a cloaked trajectory. First, prior knowledge base for geographical situation is constructed. Then, a hidden Markov model for trajectory analysis is established and trajectory recovery problem is reduced to the optimal state sequence prediction problem. Finally, trajectory analysis is fulfilled using the dynamic programming algorithm. Experiments show that there are still privacy disclosure risks even if a user adopts location cloaking approaches. In addition, our method provides a new way to evaluate the degree of privacy protection for LBS users. And it provides a reference to evaluate of privacy risks and improve privacy level from the view of privacy analysis.
引用
收藏
页码:390 / 394
页数:5
相关论文
共 50 条
  • [31] An Analysis of College Student Users' Acceptance on Mobile Advertisement
    Lu Qi
    Zhan Xun
    [J]. PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON PUBLIC ADMINISTRATION (5TH), VOL III, 2009, : 1095 - 1099
  • [32] Performance Modeling, Analysis, and Optimization of Delayed Mobile Data Offloading for Mobile Users
    Mehmeti, Fidan
    Spyropoulos, Thrasyvoulos
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2017, 25 (01) : 550 - 564
  • [33] Coverage Analysis and Trajectory Optimization for Aerial Users With Dedicated Cellular Infrastructure
    Qin, Yujie
    Kishk, Mustafa A.
    Alouini, Mohamed-Slim
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2024, 23 (04) : 3042 - 3056
  • [34] Maintain User Locations on Google Cloud Considering Users Privacy and Energy Saving for Mobile Social Networking Applications
    Martinez, Ramon Dario Borja
    Chen, Chao-Chun
    Chuang, Kun-Ta
    [J]. 2013 IEEE 14TH INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT (MDM 2013), VOL 2, 2013, : 119 - 121
  • [35] Route Planning for Locations Based on Trajectory Segments
    Jiang, Jinsheng
    Xu, Chong
    Xu, Jian
    Xu, Ming
    Zheng, Ning
    Kong, Kaiwei
    [J]. PROCEEDINGS OF THE 2ND ACM SIGSPATIAL WORKSHOP ON SMART CITIES AND URBAN ANALYTICS (URBANGIS'16, 2016,
  • [36] A Multi-Level Attentive Context-Aware Trajectory Prediction Algorithm for Mobile Social Users
    Xin, Mingjun
    Zang, Chunjuan
    [J]. ELECTRONICS, 2023, 12 (10)
  • [37] Analysis of Trajectory Tracking Control Algorithms for Wheeled Mobile Robots
    Hassan, Najva
    Saleem, Abdul
    [J]. IEACON 2021: 2021 IEEE INDUSTRIAL ELECTRONICS AND APPLICATIONS CONFERENCE (IEACON), 2021, : 236 - 241
  • [38] Benchmarking Foot Trajectory Estimation Methods for Mobile Gait Analysis
    Hannink, Julius
    Ollenschlaeger, Malte
    Kluge, Felix
    Roth, Nils
    Klucken, Jochen
    Eskofier, Bjoern M.
    [J]. SENSORS, 2017, 17 (09)
  • [39] When mobile phones meet television ... : An FGI analysis of mobile broadcasting users in Korea
    Do, Joonho
    Kim, Daeho
    Kim, Doh Yeon
    Kim, Eun-mee
    [J]. MEDIA CULTURE & SOCIETY, 2009, 31 (04) : 669 - 679
  • [40] Recommending Locations Based on Users' Periodic Behaviors
    Xu, Bing
    Ding, Zhijun
    Chen, Hongzhong
    [J]. MOBILE INFORMATION SYSTEMS, 2017, 2017