skip to main content
10.1145/2757513.2757522acmconferencesArticle/Chapter ViewAbstractPublication PagesmobihocConference Proceedingsconference-collections
research-article

Privacy Preserving Social Tie Discovery Based on Cloaked Human Trajectories

Published: 22 June 2015 Publication History

Abstract

Discovering social connections of people has become a flourishing research topic considering the rich social information inferable from human trajectories. Existing social tie detection methods often require exact locations of users, which cause serious privacy concerns. Although cloaking is a common technique for location anonymization, it has rarely been applied in social tie detection due to the potential loss of significant location information. In this paper, we propose a semantic tree model for social tie detection, which supports different levels of privacy preserving and allows better understanding of location content of the cloaking regions. We propose a novel algorithm that can infer the social ties between users using only their cloaked trajectories without exposing their exact locations. We model the obscured regions generated by the cloaking algorithms in a semantic region tree and infer the similarity between two users based on their temporal and spatial relations in the tree. We evaluate our proposed approach using real trajectory dataset and show that our algorithm can identify social ties successfully with 15% higher accuracy compared with existing approach.

References

[1]
Eunjoon Cho, Seth A. Myers, and Jure Leskovec. Friendship and mobility: User movement in location-based social networks. In Proceedings of KDD'11, pages 1082--1090. ACM, 2011.
[2]
Eunjoon Cho, Seth A Myers, and Jure Leskovec. Friendship and mobility: User movement in location-based social networks. In Proceedings of KDD'11, pages 1082--1090, 2011.
[3]
Bugra Gedik and Ling Liu. Protecting location privacy with personalized k-anonymity: Architecture and algorithms. IEEE Transactions on Mobile Computing, 7(1):1--18, 2008.
[4]
Marco Gruteser and Dirk Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In Proceedings of the 1st international conference on Mobile systems, applications and services, pages 31--42. ACM, 2003.
[5]
Hsun-Ping Hsieh and Cheng-Te Li. Inferring social relationships from mobile sensor data. In Proceedings of WWW Companion'14, pages 293--294, 2014.
[6]
Jie Gao Khuong Vu, Rong Zheng. Efficient algorithms for k-anonymous location privacy in participatory sensing. In Proceedings of INFOCOM'12, pages 2399 -- 2407. IEEE, 2012.
[7]
Ben Niu, Qinghua Li, and Xiaoyan Zhu. Achieving k-anonymity in privacy-aware location-based services. In Proceedings of INFOCOM'14, 2014.
[8]
Srinivasan Parthasarathy, Yiye Ruan, and Venu Satuluri. Community discovery in social networks: Applications, methods and emerging trends. In Social Network Data Analytics, pages 79--113. Springer, 2011.
[9]
Krishna PN Puttaswamy, Shiyuan Wang, and Troy Steinbauer. Preserving location privacy in geosocial applications. IEEE Transactions on Mobile Computing, 13(1):159--173, 2014.
[10]
Salvatore Scellato, Anastasios Noulas, and Cecilia Mascolo. Exploiting place features in link prediction on location-based social networks. In Proceedings of SIGKDD'11, pages 1046--1054. ACM, 2011.
[11]
Rong Tan, Junzhong Gu, Peng Chen, and Zhou Zhong. Link prediction using protected location history. In Proceedings of ICCIS 2013, pages 795--798. IEEE, 2013.
[12]
Dashun Wang, Dino Pedreschi, Chaoming Song, Fosca Giannotti, and Albert-Laszlo Barabasi. Human mobility, social ties, and link prediction. In Proceedings of SIGKDD'11, pages 1100--1108. ACM, 2011.
[13]
Xiangye Xiao, Yu Zheng, Qiong Luo, and Xing Xie. Inferring social ties between users with human location history. Journal of Ambient Intelligence and Humanized Computing, 5(1):3--19, 2014.
[14]
Josh Jia-Ching Ying, Wang-Chien Lee, and Tz-Chiao Weng. Semantic trajectory mining for location prediction. In Proceedings of SIGSPATIAL'11, pages 34--43. ACM, 2011.
[15]
Jun Zhang, Chaokun Wang, and Jianmin Wang. Who proposed the relationship?: Recovering the hidden directions of undirected social networks. In Proceedings of WWW'14, pages 807--818, 2014.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
HOTPOST '15: Proceedings of the 7th International Workshop on Hot Topics in Planet-scale mObile computing and online Social neTworking
June 2015
62 pages
ISBN:9781450335171
DOI:10.1145/2757513
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 22 June 2015

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. human trajectory
  2. location privacy
  3. social tie discovery

Qualifiers

  • Research-article

Funding Sources

Conference

MobiHoc'15
Sponsor:

Acceptance Rates

HOTPOST '15 Paper Acceptance Rate 5 of 10 submissions, 50%;
Overall Acceptance Rate 5 of 10 submissions, 50%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)1
Reflects downloads up to 06 Nov 2024

Other Metrics

Citations

Cited By

View all

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media