A New Privacy Breach: User Trajectory Recovery From Aggregated Mobility Data

Human mobility data have been ubiquitously collected through cellular networks and mobile applications, and publicly released for academic research and commercial purposes for the last decade. Since releasing individual's mobility records usually gives rise to privacy issues, data sets owners t...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE/ACM transactions on networking 2018-06, Vol.26 (3), p.1446-1459
Hauptverfasser: Tu, Zhen, Xu, Fengli, Li, Yong, Zhang, Pengyu, Jin, Depeng
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1459
container_issue 3
container_start_page 1446
container_title IEEE/ACM transactions on networking
container_volume 26
creator Tu, Zhen
Xu, Fengli
Li, Yong
Zhang, Pengyu
Jin, Depeng
description Human mobility data have been ubiquitously collected through cellular networks and mobile applications, and publicly released for academic research and commercial purposes for the last decade. Since releasing individual's mobility records usually gives rise to privacy issues, data sets owners tend to only publish aggregated mobility data, such as the number of users covered by a cellular tower at a specific timestamp, which is believed to be sufficient for preserving users' privacy. However, in this paper, we argue and prove that even publishing aggregated mobility data could lead to privacy breach in individuals' trajectories. We develop an attack system that is able to exploit the uniqueness and regularity of human mobility to recover individual's trajectories from the aggregated mobility data without any prior knowledge. By conducting experiments on two real-world data sets collected from both the mobile application and cellular network, we reveal that the attack system is able to recover users' trajectories with an accuracy of about 73%~91% at the scale of thousands to ten thousands of mobile users, which indicates severe privacy leakage in such data sets. Our extensive analysis also reveals that by generalization and perturbation, this kind of privacy leakage can only be mitigated. Through the investigation on aggregated mobility data, this paper recognizes a novel privacy problem in publishing statistic data, which appeals for immediate attentions from both the academy and industry.
doi_str_mv 10.1109/TNET.2018.2829173
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_2174557483</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8356232</ieee_id><sourcerecordid>2174557483</sourcerecordid><originalsourceid>FETCH-LOGICAL-c407t-db388c8825859e488b88e06219407ce9c9bbcd75530fa2bbf1412d2adb758e723</originalsourceid><addsrcrecordid>eNo9kE1Lw0AQhhdRsFZ_gHhZ8Jy6H9nNxFvthwq1iqTnZXczqSmtqZu0kn9vSouneWGedwYeQm45G3DO0odsPskGgnEYCBApT-QZ6XGlIBJK6_MuMy0jrVNxSa7qesUYl0zoHpkN6Rx_6Uco99a39Cmg9V-PdFFjoFmwK_RNFVr6ib7aYxemodrQ4XIZcGkbzOlb5cp12bR0bBt7TS4Ku67x5jT7ZDGdZKOXaPb-_DoaziIfs6SJcicBPIBQoFKMARwAMi142q09pj51zueJUpIVVjhX8JiLXNjcJQowEbJP7o93t6H62WHdmFW1C9_dSyN4EiuVxCA7ih8pH6q6DliYbSg3NrSGM3OQZg7SzEGaOUnrOnfHTomI_zxIpYUU8g8N8Gbv</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2174557483</pqid></control><display><type>article</type><title>A New Privacy Breach: User Trajectory Recovery From Aggregated Mobility Data</title><source>IEEE Electronic Library (IEL)</source><creator>Tu, Zhen ; Xu, Fengli ; Li, Yong ; Zhang, Pengyu ; Jin, Depeng</creator><creatorcontrib>Tu, Zhen ; Xu, Fengli ; Li, Yong ; Zhang, Pengyu ; Jin, Depeng</creatorcontrib><description>Human mobility data have been ubiquitously collected through cellular networks and mobile applications, and publicly released for academic research and commercial purposes for the last decade. Since releasing individual's mobility records usually gives rise to privacy issues, data sets owners tend to only publish aggregated mobility data, such as the number of users covered by a cellular tower at a specific timestamp, which is believed to be sufficient for preserving users' privacy. However, in this paper, we argue and prove that even publishing aggregated mobility data could lead to privacy breach in individuals' trajectories. We develop an attack system that is able to exploit the uniqueness and regularity of human mobility to recover individual's trajectories from the aggregated mobility data without any prior knowledge. By conducting experiments on two real-world data sets collected from both the mobile application and cellular network, we reveal that the attack system is able to recover users' trajectories with an accuracy of about 73%~91% at the scale of thousands to ten thousands of mobile users, which indicates severe privacy leakage in such data sets. Our extensive analysis also reveals that by generalization and perturbation, this kind of privacy leakage can only be mitigated. Through the investigation on aggregated mobility data, this paper recognizes a novel privacy problem in publishing statistic data, which appeals for immediate attentions from both the academy and industry.