Experiments and Analyses of Anonymization Mechanisms for Trajectory Data Publishing  

在线阅读下载全文

作  者:She Sun Shuai Ma Jing-He Song Wen-Hai Yue Xue-Lian Lin Tiejun Ma 孙设;马帅;宋景和;岳文海;林学练;马铁军(State Key Laboratory of Software Development Environment,School of Computer Science and Engineering Beihang University,Beijing 100191,China;Department of Decision Analytics and Risk,Southampton Business School,University of Southampton Southampton SO171BJ,U.K)

机构地区:[1]State Key Laboratory of Software Development Environment,School of Computer Science and Engineering Beihang University,Beijing 100191,China [2]Department of Decision Analytics and Risk,Southampton Business School,University of Southampton Southampton SO171BJ,U.K

出  处:《Journal of Computer Science & Technology》2022年第5期1026-1048,共23页计算机科学技术学报(英文版)

基  金:This work was partially supported by the National Natural Science Foundation of China under Grant Nos.61925203 and 62172024;Beijing Advanced Innovation Center for Future Blockchain and Privacy Computing。

摘  要:With the advancing of location-detection technologies and the increasing popularity of mobile phones and other location-aware devices,trajectory data is continuously growing.While large-scale trajectories provide opportunities for various applications,the locations in trajectories pose a threat to individual privacy.Recently,there has been an interesting debate on the reidentifiability of individuals in the Science magazine.The main finding of Sánchez et al.is exactly opposite to that of De Montjoye et al.,which raises the first question:"what is the true situation of the privacy preservation for trajectories in terms of reidentification?''Furthermore,it is known that anonymization typically causes a decline of data utility,and anonymization mechanisms need to consider the trade-off between privacy and utility.This raises the second question:"what is the true situation of the utility of anonymized trajectories?''To answer these two questions,we conduct a systematic experimental study,using three real-life trajectory datasets,five existing anonymization mechanisms(i.e.,identifier anonymization,grid-based anonymization,dummy trajectories,k-anonymity andε-differential privacy),and two practical applications(i.e.,travel time estimation and window range queries).Our findings reveal the true situation of the privacy preservation for trajectories in terms of reidentification and the true situation of the utility of anonymized trajectories,and essentially close the debate between De Montjoye et al.and Sánchez et al.To the best of our knowledge,this study is among the first systematic evaluation and analysis of anonymized trajectories on the individual privacy in terms of unicity and on the utility in terms of practical applications.

关 键 词:ANONYMIZATION PRIVACY reidentification TRAJECTORY UTILITY 

分 类 号:TP31[自动化与计算机技术—计算机软件与理论]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象