scispace - formally typeset
Proceedings ArticleDOI

Protecting location privacy using location semantics

Reads0
Chats0
TLDR
This paper presents a novel location privacy protection technique, which protects the location semantics from an adversary and proposes algorithms for learning location semantics and achieving semantically secure cloaking.
Abstract
As the use of mobile devices increases, a location-based service (LBS) becomes increasingly popular because it provides more convenient context-aware services. However, LBS introduces problematic issues for location privacy due to the nature of the service. Location privacy protection methods based on k-anonymity and l-diversity have been proposed to provide anonymized use of LBS. However, the k-anonymity and l-diversity methods still can endanger the user's privacy because location semantic information could easily be breached while using LBS. This paper presents a novel location privacy protection technique, which protects the location semantics from an adversary. In our scheme, location semantics are first learned from location data. Then, the trusted-anonymization server performs the anonymization using the location semantic information by cloaking with semantically heterogeneous locations. Thus, the location semantic information is kept secure as the cloaking is done with semantically heterogeneous locations and the true location information is not delivered to the LBS applications. This paper proposes algorithms for learning location semantics and achieving semantically secure cloaking.

read more

Citations
More filters
Journal ArticleDOI

Dummy-Based User Location Anonymization Under Real-World Constraints

TL;DR: This paper anonymizes the user's location by generating dummies which the authors simulate to behave like real human and confirms that the method can anonymize the users' locations even against human's observation.
Journal ArticleDOI

Protecting Trajectory From Semantic Attack Considering ${k}$ -Anonymity, ${l}$ -Diversity, and ${t}$ -Closeness

TL;DR: This paper is the first to recognize the semantic attack, which is another severe privacy problem in publishing trajectory datasets, and proposes an algorithm providing strong privacy protection against both the semantic and re-identification attack while reserving high data utility.
Journal ArticleDOI

Effective privacy preserving data publishing by vectorization

TL;DR: A novel model to overcome this fundamental dilemma via a surrogate vector based on the grid environment is suggested and shows a new theoretical advancement in privacy protection and outstanding performance with respect to time complexity and data utility.
Journal ArticleDOI

Semantic management of moving objects

TL;DR: It is argued that exploiting semantic techniques in mobility data management can bring valuable benefits to many domains characterized by the mobility of users and moving objects in general, such as traffic management, urban dynamics analysis, ambient assisted living, emergency management, m-health, etc.
Journal ArticleDOI

Using location semantics to realize personalized road network location privacy protection

TL;DR: This paper first generates sensitive weight documents based on the user’s to different location semantics automatically, then obtains the best collaborative segment for k-anonymity of the user's location by using the reinforcement learning algorithm, and finally, the bidirectional k-disturbance of the users’ location and query location is performedbased on the location semantics in real road network environment.
References
More filters
Book

Data Mining: Concepts and Techniques

TL;DR: This book presents dozens of algorithms and implementation examples, all in pseudo-code and suitable for use in real-world, large-scale data mining projects, and provides a comprehensive, practical look at the concepts and techniques you need to get the most out of real business data.
Journal ArticleDOI

k -anonymity: a model for protecting privacy

TL;DR: The solution provided in this paper includes a formal protection model named k-anonymity and a set of accompanying policies for deployment and examines re-identification attacks that can be realized on releases that adhere to k- anonymity unless accompanying policies are respected.
Journal ArticleDOI

Understanding individual human mobility patterns

TL;DR: In this article, the authors study the trajectory of 100,000 anonymized mobile phone users whose position is tracked for a six-month period and find that the individual travel patterns collapse into a single spatial probability distribution, indicating that humans follow simple reproducible patterns.
Journal Article

Data Mining Concepts and Techniques

TL;DR: Data mining is the search for new, valuable, and nontrivial information in large volumes of data, a cooperative effort of humans and computers that is possible to put data-mining activities into one of two categories: Predictive data mining, which produces the model of the system described by the given data set, or Descriptive data mining which produces new, nontrivials information based on the available data set.
Journal ArticleDOI

The Earth Mover's Distance as a Metric for Image Retrieval

TL;DR: This paper investigates the properties of a metric between two distributions, the Earth Mover's Distance (EMD), for content-based image retrieval, and compares the retrieval performance of the EMD with that of other distances.
Related Papers (5)