Article thumbnail

Automatic Privacy and Utility Preservation of Mobility Data: A Nonlinear Model-Based Approach

By Sophie Cerf, Sara Bouchenak, Bogdan Robu, Nicolas Marchand, Vincent Primault, Sonia Ben Mokhtar, Antoine Boutet and Lydia Y. Chen


International audienceThe widespread use of mobile devices and location-based services has generated a large number of mobility databases. While processing these data is highly valuable, privacy issues can occur if personal information is revealed. The prior art has investigated ways to protect mobility data by providing a wide range of Location Privacy Protection Mechanisms (LPPMs). However, the privacy level of the protected data significantly varies depending on the protection mechanism used, its configuration and on the characteristics of the mobility data. Meanwhile, the protected data still needs to enable some useful processing. To tackle these issues, we present PULP, a framework that finds the suitable protection mechanism and automatically configures it for each user in order to achieve user-defined objectives in terms of both privacy and utility. PULP uses nonlinear models to capture the impact of each LPPM on data privacy and utility levels. Evaluation of our framework is carried out with two protectionmechanisms from the literature and four real-world mobility datasets. Results show the efficiency of PULP, its robustness and adaptability. Comparisons between LPPMs’ configurators and the state of the art further illustrate that PULP better realizes users’ objectives, and its computation time is in orders of magnitude faster

Topics: Usability, Adaptation models, Measurement, Computational modeling, Data privacy, Configuration control, Privacy protection, Security, Index Terms-D46 Security and Privacy Protection, D48b Modeling and prediction, H20a Security, integrity, and protec- tion, J9a Location-dependent and sensitive, D216b Configu- ration control, [INFO.INFO-AU]Computer Science [cs]/Automatic Control Engineering, [INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI], [INFO.INFO-CY]Computer Science [cs]/Computers and Society [cs.CY], [INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing
Publisher: 'Institute of Electrical and Electronics Engineers (IEEE)'
Year: 2018
DOI identifier: 10.1109/TDSC.2018.2884470
OAI identifier: oai:HAL:hal-01910687v1
Download PDF:
Sorry, we are unable to provide the full text but you may find it at the following location(s):
  • https://hal.archives-ouvertes.... (external link)
  • https://hal.archives-ouvertes.... (external link)
  • https://hal.archives-ouvertes.... (external link)
  • Suggested articles

    To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.