Title
An Effective Privacy Architecture to Preserve User Trajectories in Reward-Based LBS Applications.
Abstract
How can training performance data (e.g., running or walking routes) be collected, measured, and published in a mobile program while preserving user privacy? This question is becoming important in the context of the growing use of reward-based location-based service (LBS) applications, which aim to promote employee training activities and to share such data with insurance companies in order to reduce the healthcare insurance costs of an organization. One of the main concerns of such applications is the privacy of user trajectories, because the applications normally collect user locations over time with identities. The leak of the identified trajectories often results in personal privacy breaches. For instance, a trajectory would expose user interest in places and behaviors in time by inference and linking attacks. This information can be used for spam advertisements or individual-based assaults. To the best of our knowledge, no existing studies can be directly applied to solve the problem while keeping data utility. In this paper, we identify the personal privacy problem in a reward-based LBS application and propose privacy architecture with a bounded perturbation technique to protect user's trajectory from the privacy breaches. Bounded perturbation uses global location set (GLS) to anonymize the trajectory data. In addition, the bounded perturbation will not generate any visiting points that are not possible to visit in real time. The experimental results on real-world datasets demonstrate that the proposed bounded perturbation can effectively anonymize location information while preserving data utility compared to the existing methods.
Year
DOI
Venue
2018
10.3390/ijgi7020053
ISPRS INTERNATIONAL JOURNAL OF GEO-INFORMATION
Keywords
Field
DocType
privacy architecture,identified trajectory,anonymization,data utility,location-based service
Architecture,Computer security,Inference,Computer science,Location-based service,Pound (mass),Trajectory,User privacy,Bounded function
Journal
Volume
Issue
ISSN
7
2
2220-9964
Citations 
PageRank 
References 
2
0.39
6
Authors
5
Name
Order
Citations
PageRank
A. S. M. Touhidul Hasan171.60
qiang qu28312.15
Chengming Li32512.39
Lifei Chen429226.44
Qingshan Jiang558877.27