Dummy-based schemes for protecting movement trajectories

Po Ruey Lei*, Wen-Chih Peng, Ing Jiunn Su, Chien Ping Chang

*Corresponding author for this work

研究成果: Article同行評審

33 引文 斯高帕斯(Scopus)


Dummy-based anonymization techniques for protecting the location privacy of mobile users have appeared in the literature. By generating dummies that move in humanlike trajectories, this approach shows that the location privacy of mobile users can be preserved. However, the trajectories of mobile users can still be exposed by monitoring the long-term movement patterns of users. We argue that, once the trajectory of a user is identified, the locations of the user are exposed. Thus, it is critical to protect the movement trajectories of mobile users in order to preserve user location privacy. We propose two schemes that generate consistent movement patterns in the long run. Guided by three parameters in a user specified privacy profile, namely, short-term disclosure, long-term disclosure and distance deviation, the proposed schemes derive movement trajectories for dummies. The experimental results show that our proposed schemes are more effective than existing works in protecting movement trajectories.

頁(從 - 到)335-350
期刊Journal of Information Science and Engineering
出版狀態Published - 1 三月 2012

指紋 深入研究「Dummy-based schemes for protecting movement trajectories」主題。共同形成了獨特的指紋。