Skip to main content

HUMsim: A Privacy-Oriented Human Mobility Simulator

  • Conference paper
  • First Online:
Sensor Systems and Software (S-CUBE 2014)

Abstract

Location-based services rise high privacy concerns because they make it possible to collect and infer sensitive information from a person’s positions and mobility traces. Many solutions have been proposed to safeguard the users’ privacy, at least to a certain extent. However, they generally lacking convincing experimental validation with real human mobility traces. Large databases of real mobility traces are extremely expensive to build or buy. In this paper, we present HUMsim (Human Urban Mobility Simulator), a generator of synthetic but realistic human traces oriented to the experimental validation of privacy solutions. HUMsim generates trajectories that reflect possibly privacy-sensitive habits of people and that, at the same time, account for constraints deriving from a real map. We also validate the soundness of the produced traces by statistically comparing them to real human traces.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 34.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 44.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Alvares, L.O., Bogorny, V., Kuijpers, B., de Macelo, J., Moelans, B., Palma, A.T.: Towards semantic trajectory knowledge discovery. In: Data Mining and Knowledge Discovery (2007)

    Google Scholar 

  2. Beresford, A.R., Stajano, F.: Mix zones: User privacy in location-aware services. In: PerCom Workshops, pp. 127–131 (2004)

    Google Scholar 

  3. Bettstetter, C., Hartenstein, H., Pérez-Costa, X.: Stochastic properties of the random waypoint mobility model. Wirel. Netw. 10(5), 555–567 (2004)

    Article  Google Scholar 

  4. Bogorny, V., Kuijpers, B., Alvares, L.O.: ST-DMQL: A semantic trajectory data mining query language. Int. J. Geogr. Inf. Sci. 23(10), 1245–1276 (2009)

    Article  Google Scholar 

  5. Brockmann, D., Hufnagel, L., Geisel, T.: The scaling laws of human travel. Nature 439(7075), 462–465 (2006)

    Article  Google Scholar 

  6. Camp, T., Boleng, J., Davies, V.: A survey of mobility models for ad hoc network research. Wirel. Commun. Mob. Comput. 2(5), 483–502 (2002)

    Article  Google Scholar 

  7. Cheng, Z., Caverlee, J., Lee, K., Sui, D.Z.: Exploring millions of footprints in location sharing services. ICWSM 2011, 81–88 (2011)

    Google Scholar 

  8. Dini, G., Perazzo, P.: Uniform Obfuscation for Location Privacy. In: Cuppens-Boulahia, N., Cuppens, F., Garcia-Alfaro, J. (eds.) DBSec 2012. LNCS, vol. 7371, pp. 90–105. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  9. Ericsson mobility report: On the pulse of the networked society. Technical report, Ericsson, Jun 2013

    Google Scholar 

  10. Gonzalez, M.C., Hidalgo, C.A., Barabasi, A.L.: Understanding individual human mobility patterns. Nature 453(7196), 779–782 (2008)

    Article  Google Scholar 

  11. Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, pp. 31–42. ACM (2003)

    Google Scholar 

  12. Hyytia, E., Lassila, P., Virtamo, J.: A markovian waypoint mobility model with application to hotspot modeling. In: IEEE International Conference on Communications, ICC 2006, vol. 3, pp. 979–986. IEEE (2006)

    Google Scholar 

  13. Lee, K., Hong, S., Kim, S.J., Rhee, I., Chong, S.: SLAW: A new mobility model for human walks. In: IEEE INFOCOM 2009, pp. 855–863. IEEE (2009)

    Google Scholar 

  14. May, P., Ehrlich, H.-C., Steinke, T.: ZIB structure prediction pipeline: composing a complex biological workflow through web services. In: Nagel, W.E., Walter, W.V., Lehner, W. (eds.) Euro-Par 2006. LNCS, vol. 4128, pp. 1148–1158. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  15. Royer, E.M., Melliar-Smith, P.M., Moser, L.E.: An analysis of the optimum node density for ad hoc mobile networks. In: IEEE International Conference on Communications, ICC 2001, vol. 3, pp. 857–861. IEEE (2001)

    Google Scholar 

Download references

Acknowledgment

This work has been partially supported by the Tuscany region in the framework of the POR CRO FSE 2007–2013 Asse IV Capitale Umano - project SOcial Sensing (SOS); by the Italian Research Project TENACE (pr. no. 20103P34XC); and by Project PITAGORA, cofinanced by the Regional Government of Tuscany (POR CReO Bando Unico R&S 2012) and the European Regional Development Fund (ERDF).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Francesco Giurlanda .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Giurlanda, F., Perazzo, P., Dini, G. (2015). HUMsim: A Privacy-Oriented Human Mobility Simulator. In: Kanjo, E., Trossen, D. (eds) Sensor Systems and Software. S-CUBE 2014. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 143. Springer, Cham. https://doi.org/10.1007/978-3-319-17136-4_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-17136-4_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-17135-7

  • Online ISBN: 978-3-319-17136-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics