Privacy-preserving trajectory collection
2008 (English)In: GIS: Proceedings of the ACM International Symposium on Advances in Geographic Information Systems / [ed] Walid G. Aref and Mohamed F. Mokbel and Markus Schneider, ACM Press, 2008, 387-390 p.Conference paper (Refereed)
In order to provide context–aware Location–Based Services, real location data of mobile users must be collected and analyzed by spatio–temporal data mining methods. However, the data mining methods need precise location data, while the mobile users want to protect their location privacy. To remedy this situation, this paper ﬁrst formally deﬁnes novel location privacy requirements. Then, it brieﬂy presents a system for privacy–preserving trajectory collection that meets these requirements. The system is composed of an untrusted server and clients communicating in a P2P network. Location data is anonymized in the system using data cloaking and data swapping techniques. Finally, the paper empirically demonstrates that the proposed system is effective and feasible.
Place, publisher, year, edition, pages
ACM Press, 2008. 387-390 p.
Privacy, anonymity, diversity, data swapping, data cloaking, data mining, moving object trajectories, LBS, P2P
IdentifiersURN: urn:nbn:se:kth:diva-81997DOI: 10.1145/1463434.1463491ISBN: 978-1-60558-323-5OAI: oai:DiVA.org:kth-81997DiVA: diva2:499866
16th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, ACM GIS 2008; Irvine, CA; 5 November 2008 through 7 November 2008
This work was, in large part, performed during a
period when the first author’s primary afﬁliation was with Geomatic ApS / Aalborg University, and was supported in part by the Danish Ministry of Science, Technology, and Innovation. QC 201202172012-02-132012-02-112012-02-17Bibliographically approved