Abstract
This paper introduces a privacy model for location based services that utilizes collected movement data to identify parts of the user trajectories, where user privacy is at an elevated risk. To protect the privacy of the user, the proposed methodology transforms the original requests into anonymous counterparts by offering trajectory K–anonymity. As a proof of concept, we build a working prototype that implements our solution approach and is used for experimentation and evaluation purposes. Our implementation relies on a spatial DBMS that carries out part of the necessary analysis. Through experiments we demonstrate the effectiveness of our approach to preserve the K–anonymity of the users for as long as the requested services are in progress.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Gidófalvi, G., Pedersen, T.B.: Mining long, sharable patterns in trajectories of moving objects. In: Third Workshop on Spatio-Temporal Database Management (2006)
Agrawal, R., Srikant, R.: Fast algorithms for mining association rules in large databases. In: 20th International Conference on Very Large Databases, pp. 487–499 (1994)
Jensen, C.S., Lahrmann, H., Pakalnis, S., Runge, J.: The INFATI data. Time Center TR-79 (2004), http://www.cs.aau.dk/TimeCenter
Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: First International Conference on Mobile Systems, Applications, and Services, pp. 31–42 (2003)
Gedik, B., Liu, L.: A customizable K-anonymity model for protecting location privacy. Technical report, Georgia Institute of Technology (April 2004)
Bettini, C., Wang, X.S., Jajodia, S.: Protecting privacy against location-based personal identification. In: Second VLDB Workshop on Secure Data Management, pp. 185–199 (2005)
Mokbel, M.F., Chow, C.Y., Aref, W.G.: The new casper: query processing for location services without compromising privacy. In: 32nd International Conference on Very Large Data Bases, pp. 763–774 (2006)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Gkoulalas-Divanis, A., Verykios, V.S. (2008). A Free Terrain Model for Trajectory K–Anonymity. In: Bhowmick, S.S., Küng, J., Wagner, R. (eds) Database and Expert Systems Applications. DEXA 2008. Lecture Notes in Computer Science, vol 5181. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-85654-2_6
Download citation
DOI: https://doi.org/10.1007/978-3-540-85654-2_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-85653-5
Online ISBN: 978-3-540-85654-2
eBook Packages: Computer ScienceComputer Science (R0)