</description><identifier>ISSN: 1063-6692</identifier><identifier>EISSN: 1558-2566</identifier><identifier>DOI: 10.1109/TNET.2018.2829173</identifier><identifier>CODEN: IEANEP</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>aggregated mobility data ; Applications programs ; Base stations ; Cellular communication ; Cellular networks ; Data models ; Data privacy ; Data recovery ; Datasets ; Leakage ; Mobile applications ; Mobile computing ; Mobility ; Privacy ; Publishing ; statistic data privacy ; Trajectories ; Trajectory ; Trajectory privacy ; Wireless networks</subject><ispartof>IEEE/ACM transactions on networking, 2018-06, Vol.26 (3), p.1446-1459</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2018</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c407t-db388c8825859e488b88e06219407ce9c9bbcd75530fa2bbf1412d2adb758e723</citedby><cites>FETCH-LOGICAL-c407t-db388c8825859e488b88e06219407ce9c9bbcd75530fa2bbf1412d2adb758e723</cites><orcidid>0000-0001-5617-1659 ; 0000-0001-5431-6842</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8356232$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27901,27902,54733</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/8356232$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Tu, Zhen</creatorcontrib><creatorcontrib>Xu, Fengli</creatorcontrib><creatorcontrib>Li, Yong</creatorcontrib><creatorcontrib>Zhang, Pengyu</creatorcontrib><creatorcontrib>Jin, Depeng</creatorcontrib><title>A New Privacy Breach: User Trajectory Recovery From Aggregated Mobility Data</title><title>IEEE/ACM transactions on networking</title><addtitle>TNET</addtitle><description>Human mobility data have been ubiquitously collected through cellular networks and mobile applications, and publicly released for academic research and commercial purposes for the last decade. Since releasing individual's mobility records usually gives rise to privacy issues, data sets owners tend to only publish aggregated mobility data, such as the number of users covered by a cellular tower at a specific timestamp, which is believed to be sufficient for preserving users' privacy. However, in this paper, we argue and prove that even publishing aggregated mobility data could lead to privacy breach in individuals' trajectories. We develop an attack system that is able to exploit the uniqueness and regularity of human mobility to recover individual's trajectories from the aggregated mobility data without any prior knowledge. By conducting experiments on two real-world data sets collected from both the mobile application and cellular network, we reveal that the attack system is able to recover users' trajectories with an accuracy of about 73%~91% at the scale of thousands to ten thousands of mobile users, which indicates severe privacy leakage in such data sets. Our extensive analysis also reveals that by generalization and perturbation, this kind of privacy leakage can only be mitigated. Through the investigation on aggregated mobility data, this paper recognizes a novel privacy problem in publishing statistic data, which appeals for immediate attentions from both the academy and industry.</description><subject>aggregated mobility data</subject><subject>Applications programs</subject><subject>Base stations</subject><subject>Cellular communication</subject><subject>Cellular networks</subject><subject>Data models</subject><subject>Data privacy</subject><subject>Data recovery</subject><subject>Datasets</subject><subject>Leakage</subject><subject>Mobile applications</subject><subject>Mobile computing</subject><subject>Mobility</subject><subject>Privacy</subject><subject>Publishing</subject><subject>statistic data privacy</subject><subject>Trajectories</subject><subject>Trajectory</subject><subject>Trajectory privacy</subject><subject>Wireless networks</subject><issn>1063-6692</issn><issn>1558-2566</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kE1Lw0AQhhdRsFZ_gHhZ8Jy6H9nNxFvthwq1iqTnZXczqSmtqZu0kn9vSouneWGedwYeQm45G3DO0odsPskGgnEYCBApT-QZ6XGlIBJK6_MuMy0jrVNxSa7qesUYl0zoHpkN6Rx_6Uco99a39Cmg9V-PdFFjoFmwK_RNFVr6ib7aYxemodrQ4XIZcGkbzOlb5cp12bR0bBt7TS4Ku67x5jT7ZDGdZKOXaPb-_DoaziIfs6SJcicBPIBQoFKMARwAMi142q09pj51zueJUpIVVjhX8JiLXNjcJQowEbJP7o93t6H62WHdmFW1C9_dSyN4EiuVxCA7ih8pH6q6DliYbSg3NrSGM3OQZg7SzEGaOUnrOnfHTomI_zxIpYUU8g8N8Gbv</recordid><startdate>201806</startdate><enddate>201806</enddate><creator>Tu, Zhen</creator><creator>Xu, Fengli</creator><creator>Li, Yong</creator><creator>Zhang, Pengyu</creator><creator>Jin, Depeng</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0001-5617-1659</orcidid><orcidid>https://orcid.org/0000-0001-5431-6842</orcidid></search><sort><creationdate>201806</creationdate><title>A