A New Privacy Breach: User Trajectory Recovery From Aggregated Mobility Data
Human mobility data have been ubiquitously collected through cellular networks and mobile applications, and publicly released for academic research and commercial purposes for the last decade. Since releasing individual's mobility records usually gives rise to privacy issues, data sets owners t...
Gespeichert in:
Veröffentlicht in: | IEEE/ACM transactions on networking 2018-06, Vol.26 (3), p.1446-1459 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1459 |
---|---|
container_issue | 3 |
container_start_page | 1446 |
container_title | IEEE/ACM transactions on networking |
container_volume | 26 |
creator | Tu, Zhen Xu, Fengli Li, Yong Zhang, Pengyu Jin, Depeng |
description | Human mobility data have been ubiquitously collected through cellular networks and mobile applications, and publicly released for academic research and commercial purposes for the last decade. Since releasing individual's mobility records usually gives rise to privacy issues, data sets owners tend to only publish aggregated mobility data, such as the number of users covered by a cellular tower at a specific timestamp, which is believed to be sufficient for preserving users' privacy. However, in this paper, we argue and prove that even publishing aggregated mobility data could lead to privacy breach in individuals' trajectories. We develop an attack system that is able to exploit the uniqueness and regularity of human mobility to recover individual's trajectories from the aggregated mobility data without any prior knowledge. By conducting experiments on two real-world data sets collected from both the mobile application and cellular network, we reveal that the attack system is able to recover users' trajectories with an accuracy of about 73%~91% at the scale of thousands to ten thousands of mobile users, which indicates severe privacy leakage in such data sets. Our extensive analysis also reveals that by generalization and perturbation, this kind of privacy leakage can only be mitigated. Through the investigation on aggregated mobility data, this paper recognizes a novel privacy problem in publishing statistic data, which appeals for immediate attentions from both the academy and industry. |
doi_str_mv | 10.1109/TNET.2018.2829173 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_2174557483</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8356232</ieee_id><sourcerecordid>2174557483</sourcerecordid><originalsourceid>FETCH-LOGICAL-c407t-db388c8825859e488b88e06219407ce9c9bbcd75530fa2bbf1412d2adb758e723</originalsourceid><addsrcrecordid>eNo9kE1Lw0AQhhdRsFZ_gHhZ8Jy6H9nNxFvthwq1iqTnZXczqSmtqZu0kn9vSouneWGedwYeQm45G3DO0odsPskGgnEYCBApT-QZ6XGlIBJK6_MuMy0jrVNxSa7qesUYl0zoHpkN6Rx_6Uco99a39Cmg9V-PdFFjoFmwK_RNFVr6ib7aYxemodrQ4XIZcGkbzOlb5cp12bR0bBt7TS4Ku67x5jT7ZDGdZKOXaPb-_DoaziIfs6SJcicBPIBQoFKMARwAMi142q09pj51zueJUpIVVjhX8JiLXNjcJQowEbJP7o93t6H62WHdmFW1C9_dSyN4EiuVxCA7ih8pH6q6DliYbSg3NrSGM3OQZg7SzEGaOUnrOnfHTomI_zxIpYUU8g8N8Gbv</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2174557483</pqid></control><display><type>article</type><title>A New Privacy Breach: User Trajectory Recovery From Aggregated Mobility Data</title><source>IEEE Electronic Library (IEL)</source><creator>Tu, Zhen ; Xu, Fengli ; Li, Yong ; Zhang, Pengyu ; Jin, Depeng</creator><creatorcontrib>Tu, Zhen ; Xu, Fengli ; Li, Yong ; Zhang, Pengyu ; Jin, Depeng</creatorcontrib><description>Human mobility data have been ubiquitously collected through cellular networks and mobile applications, and publicly released for academic research and commercial purposes for the last decade. Since releasing individual's mobility records usually gives rise to privacy issues, data sets owners tend to only publish aggregated mobility data, such as the number of users covered by a cellular tower at a specific timestamp, which is believed to be sufficient for preserving users' privacy. However, in this paper, we argue and prove that even publishing aggregated mobility data could lead to privacy breach in individuals' trajectories. We develop an attack system that is able to exploit the uniqueness and regularity of human mobility to recover individual's trajectories from the aggregated mobility data without any prior knowledge. By conducting experiments on two real-world data sets collected from both the mobile application and cellular network, we reveal that the attack system is able to recover users' trajectories with an accuracy of about 73%~91% at the scale of thousands to ten thousands of mobile users, which indicates severe privacy leakage in such data sets. Our extensive analysis also reveals that by generalization and perturbation, this kind of privacy leakage can only be mitigated. Through the investigation on aggregated mobility data, this paper recognizes a novel privacy problem in publishing statistic data, which appeals for immediate attentions from both the academy and industry.</description><identifier>ISSN: 1063-6692</identifier><identifier>EISSN: 1558-2566</identifier><identifier>DOI: 10.1109/TNET.2018.2829173</identifier><identifier>CODEN: IEANEP</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>aggregated mobility data ; Applications programs ; Base stations ; Cellular communication ; Cellular networks ; Data models ; Data privacy ; Data recovery ; Datasets ; Leakage ; Mobile applications ; Mobile computing ; Mobility ; Privacy ; Publishing ; statistic data privacy ; Trajectories ; Trajectory ; Trajectory privacy ; Wireless networks</subject><ispartof>IEEE/ACM transactions on networking, 2018-06, Vol.26 (3), p.1446-1459</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2018</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c407t-db388c8825859e488b88e06219407ce9c9bbcd75530fa2bbf1412d2adb758e723</citedby><cites>FETCH-LOGICAL-c407t-db388c8825859e488b88e06219407ce9c9bbcd75530fa2bbf1412d2adb758e723</cites><orcidid>0000-0001-5617-1659 ; 0000-0001-5431-6842</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8356232$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27901,27902,54733</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/8356232$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Tu, Zhen</creatorcontrib><creatorcontrib>Xu, Fengli</creatorcontrib><creatorcontrib>Li, Yong</creatorcontrib><creatorcontrib>Zhang, Pengyu</creatorcontrib><creatorcontrib>Jin, Depeng</creatorcontrib><title>A New Privacy Breach: User Trajectory Recovery From Aggregated Mobility Data</title><title>IEEE/ACM transactions on networking</title><addtitle>TNET</addtitle><description>Human mobility data have been ubiquitously collected through cellular networks and mobile applications, and publicly released for academic research and commercial purposes for the last decade. Since releasing individual's mobility records usually gives rise to privacy issues, data sets owners tend to only publish aggregated mobility data, such as the number of users covered by a cellular tower at a specific timestamp, which is believed to be sufficient for preserving users' privacy. However, in this paper, we argue and prove that even publishing aggregated mobility data could lead to privacy breach in individuals' trajectories. We develop an attack system that is able to exploit the uniqueness and regularity of human mobility to recover individual's trajectories from the aggregated mobility data without any prior knowledge. By conducting experiments on two real-world data sets collected from both the mobile application and cellular network, we reveal that the attack system is able to recover users' trajectories with an accuracy of about 73%~91% at the scale of thousands to ten thousands of mobile users, which indicates severe privacy leakage in such data sets. Our extensive analysis also reveals that by generalization and perturbation, this kind of privacy leakage can only be mitigated. Through the investigation on aggregated mobility data, this paper recognizes a novel privacy problem in publishing statistic data, which appeals for immediate attentions from both the academy and industry.</description><subject>aggregated mobility data</subject><subject>Applications programs</subject><subject>Base stations</subject><subject>Cellular communication</subject><subject>Cellular networks</subject><subject>Data models</subject><subject>Data privacy</subject><subject>Data recovery</subject><subject>Datasets</subject><subject>Leakage</subject><subject>Mobile applications</subject><subject>Mobile computing</subject><subject>Mobility</subject><subject>Privacy</subject><subject>Publishing</subject><subject>statistic data privacy</subject><subject>Trajectories</subject><subject>Trajectory</subject><subject>Trajectory privacy</subject><subject>Wireless networks</subject><issn>1063-6692</issn><issn>1558-2566</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kE1Lw0AQhhdRsFZ_gHhZ8Jy6H9nNxFvthwq1iqTnZXczqSmtqZu0kn9vSouneWGedwYeQm45G3DO0odsPskGgnEYCBApT-QZ6XGlIBJK6_MuMy0jrVNxSa7qesUYl0zoHpkN6Rx_6Uco99a39Cmg9V-PdFFjoFmwK_RNFVr6ib7aYxemodrQ4XIZcGkbzOlb5cp12bR0bBt7TS4Ku67x5jT7ZDGdZKOXaPb-_DoaziIfs6SJcicBPIBQoFKMARwAMi142q09pj51zueJUpIVVjhX8JiLXNjcJQowEbJP7o93t6H62WHdmFW1C9_dSyN4EiuVxCA7ih8pH6q6DliYbSg3NrSGM3OQZg7SzEGaOUnrOnfHTomI_zxIpYUU8g8N8Gbv</recordid><startdate>201806</startdate><enddate>201806</enddate><creator>Tu, Zhen</creator><creator>Xu, Fengli</creator><creator>Li, Yong</creator><creator>Zhang, Pengyu</creator><creator>Jin, Depeng</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0001-5617-1659</orcidid><orcidid>https://orcid.org/0000-0001-5431-6842</orcidid></search><sort><creationdate>201806</creationdate><title>A