Previous [ 1] [ 2] [ 3] [ 4] [ 5] [ 6] [ 7] [ 8] [ 9] [ 10] [ 11] [ 12]

@

Journal of Information Science and Engineering, Vol. 28 No. 2, pp. 335-350 (March 2012)

Dummy-Based Schemes for Protecting Movement Trajectories

PO-RUEY LEI1, WEN-CHIH PENG2, ING-JIUNN SU1 AND CHIEN-PING CHANG3
1Chung Cheng Institute of Technology
National Defense University
Taoyuan, 334 Taiwan
2Department of Computer Science
National Chiao Tung University
Hsinchu, 300 Taiwan
3Department of Computer Science and Information Engineering
Ching Yun University
Chungli, 320 Taiwan

Dummy-based anonymization techniques for protecting the location privacy of mobile users have appeared in the literature. By generating dummies that move in humanlike trajectories, this approach shows that the location privacy of mobile users can be preserved. However, the trajectories of mobile users can still be exposed by monitoring the long-term movement patterns of users. We argue that, once the trajectory of a user is identified, the locations of the user are exposed. Thus, it is critical to protect the movement trajectories of mobile users in order to preserve user location privacy. We propose two schemes that generate consistent movement patterns in the long run. Guided by three parameters in a user specified privacy profile, namely, short-term disclosure, long-term disclosure and distance deviation, the proposed schemes derive movement trajectories for dummies. The experimental results show that our proposed schemes are more effective than existing works in protecting movement trajectories.

Keywords: location privacy, user movement patterns, location-based services, trajectory pattern protection, dummy-based anonymization

Full Text () Retrieve PDF document (201203_06.pdf)

Received April 7, 2010; revised December 28, 2010; accepted February 11, 2011.
Communicated by Vincent S. Tseng.