Utility-aware and Privacy-preserving Trajectory Synthesis Model that Resists Social Relationship Privacy Attacks

Zhirun Zheng,Zhetao Li,Jie Li,Hongbo Jiang,Tong Li,Bin Guo
DOI: https://doi.org/10.1145/3495160
IF: 5
2022-05-11
ACM Transactions on Intelligent Systems and Technology
Abstract:For academic research and business intelligence, trajectory data has been widely collected and analyzed. Releasing trajectory data to a third party may lead to serious privacy leakage, which has spawned considerable researches on trajectory privacy protection technology. However, existing work suffers from several shortcomings. They either focus on point-based location privacy, ignoring the spatio-temporal correlations among locations within a trajectory, or they protect the privacy of each user separately without considering privacy leakage of the social relationship between trajectories of different users. Besides, they fail to balance privacy protection and data utility. Motivated by these limitations, in this article, we propose
computer science, information systems, artificial intelligence
What problem does this paper attempt to address?