Skip to main content

Systems for Privacy-Preserving Mobility Data Management

  • Chapter
  • First Online:
Handbook of Mobile Data Privacy

Abstract

The increasing availability of data due to the explosion of mobile devices and positioning technologies has led to the development of efficient management and mining techniques for mobility data. However, the analysis of such data may result in significant risks regarding individuals’ privacy. A typical approach for privacy-aware mobility data sharing aims at publishing an anonymized version of the mobility dataset, operating under the assumption that most of the information in the original dataset can be disclosed without causing any privacy violation. On the other hand, an alternative strategy considers that data stays in-house to the hosting organization and privacy-preserving mobility data management systems are in charge of privacy-aware sharing of the mobility data. In this chapter, we present the state-of-the-art of the latter approach, including systems such as HipStream, Hermes++, and Private-Hermes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Abul, O., Bonchi, F., and Nanni, M. (2008) Never walk alone: Uncertainty for anonymity in moving objects databases. In Proceedings of ICDE, pages 376–385.

    Google Scholar 

  2. Abul, O., Bonchi, F., and Nanni, M. (2010) Anonymization of moving objects databases by clustering and perturbation. Information Systems, 35(8), pages 884–910.

    Article  Google Scholar 

  3. Adam, N.R. and Worthmann, J. C. (1989) Security-control methods for statistical databases: A comparative study. ACM Computing Surveys, 21(4), pages 515–556.

    Article  Google Scholar 

  4. Agrawal, R., Kiernan, J., Srikant, R., & Xu, Y. (2002) Hippocratic databases. In Proceedings of VLDB Endowment, pages 143–154

    Chapter  Google Scholar 

  5. Brakatsoulas, S., Pfoser, D., Salas, R. and Wenk, C. (2005) On map-matching vehicle tracking data. In Proceedings of VLDB Endowment, pages 853–864.

    Google Scholar 

  6. Douglas, D. and Peucker, T. (1973) Algorithms for the reduction of the number of points required to represent a digitized line or its caricature. Cartographica: The International Journal for Geographic Information and Geovisualization, 10(2), pages 112–122.

    Article  Google Scholar 

  7. Giannotti, F., Nanni, M., Pedreschi, D., and Pinelli, F. (2007) Trajectory Pattern Mining. In Proceedings of SIGKDD, pages 330–339.

    Google Scholar 

  8. Gkoulalas-Divanis, A. and Verykios, V. S. (2008) A privacy–aware trajectory tracking query engine. ACM SIGKDD Explorations Newsletter, 10(1), pages 40–49.

    Article  Google Scholar 

  9. Hoh, B. and Gruteser, M. (2005) Protecting location privacy through path confusion. In SECURECOMM, pages 194–205.

    Google Scholar 

  10. Hoh, B., Gruteser, M., Xiong, H. and Alrabady, A. (2007) Preserving privacy in GPS traces via uncertainty-aware path cloaking. In Proceedings of CCS, pages 161–171.

    Google Scholar 

  11. Kaufman, L., Rousseeuw, P. J. (1990) Finding Groups in Data: An Introduction to Cluster Analysis. Wiley, NY, Vol. 334.

    Google Scholar 

  12. Lee, J. G., Han, J., and Whang, K. Y. (2007) Trajectory clustering: a partition-and-group framework. In Proceedings of SIGMOD, pages 593–604.

    Google Scholar 

  13. LeFevre, K., DeWitt, D. and Ramakrishnan, R. (2006) Mondrian multidimensional k-anonymity. In Proceedings of ICDE, page 25.

    Google Scholar 

  14. Nanni, M. and Pedreschi, D. (2006) Time-focused clustering of trajectories of moving objects. Journal of Intelligent Information Systems, 27(3), pages 267–289.

    Article  Google Scholar 

  15. NASA, World Wind Java SDK. URL: http://worldwind.arc.nasa.gov/java. (accessed: 6 Oct. 2011).

  16. Nergiz, M. E., Atzori, M. and Saygin, Y. (2008) Towards trajectory anonymization: A generalization-based approach. In Proceedings of the SIGSPATIAL, pages 52–61.

