Mobile and Ubiquitous Systems: Computing, Networking, and Services. 10th International Conference, MOBIQUITOUS 2013, Tokyo, Japan, December 2-4, 2013, Revised Selected Papers

Research Article

Protecting Movement Trajectories Through Fragmentation

Download
364 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-11569-6_24,
        author={Marius Wernke and Frank D\'{y}rr and Kurt Rothermel},
        title={Protecting Movement Trajectories Through Fragmentation},
        proceedings={Mobile and Ubiquitous Systems: Computing, Networking, and Services. 10th International Conference, MOBIQUITOUS 2013, Tokyo, Japan, December 2-4, 2013,  Revised Selected Papers},
        proceedings_a={MOBIQUITOUS},
        year={2014},
        month={12},
        keywords={Location management Fragmentation Trajectories Privacy},
        doi={10.1007/978-3-319-11569-6_24}
    }
    
  • Marius Wernke
    Frank Dürr
    Kurt Rothermel
    Year: 2014
    Protecting Movement Trajectories Through Fragmentation
    MOBIQUITOUS
    Springer
    DOI: 10.1007/978-3-319-11569-6_24
Marius Wernke1,*, Frank Dürr1,*, Kurt Rothermel1,*
  • 1: University of Stuttgart
*Contact email: marius.wernke@ipvs.uni-stuttgart.de, frank.duerr@ipvs.uni-stuttgart.de, kurt.rothermel@ipvs.uni-stuttgart.de

Abstract

Location-based applications (LBAs) like geo-social networks, points of interest finders, and real-time traffic monitoring applications have entered people’s daily life. Advanced LBAs rely on location services (LSs) managing movement trajectories of multiple users in a scalable fashion. However, exposing trajectory information raises user privacy concerns, in particular if LSs are non-trusted. For instance, an attacker compromising an LS can use the retrieved user trajectory for stalking, mugging, or to trace user movement. To limit the misuse of trajectory data, we present a new approach for the secure management of trajectories on non-trusted servers. Instead of providing the complete trajectory of a user to a single LS, we split up the trajectory into a set of fragments and distribute the fragments among LSs of providers. By distributing fragments, we avoid a single point of failure in case of compromised LSs, while different LBAs can still reconstruct the trajectory based on user-defined access rights.