The University of Southampton
University of Southampton Institutional Repository

Experiments and analyses of anonymization mechanisms for trajectory data publishing

Experiments and analyses of anonymization mechanisms for trajectory data publishing
Experiments and analyses of anonymization mechanisms for trajectory data publishing

With the advancing of location-detection technologies and the increasing popularity of mobile phones and other location-aware devices, trajectory data is continuously growing. While large-scale trajectories provide opportunities for various applications, the locations in trajectories pose a threat to individual privacy. Recently, there has been an interesting debate on the reidentifiability of individuals in the Science magazine. The main finding of Sánchez et al. is exactly opposite to that of De Montjoye et al., which raises the first question: “what is the true situation of the privacy preservation for trajectories in terms of reidentification?” Furthermore, it is known that anonymization typically causes a decline of data utility, and anonymization mechanisms need to consider the trade-off between privacy and utility. This raises the second question: “what is the true situation of the utility of anonymized trajectories?” To answer these two questions, we conduct a systematic experimental study, using three real-life trajectory datasets, five existing anonymization mechanisms (i.e., identifier anonymization, grid-based anonymization, dummy trajectories, k-anonymity and ε-differential privacy), and two practical applications (i.e., travel time estimation and window range queries). Our findings reveal the true situation of the privacy preservation for trajectories in terms of reidentification and the true situation of the utility of anonymized trajectories, and essentially close the debate between De Montjoye et al. and Sánchez et al. To the best of our knowledge, this study is among the first systematic evaluation and analysis of anonymized trajectories on the individual privacy in terms of unicity and on the utility in terms of practical applications.

anonymization, privacy, reidentification, trajectory, utility
1000-9000
1026-1048
Sun, She
c7f48e15-36b9-4196-85e5-682d1faf70cc
Ma, Shuai
232b6412-5735-42cd-9cbc-80352bff65ce
Song, Jing-he
f887ee31-af80-40fb-9665-0ad34e18a362
Yue, Wen-hai
536b6bab-50b1-4f5f-8d61-04ef296b3e08
Lin, Xue-lian
5a96ba2b-5998-4314-8ef4-682c0a2bb03b
Ma, Tiejun
1f591849-f17c-4209-9f42-e6587b499bae
Sun, She
c7f48e15-36b9-4196-85e5-682d1faf70cc
Ma, Shuai
232b6412-5735-42cd-9cbc-80352bff65ce
Song, Jing-he
f887ee31-af80-40fb-9665-0ad34e18a362
Yue, Wen-hai
536b6bab-50b1-4f5f-8d61-04ef296b3e08
Lin, Xue-lian
5a96ba2b-5998-4314-8ef4-682c0a2bb03b
Ma, Tiejun
1f591849-f17c-4209-9f42-e6587b499bae

Sun, She, Ma, Shuai, Song, Jing-he, Yue, Wen-hai, Lin, Xue-lian and Ma, Tiejun (2022) Experiments and analyses of anonymization mechanisms for trajectory data publishing. Journal of Computer Science and Technology, 37 (5), 1026-1048. (doi:10.1007/s11390-022-2409-x).

Record type: Article

Abstract

With the advancing of location-detection technologies and the increasing popularity of mobile phones and other location-aware devices, trajectory data is continuously growing. While large-scale trajectories provide opportunities for various applications, the locations in trajectories pose a threat to individual privacy. Recently, there has been an interesting debate on the reidentifiability of individuals in the Science magazine. The main finding of Sánchez et al. is exactly opposite to that of De Montjoye et al., which raises the first question: “what is the true situation of the privacy preservation for trajectories in terms of reidentification?” Furthermore, it is known that anonymization typically causes a decline of data utility, and anonymization mechanisms need to consider the trade-off between privacy and utility. This raises the second question: “what is the true situation of the utility of anonymized trajectories?” To answer these two questions, we conduct a systematic experimental study, using three real-life trajectory datasets, five existing anonymization mechanisms (i.e., identifier anonymization, grid-based anonymization, dummy trajectories, k-anonymity and ε-differential privacy), and two practical applications (i.e., travel time estimation and window range queries). Our findings reveal the true situation of the privacy preservation for trajectories in terms of reidentification and the true situation of the utility of anonymized trajectories, and essentially close the debate between De Montjoye et al. and Sánchez et al. To the best of our knowledge, this study is among the first systematic evaluation and analysis of anonymized trajectories on the individual privacy in terms of unicity and on the utility in terms of practical applications.

Text
Experiments-and-Analyses-of-Anonymization-Mechanisms-for-Trajectory-Data-Publishing - Accepted Manuscript
Download (671kB)

More information

Accepted/In Press date: 21 September 2022
Published date: October 2022
Additional Information: Publisher Copyright: © 2022, Institute of Computing Technology, Chinese Academy of Sciences.
Keywords: anonymization, privacy, reidentification, trajectory, utility

Identifiers

Local EPrints ID: 474490
URI: http://eprints.soton.ac.uk/id/eprint/474490
ISSN: 1000-9000
PURE UUID: fed0edb5-9593-4445-943b-e9014f877109

Catalogue record

Date deposited: 22 Feb 2023 23:53
Last modified: 17 Mar 2024 07:35

Export record

Altmetrics

Contributors

Author: She Sun
Author: Shuai Ma
Author: Jing-he Song
Author: Wen-hai Yue
Author: Xue-lian Lin
Author: Tiejun Ma

Download statistics

Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.

View more statistics

Atom RSS 1.0 RSS 2.0

Contact ePrints Soton: eprints@soton.ac.uk

ePrints Soton supports OAI 2.0 with a base URL of http://eprints.soton.ac.uk/cgi/oai2

This repository has been built using EPrints software, developed at the University of Southampton, but available to everyone to use.

We use cookies to ensure that we give you the best experience on our website. If you continue without changing your settings, we will assume that you are happy to receive cookies on the University of Southampton website.

×