Netinfo Security ›› 2015, Vol. 15 ›› Issue (10): 24-31.doi: 10.3969/j.issn.1671-1122.2015.10.004

Previous Articles     Next Articles

Review on Location Trajectory Privacy Protection

MA Chun-guang1, ZHANG Lei1,2, YANG Song-tao1,3   

  1. 1. College of Computer Science and Technology, Harbin Engineering University, Harbin Heilongjiang 150001, China
    2. Office of Academic Affairs, Jiamusi University, Jiamusi Heilongjiang 154007, China
    3. College of Information Science and Electronic Technology, Jiamusi University, Jiamusi Heilongjiang 154007, China
  • Received:2015-09-07 Online:2015-10-01 Published:2015-11-04

Abstract:

Location based service brings great convenience for users in daily life, but at the same time it inevitably leads to a certain degree of users’ private information exposure. On issues of privacy, the focus of current research is protection of users’ location privacy. Due to the relationships between locations, scattered locations could be constituted into location trajectory, and that location trajectory contains more spatio-temporal correlations, with comparison of solo location. The attacker could be more accessible to user’s privacy with the help of these correlations. In order to solve this problem, researchers put forward a lot of methods to protect the location trajectory privacy. But how to find the similar methods for study or imitation has puzzled the researcher, because there is no specific classification. In this article, based on the attack techniques of location trajectory tracking and reconstruction, we propose a new classification. With this classification, we analyze these protection methods and summarize the advantages and disadvantages of them. Finally, we put forward in the research prospects for the potential attacks of data mining technology.

Key words: location trajectory, privacy protection, trajectory tracking, trajectory reconstruction

CLC Number: