TY - JOUR
T1 - A survey of privacy-preserving techniques on trajectory data
AU - Li, Songyuan
AU - Shen, Hong
AU - Sang, Yingpeng
N1 - Publisher Copyright:
© Springer Nature Singapore Pte Ltd. 2020.
PY - 2020
Y1 - 2020
N2 - How to protect user’s trajectory privacy while ensuing the user’s access to high quality services is the core of the study of trajectory privacy protection technology. With the rapid development of mobile devices and Location Based Service (LBS), the amount of locations and trajectories of moving objects collected by service providers is continuously increasing. On one hand, the collected trajectories contains rich spatial-temporal information, and its analysis and mining can support a variety of innovative applications. Since trajectories enable intrusive inferences which may expose private information, such as individual habits, behavioral patterns, social relationships and so on, directly publishing trajectories may result in individual privacy vulnerable to various threats. On the other hand, the existing techniques are unable to prevent trajectory privacy leakage, so the complete real-time trajectories of individuals may be exposed when they request for LBS, even if their location privacy is protected by common data protection mechanisms. Therefore, specific techniques for trajectory privacy preserving have been proposed in accordance with different application requirements. In the trajectory data publishing scenario, privacy preserving techniques must preserve data utility. In the LBS scenario, privacy preserving techniques must guarantee high quality of services. In this survey, we overview the key challenges and main techniques of trajectory privacy protection for the above requirements respectively.
AB - How to protect user’s trajectory privacy while ensuing the user’s access to high quality services is the core of the study of trajectory privacy protection technology. With the rapid development of mobile devices and Location Based Service (LBS), the amount of locations and trajectories of moving objects collected by service providers is continuously increasing. On one hand, the collected trajectories contains rich spatial-temporal information, and its analysis and mining can support a variety of innovative applications. Since trajectories enable intrusive inferences which may expose private information, such as individual habits, behavioral patterns, social relationships and so on, directly publishing trajectories may result in individual privacy vulnerable to various threats. On the other hand, the existing techniques are unable to prevent trajectory privacy leakage, so the complete real-time trajectories of individuals may be exposed when they request for LBS, even if their location privacy is protected by common data protection mechanisms. Therefore, specific techniques for trajectory privacy preserving have been proposed in accordance with different application requirements. In the trajectory data publishing scenario, privacy preserving techniques must preserve data utility. In the LBS scenario, privacy preserving techniques must guarantee high quality of services. In this survey, we overview the key challenges and main techniques of trajectory privacy protection for the above requirements respectively.
KW - LBS
KW - Privacy protection
KW - Trajectory data
UR - http://www.scopus.com/inward/record.url?scp=85111402235&partnerID=8YFLogxK
U2 - 10.1007/978-981-15-2767-8_41
DO - 10.1007/978-981-15-2767-8_41
M3 - Conference article
AN - SCOPUS:85111402235
SN - 1865-0929
VL - 1163
SP - 461
EP - 476
JO - Communications in Computer and Information Science
JF - Communications in Computer and Information Science
T2 - 10th International Symposium on Parallel Architectures, Algorithms and Programming, PAAP 2019
Y2 - 12 December 2019 through 14 December 2019
ER -