Abstract
How to protect user’s trajectory privacy while ensuing the user’s access to high quality services is the core of the study of trajectory privacy protection technology. With the rapid development of mobile devices and Location Based Service (LBS), the amount of locations and trajectories of moving objects collected by service providers is continuously increasing. On one hand, the collected trajectories contains rich spatial-temporal information, and its analysis and mining can support a variety of innovative applications. Since trajectories enable intrusive inferences which may expose private information, such as individual habits, behavioral patterns, social relationships and so on, directly publishing trajectories may result in individual privacy vulnerable to various threats. On the other hand, the existing techniques are unable to prevent trajectory privacy leakage, so the complete real-time trajectories of individuals may be exposed when they request for LBS, even if their location privacy is protected by common data protection mechanisms. Therefore, specific techniques for trajectory privacy preserving have been proposed in accordance with different application requirements. In the trajectory data publishing scenario, privacy preserving techniques must preserve data utility. In the LBS scenario, privacy preserving techniques must guarantee high quality of services. In this survey, we overview the key challenges and main techniques of trajectory privacy protection for the above requirements respectively.
Original language | English |
---|---|
Pages (from-to) | 461-476 |
Number of pages | 16 |
Journal | Communications in Computer and Information Science |
Volume | 1163 |
DOIs | |
Publication status | Published - 2020 |
Externally published | Yes |
Event | 10th International Symposium on Parallel Architectures, Algorithms and Programming, PAAP 2019 - Guangzhou, China Duration: 12 Dec 2019 → 14 Dec 2019 |
Keywords
- LBS
- Privacy protection
- Trajectory data