    Google Scholar 

  17. Object Refinery, the JFreeChart project. URL: http://www.jfree.org/jfreechart. (accessed: 6 Oct. 2011)

  18. Oracle, The Swing Tutorial. URL: http://download.oracle.com/javase/tutorial/uiswing. (accessed: 6 Oct. 2011).

  19. Ortale, R., Ritacco, E., Pelekis, N., Trasarti, R., Costa, G., Giannotti, F., Manco, G., Renso, C., and Theodoridis, Y. (2008) The DAEDALUS Framework: Progressive Querying and Mining of Movement Data. In Proceedings of ACM SIGSPATIAL, page 52.

    Google Scholar 

  20. Pelekis, N., Andrienko, G., Andrienko, N., Kopanakis, I., Marketos, G., and Theodoridis, Y. (2011) Visually Exploring Movement Data via Similarity-based Analysis. Journal of Intelligent Information Systems, 38(2), pages 343–391.

    Article  Google Scholar 

  21. Pelekis, N., Frentzos, E., Giatrakos, N., and Theodoridis, Y. (2008) Hermes: Aggregative LBS via a trajectory DB engine. In Proceedings of SIGMOD, pages 1255–1258.

    Google Scholar 

  22. Pelekis, N., Gkoulalas-Divanis, A., Vodas, M., Kopanaki, D., and Theodoridis, Y. (2011). Privacy-aware querying over sensitive trajectory data. In Proceedings of CIKM, pages 895–904.

    Google Scholar 

  23. Pelekis, N., Gkoulalas-Divanis, A., Vodas, M., Plemenos, A., Kopanaki, D., and Theodoridis, Y. (2012) Private-Hermes: A Benchmark Framework for Privacy-Preserving Mobility Data Querying and Mining Methods. In Proceedings of EDBT, pages 598–601.

    Google Scholar 

  24. Pelekis, N., Kopanakis, I., Kotsifakos, E., Frentzos, E. and Theodoridis, Y. (2011) Clustering uncertain trajectories. Knowledge and Information Systems, 28(1), pages 117–147.

    Article  Google Scholar 

  25. Pelekis, N., Panagiotakis, C., Kopanakis, I., and Theodoridis, Y. (2010) Unsupervised trajectory sampling. In Proceedings of ECML PKDD, pages 17–33.

    Chapter  Google Scholar 

  26. Pfoser, D., Jensen, C. S., and Theodoridis, Y. (2000) Novel approaches to the indexing of moving object trajectories. In Proceedings of VLDB, pages 395–406.

    Google Scholar 

  27. Samarati, P. (2001) Protecting respondents’ identities in microdata release. Transactions on Knowledge and Data Engineering, 13(6), pages 1010–1027.

    Article  Google Scholar 

  28. Steinbach, M., Karypis, G., Kumar, V. (2000). A comparison of document clustering techniques. In Proceedings of KDD Workshop on Text Mining, 400(1), pages 525–526.

    Google Scholar 

  29. Sweeney, L. (2002) k-anonymity: A model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge Based Systems, 10(5), pages 557–570.

    Article  MathSciNet  Google Scholar 

  30. Terrovitis, M. and Mamoulis, N. (2008) Privacy preservation in the publication of trajectories. In Proceedings of Mobile Data Management, pages 65–72.

    Google Scholar 

  31. Wu, H., Xiang, S., Ng, W. S., Wu, W., & Xue, M. (2014) HipStream: A Privacy-Preserving System for Managing Mobility Data Streams. In Proceedings of Mobile Data Management, Vol. 1, pages 360–363.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Despina Kopanaki .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Kopanaki, D., Pelekis, N., Theodoridis, Y. (2018). Systems for Privacy-Preserving Mobility Data Management. In: Gkoulalas-Divanis, A., Bettini, C. (eds) Handbook of Mobile Data Privacy . Springer, Cham. https://doi.org/10.1007/978-3-319-98161-1_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-98161-1_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-98160-4

  • Online ISBN: 978-3-319-98161-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics