Dummy-Based Schemes for Protecting Movement Trajectories

نویسندگان

  • Po-Ruey Lei
  • Wen-Chih Peng
  • Ing-Jiunn Su
  • Chien-Ping Chang
چکیده

Dummy-based anonymization techniques for protecting the location privacy of mobile users have appeared in the literature. By generating dummies that move in humanlike trajectories, this approach shows that the location privacy of mobile users can be preserved. However, the trajectories of mobile users can still be exposed by monitoring the long-term movement patterns of users. We argue that, once the trajectory of a user is identified, the locations of the user are exposed. Thus, it is critical to protect the movement trajectories of mobile users in order to preserve user location privacy. We propose two schemes that generate consistent movement patterns in the long run. Guided by three parameters in a user specified privacy profile, namely, short-term disclosure, long-term disclosure and distance deviation, the proposed schemes derive movement trajectories for dummies. The experimental results show that our proposed schemes are more effective than existing works in protecting movement trajectories.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Measuring the Similarity of Trajectories Using Fuzzy Theory

In recent years, with the advancement of positioning systems, access to a large amount of movement data is provided. Among the methods of discovering knowledge from this type of data is to measure the similarity of trajectories resulting from the movement of objects. Similarity measurement has also been used in other data mining methods such as classification and clustering and is currently, an...

متن کامل

Security Analysis of a Hash-Based Secret Sharing Scheme

Secret sharing schemes perform an important role in protecting se-cret by sharing it among multiple participants. In 1979, (t; n) threshold secret sharing schemes were proposed by Shamir and Blakley independently. In a (t; n) threshold secret sharing scheme a secret can be shared among n partic-ipants such that t or more participants can reconstruct the secret, but it can not be reconstructed b...

متن کامل

Biomechanical Investigation of Empirical Optimal Trajectories Introduced for Snatch Weightlifting

The optimal barbell trajectory for snatch weightlifting has been achieved empirically by several researchers. They have studied the differences between the elite weightlifters’ movement patterns and suggested three optimal barbell trajectories (type A, B, and C). But they didn’t agree for introducing the best trajectory. One of the reasons is this idea that the selected criterion by researchers...

متن کامل

Receding Horizon Based Control of Disturbed Upright Balance with Consideration of Foot Tilting(RESEARCH NOTE)

In some situations, when an external disturbance occurs, humans can rock stably backward and forward by lifting the toe or the heel to keep the upright balance without stepping. Many control schemes have been proposed for standing balance control under external disturbances without stepping. But, in most of them researchers have only considered a flat foot phase. In this paper a framework is pr...

متن کامل

A Framework for Exploring the Frequent Patterns based on Activities Sequence

In recent years, the development of the use of location-based tools has made it possible to produce geometric trajectories from the user's movement paths. In this way, users' goal of traveling and related activities can be considered in addition to the geometry and route shape. the user activity trajectory represents the sequence of the visited activities and its related analysis as presented i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • J. Inf. Sci. Eng.

دوره 28  شماره 

صفحات  -

تاریخ انتشار 2012