A survey of privacy-preserving techniques on trajectory data

Songyuan Li, Hong Shen, Yingpeng Sang

Research output: Contribution to journalConference articlepeer-review

2 Citations (Scopus)


How to protect user’s trajectory privacy while ensuing the user’s access to high quality services is the core of the study of trajectory privacy protection technology. With the rapid development of mobile devices and Location Based Service (LBS), the amount of locations and trajectories of moving objects collected by service providers is continuously increasing. On one hand, the collected trajectories contains rich spatial-temporal information, and its analysis and mining can support a variety of innovative applications. Since trajectories enable intrusive inferences which may expose private information, such as individual habits, behavioral patterns, social relationships and so on, directly publishing trajectories may result in individual privacy vulnerable to various threats. On the other hand, the existing techniques are unable to prevent trajectory privacy leakage, so the complete real-time trajectories of individuals may be exposed when they request for LBS, even if their location privacy is protected by common data protection mechanisms. Therefore, specific techniques for trajectory privacy preserving have been proposed in accordance with different application requirements. In the trajectory data publishing scenario, privacy preserving techniques must preserve data utility. In the LBS scenario, privacy preserving techniques must guarantee high quality of services. In this survey, we overview the key challenges and main techniques of trajectory privacy protection for the above requirements respectively.

Original languageEnglish
Pages (from-to)461-476
Number of pages16
JournalCommunications in Computer and Information Science
Publication statusPublished - 2020
Externally publishedYes
Event10th International Symposium on Parallel Architectures, Algorithms and Programming, PAAP 2019 - Guangzhou, China
Duration: 12 Dec 201914 Dec 2019


  • LBS
  • Privacy protection
  • Trajectory data


Dive into the research topics of 'A survey of privacy-preserving techniques on trajectory data'. Together they form a unique fingerprint.

Cite this