Trajectory Anonymization Through Generalization of Significant Location Points
DOI:
https://doi.org/10.26438/ijcse/v6si6.5862Keywords:
Anonymization, Trajectory Publication, Privacy PreservationAbstract
The widespread use of Location Based Systems results in the accumulation of movement trajectory details in a massive scale. These mobility traces are very much useful for the researchers and the developers who needs to develop or invent new mobility management applications or modify the existing ones. But without proper privacy preserving mechanism for the published trajectory details may definitely raises the issue of privacy breach for the user. So before publishing the trajectory details suitable anonymization approach has to be applied. It is also found that the protection of significant points is better than the unnecessary anonymiztion whole trajectory points. This paper proposes a new model, which depicts a model that safeguards the significant points from the malevolent attacks by the help of generalization approach. With this model, the significant location points are hided in a specified size diversified area zone. The analysis shows that this approach is well ahead of the similar approaches used by the researches and provides better privacy and less information loss.
References
[1] Poulis, G., Skiadopoulos, S., Loukides, G., Gkoulalas-Divanis, A.: Apriori-based algorithms for km-anonymizing trajectory data. Transactions on data privacy, 7:2, pp. 165-194 (2014)
[2] Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. International Journal of uncertainty, fuzziness and knowledge-based systems, 10(5), pp. 571-588, 2002.
[3] Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: l-diversity: Privacy beyond k-anonymity. TKDD, 1(1), 2007.
[4] Li, N., Li, T., Venkatasubramanian, S.: t-closeness: Privacy beyond k-anonymity and l-diversity. In ICDE, pp. 106-11, 2007.
[5] Yarovoy, R., Bonchi, F., Lakshmanan, S., Wang, W.H.: Anonymizing moving objects: How to hide a MOB in a crowd? In:12th Int. Conf. on extending database technology, pp. 72-83, ACM press, New York ,2009.
[6] Huo, Z., Meng, X., Hu, H.,Huang, Y.: You can walk alone: Trajectory privacy preserving through significant stays protection. DASFAA 2012, Part 1, LNCS 7238, pp. 351-366, Springer-Verlag Berlin Heidelberg, 2012.
[7] Zheng, Y., Zhang, L., Xie, X., Ma, W.: Mining interesting locations and travel sequences from GPS trajectories. In: 18th International conference on World Wide Web, pp.791-800, ACM press, New York , 2009
[8] Microsoft Research Geolife, http://research.microsoft.com/en-us/projects/geolife/
[9] Rajesh N, Sajimon Abraham, “Privacy preserved approach for trajectory anonymization through the zone creation for halting points”, International conference on Networls and Advances in Computational Technologies (NetACT17), IEEE explore, pp.229-234, 2017
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
