Dummy-based schemes for protecting movement trajectories

Po Ruey Lei*, Wen-Chih Peng, Ing Jiunn Su, Chien Ping Chang

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

33 Scopus citations

Abstract

Dummy-based anonymization techniques for protecting the location privacy of mobile users have appeared in the literature. By generating dummies that move in humanlike trajectories, this approach shows that the location privacy of mobile users can be preserved. However, the trajectories of mobile users can still be exposed by monitoring the long-term movement patterns of users. We argue that, once the trajectory of a user is identified, the locations of the user are exposed. Thus, it is critical to protect the movement trajectories of mobile users in order to preserve user location privacy. We propose two schemes that generate consistent movement patterns in the long run. Guided by three parameters in a user specified privacy profile, namely, short-term disclosure, long-term disclosure and distance deviation, the proposed schemes derive movement trajectories for dummies. The experimental results show that our proposed schemes are more effective than existing works in protecting movement trajectories.

Original languageEnglish
Pages (from-to)335-350
Number of pages16
JournalJournal of Information Science and Engineering
Volume28
Issue number2
DOIs
StatePublished - 1 Mar 2012

Keywords

  • Dummy-based anonymization
  • Location privacy
  • Location-based services
  • Trajectory pattern protection
  • User movement patterns

Fingerprint Dive into the research topics of 'Dummy-based schemes for protecting movement trajectories'. Together they form a unique fingerprint.

Cite this