New Privacy Breach: User Trajectory Recovery From Aggregated Mobility Data</title><author>Tu, Zhen ; Xu, Fengli ; Li, Yong ; Zhang, Pengyu ; Jin, Depeng</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c407t-db388c8825859e488b88e06219407ce9c9bbcd75530fa2bbf1412d2adb758e723</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>aggregated mobility data</topic><topic>Applications programs</topic><topic>Base stations</topic><topic>Cellular communication</topic><topic>Cellular networks</topic><topic>Data models</topic><topic>Data privacy</topic><topic>Data recovery</topic><topic>Datasets</topic><topic>Leakage</topic><topic>Mobile applications</topic><topic>Mobile computing</topic><topic>Mobility</topic><topic>Privacy</topic><topic>Publishing</topic><topic>statistic data privacy</topic><topic>Trajectories</topic><topic>Trajectory</topic><topic>Trajectory privacy</topic><topic>Wireless networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Tu, Zhen</creatorcontrib><creatorcontrib>Xu, Fengli</creatorcontrib><creatorcontrib>Li, Yong</creatorcontrib><creatorcontrib>Zhang, Pengyu</creatorcontrib><creatorcontrib>Jin, Depeng</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE/ACM transactions on networking</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Tu, Zhen</au><au>Xu, Fengli</au><au>Li, Yong</au><au>Zhang, Pengyu</au><au>Jin, Depeng</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A New Privacy Breach: User Trajectory Recovery From Aggregated Mobility Data</atitle><jtitle>IEEE/ACM transactions on networking</jtitle><stitle>TNET</stitle><date>2018-06</date><risdate>2018</risdate><volume>26</volume><issue>3</issue><spage>1446</spage><epage>1459</epage><pages>1446-1459</pages><issn>1063-6692</issn><eissn>1558-2566</eissn><coden>IEANEP</coden><abstract>Human mobility data have been ubiquitously collected through cellular networks and mobile applications, and publicly released for academic research and commercial purposes for the last decade. Since releasing individual's mobility records usually gives rise to privacy issues, data sets owners tend to only publish aggregated mobility data, such as the number of users covered by a cellular tower at a specific timestamp, which is believed to be sufficient for preserving users' privacy. However, in this paper, we argue and prove that even publishing aggregated mobility data could lead to privacy breach in individuals' trajectories. We develop an attack system that is able to exploit the uniqueness and regularity of human mobility to recover individual's trajectories from the aggregated mobility data without any prior knowledge. By conducting experiments on two real-world data sets collected from both the mobile application and cellular network, we reveal that the attack system is able to recover users' trajectories with an accuracy of about 73%~91% at the scale of thousands to ten thousands of mobile users, which indicates severe privacy leakage in such data sets. Our extensive analysis also reveals that by generalization and perturbation, this kind of privacy leakage can only be mitigated. Through the investigation on aggregated mobility data, this paper recognizes a novel privacy problem in publishing statistic data, which appeals for immediate attentions from both the academy and industry.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TNET.2018.2829173</doi><tpages>14</tpages><orcidid>https://orcid.org/0000-0001-5617-1659</orcidid><orcidid>https://orcid.org/0000-0001-5431-6842</orcidid></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1063-6692
ispartof IEEE/ACM transactions on networking, 2018-06, Vol.26 (3), p.1446-1459
issn 1063-6692
1558-2566
language eng
recordid cdi_proquest_journals_2174557483
source IEEE Electronic Library (IEL)
subjects aggregated mobility data
Applications programs
Base stations
Cellular communication
Cellular networks
Data models
Data privacy
Data recovery
Datasets
Leakage
Mobile applications
Mobile computing
Mobility
Privacy
Publishing
statistic data privacy
Trajectories
Trajectory
Trajectory privacy
Wireless networks
title A New Privacy Breach: User Trajectory Recovery From Aggregated Mobility Data
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-08T01%3A09%3A20IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20New%20Privacy%20Breach:%20User%20Trajectory%20Recovery%20From%20Aggregated%20Mobility%20Data&rft.jtitle=IEEE/ACM%20transactions%20on%20networking&rft.au=Tu,%20Zhen&rft.date=2018-06&rft.volume=26&rft.issue=3&rft.spage=1446&rft.epage=1459&rft.pages=1446-1459&rft.issn=1063-6692&rft.eissn=1558-2566&rft.coden=IEANEP&rft_id=info:doi/10.1109/TNET.2018.2829173&rft_dat=%3Cproquest_RIE%3E2174557483%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2174557483&rft_id=info:pmid/&rft_ieee_id=8356232&rfr_iscdi=true