New Privacy Breach: User Trajectory Recovery From Aggregated Mobility Data</title><author>Tu, Zhen ; Xu, Fengli ; Li, Yong ; Zhang, Pengyu ; Jin, Depeng</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c407t-db388c8825859e488b88e06219407ce9c9bbcd75530fa2bbf1412d2adb758e723</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>aggregated mobility data</topic><topic>Applications programs</topic><topic>Base stations</topic><topic>Cellular communication</topic><topic>Cellular networks</topic><topic>Data models</topic><topic>Data privacy</topic><topic>Data recovery</topic><topic>Datasets</topic><topic>Leakage</topic><topic>Mobile applications</topic><topic>Mobile computing</topic><topic>Mobility</topic><topic>Privacy</topic><topic>Publishing</topic><topic>statistic data privacy</topic><topic>Trajectories</topic><topic>Trajectory</topic><topic>Trajectory privacy</topic><topic>Wireless networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Tu, Zhen</creatorcontrib><creatorcontrib>Xu, Fengli</creatorcontrib><creatorcontrib>Li, Yong</creatorcontrib><creatorcontrib>Zhang, Pengyu</creatorcontrib><creatorcontrib>Jin, Depeng</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE/ACM transactions on networking</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Tu, Zhen</au><au>Xu, Fengli</au><au>Li, Yong</au><au>Zhang, Pengyu</au><au>Jin, Depeng</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A New Privacy Breach: User Trajectory Recovery From Aggregated Mobility Data</atitle><jtitle>IEEE/ACM transactions on networking</jtitle><stitle>TNET</stitle><date>2018-06</date><risdate>2018</risdate><volume>26</volume><issue>3</issue><spage>1446</spage><epage>1459</epage><pages>1446-1459</pages><issn>1063-6692</issn><eissn>1558-2566</eissn><coden>IEANEP</coden><abstract>Human mobility data have been ubiquitously collected through cellular networks and mobile applications, and publicly released for academic research and commercial purposes for the last decade. Since releasing individual's mobility records usually gives rise to privacy issues, data sets owners tend to only publish aggregated mobility data, such as the number of users covered by a cellular tower at a specific timestamp, which is believed to be sufficient for preserving users' privacy. However, in this paper, we argue and prove that even publishing aggregated mobility data could lead to privacy breach in individuals' trajectories. We develop an attack system that is able to exploit the uniqueness and regularity of human mobility to recover individual's trajectories from the aggregated mobility data without any prior knowledge. By conducting experiments on two real-world data sets collected from both the mobile application and cellular network, we reveal that the attack system is able to recover users' trajectories with an accuracy of about 73%~91% at the scale of thousands to ten thousands of mobile users, which indicates severe privacy leakage in such data sets. Our extensive analysis also reveals that by generalization and perturbation, this kind of privacy leakage can only be mitigated. Through the investigation on aggregated mobility data, this paper recognizes a novel privacy problem in publishing statistic data, which appeals for immediate attentions from both the academy and industry.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TNET.2018.2829173</doi><tpages>14</tpages><orcidid>https://orcid.org/0000-0001-5617-1659</orcidid><orcidid>https://orcid.org/0000-0001-5431-6842</orcidid></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1063-6692 |
ispartof | IEEE/ACM transactions on networking, 2018-06, Vol.26 (3), p.1446-1459 |
issn | 1063-6692 1558-2566 |
language | eng |
recordid | cdi_proquest_journals_2174557483 |
source | IEEE Electronic Library (IEL) |
subjects | aggregated mobility data Applications programs Base stations Cellular communication Cellular networks Data models Data privacy Data recovery Datasets Leakage Mobile applications Mobile computing Mobility Privacy Publishing statistic data privacy Trajectories Trajectory Trajectory privacy Wireless networks |
title | A New Privacy Breach: User Trajectory Recovery From Aggregated Mobility Data |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-08T01%3A09%3A20IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20New%20Privacy%20Breach:%20User%20Trajectory%20Recovery%20From%20Aggregated%20Mobility%20Data&rft.jtitle=IEEE/ACM%20transactions%20on%20networking&rft.au=Tu,%20Zhen&rft.date=2018-06&rft.volume=26&rft.issue=3&rft.spage=1446&rft.epage=1459&rft.pages=1446-1459&rft.issn=1063-6692&rft.eissn=1558-2566&rft.coden=IEANEP&rft_id=info:doi/10.1109/TNET.2018.2829173&rft_dat=%3Cproquest_RIE%3E2174557483%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2174557483&rft_id=info:pmid/&rft_ieee_id=8356232&rfr_iscdi=true |