TY - GEN
T1 - Protecting moving trajectories with dummies
AU - You, Tun Hao
AU - Peng, Wen Chih
AU - Lee, Wang Chien
N1 - Copyright:
Copyright 2008 Elsevier B.V., All rights reserved.
PY - 2007
Y1 - 2007
N2 - Dummy-based anonymization techniques for protecting location privacy of mobile users have been proposed in the literature. By generating dummies that move in human-like trajectories, [8] shows that location privacy of mobile users can be preserved. However, by monitoring long-term movement patterns of users, the trajectories of mobile users can still be exposed. We argue that, once the trajectory of a user is identified, locations of the user is exposed. Thus, it's critical to protect the moving trajectories of mobile users in order to preserve user location privacy. We propose two schemes that generate consistent movement patterns in a long run. Guided by three parameters in user specified privacy profile, namely, short-term disclosure, long-term disclosure and distance deviation, the proposed schemes derive movement trajectories for dummies. A preliminary performance study shows that our approach is more effective than existing work in protecting moving trajectories of mobile users and their location privacy.
AB - Dummy-based anonymization techniques for protecting location privacy of mobile users have been proposed in the literature. By generating dummies that move in human-like trajectories, [8] shows that location privacy of mobile users can be preserved. However, by monitoring long-term movement patterns of users, the trajectories of mobile users can still be exposed. We argue that, once the trajectory of a user is identified, locations of the user is exposed. Thus, it's critical to protect the moving trajectories of mobile users in order to preserve user location privacy. We propose two schemes that generate consistent movement patterns in a long run. Guided by three parameters in user specified privacy profile, namely, short-term disclosure, long-term disclosure and distance deviation, the proposed schemes derive movement trajectories for dummies. A preliminary performance study shows that our approach is more effective than existing work in protecting moving trajectories of mobile users and their location privacy.
UR - http://www.scopus.com/inward/record.url?scp=48649103506&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=48649103506&partnerID=8YFLogxK
U2 - 10.1109/MDM.2007.58
DO - 10.1109/MDM.2007.58
M3 - Conference contribution
AN - SCOPUS:48649103506
SN - 1424412404
SN - 9781424412402
T3 - Proceedings - IEEE International Conference on Mobile Data Management
SP - 278
EP - 282
BT - Proceedings - 8th International Conference on Mobile Data Management, MDM 2007
T2 - 8th International Conference on Mobile Data Management, MDM 2007
Y2 - 7 May 2007 through 11 May 2007
ER -