A survey of privacy-preserving techniques on trajectory data

Songyuan Li, Hong Shen, Yingpeng Sang

研究成果: Conference article同行評審

2 引文 斯高帕斯(Scopus)


How to protect user’s trajectory privacy while ensuing the user’s access to high quality services is the core of the study of trajectory privacy protection technology. With the rapid development of mobile devices and Location Based Service (LBS), the amount of locations and trajectories of moving objects collected by service providers is continuously increasing. On one hand, the collected trajectories contains rich spatial-temporal information, and its analysis and mining can support a variety of innovative applications. Since trajectories enable intrusive inferences which may expose private information, such as individual habits, behavioral patterns, social relationships and so on, directly publishing trajectories may result in individual privacy vulnerable to various threats. On the other hand, the existing techniques are unable to prevent trajectory privacy leakage, so the complete real-time trajectories of individuals may be exposed when they request for LBS, even if their location privacy is protected by common data protection mechanisms. Therefore, specific techniques for trajectory privacy preserving have been proposed in accordance with different application requirements. In the trajectory data publishing scenario, privacy preserving techniques must preserve data utility. In the LBS scenario, privacy preserving techniques must guarantee high quality of services. In this survey, we overview the key challenges and main techniques of trajectory privacy protection for the above requirements respectively.

頁(從 - 到)461-476
期刊Communications in Computer and Information Science
出版狀態Published - 2020
事件10th International Symposium on Parallel Architectures, Algorithms and Programming, PAAP 2019 - Guangzhou, China
持續時間: 12 12月 201914 12月 2019


深入研究「A survey of privacy-preserving techniques on trajectory data」主題。共同形成了獨特的指紋。