LSTM-TrajGAN: A Deep Learning Approach to Trajectory Privacy Protection

Authors Jinmeng Rao , Song Gao , Yuhao Kang , Qunying Huang



PDF
Thumbnail PDF

File

LIPIcs.GIScience.2021.I.12.pdf
  • Filesize: 2.99 MB
  • 17 pages

Document Identifiers

Author Details

Jinmeng Rao
  • GeoDS Lab, Department of Geography, University of Wisconsin-Madison, WI, USA
Song Gao
  • GeoDS Lab, Department of Geography, University of Wisconsin-Madison, WI, USA
Yuhao Kang
  • GeoDS Lab, Department of Geography, University of Wisconsin-Madison, WI, USA
Qunying Huang
  • Department of Geography, University of Wisconsin-Madison, WI, USA

Cite As Get BibTex

Jinmeng Rao, Song Gao, Yuhao Kang, and Qunying Huang. LSTM-TrajGAN: A Deep Learning Approach to Trajectory Privacy Protection. In 11th International Conference on Geographic Information Science (GIScience 2021) - Part I. Leibniz International Proceedings in Informatics (LIPIcs), Volume 177, pp. 12:1-12:17, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2020) https://doi.org/10.4230/LIPIcs.GIScience.2021.I.12

Abstract

The prevalence of location-based services contributes to the explosive growth of individual-level trajectory data and raises public concerns about privacy issues. In this research, we propose a novel LSTM-TrajGAN approach, which is an end-to-end deep learning model to generate privacy-preserving synthetic trajectory data for data sharing and publication. We design a loss metric function TrajLoss to measure the trajectory similarity losses for model training and optimization. The model is evaluated on the trajectory-user-linking task on a real-world semantic trajectory dataset. Compared with other common geomasking methods, our model can better prevent users from being re-identified, and it also preserves essential spatial, temporal, and thematic characteristics of the real trajectory data. The model better balances the effectiveness of trajectory privacy protection and the utility for spatial and temporal analyses, which offers new insights into the GeoAI-powered privacy protection.

Subject Classification

ACM Subject Classification
  • Security and privacy → Privacy protections
  • Computing methodologies → Artificial intelligence
Keywords
  • GeoAI
  • Deep Learning
  • Trajectory Privacy
  • Generative Adversarial Networks

Metrics

  • Access Statistics
  • Total Accesses (updated on a weekly basis)
    0
    PDF Downloads

References

  1. Marc P Armstrong, Gerard Rushton, Dale L Zimmerman, et al. Geographically masking health data to preserve confidentiality. Statistics in Medicine, 18(5):497-525, 1999. Google Scholar
  2. Chi-Yin Chow and Mohamed F Mokbel. Trajectory privacy in location-based services and data publication. ACM SIGKDD Explorations Newsletter, 13(1):19-29, 2011. Google Scholar
  3. Yves-Alexandre De Montjoye, César A Hidalgo, Michel Verleysen, and Vincent D Blondel. Unique in the crowd: The privacy bounds of human mobility. Scientific reports, 3:1376, 2013. Google Scholar
  4. Qiang Gao, Fan Zhou, Kunpeng Zhang, Goce Trajcevski, Xucheng Luo, and Fengli Zhang. Identifying human mobility via trajectory embeddings. In IJCAI, pages 1689-1695, 2017. Google Scholar
  5. Song Gao, Jinmeng Rao, Xinyi Liu, Yuhao Kang, Qunying Huang, and Joseph App. Exploring the effectiveness of geomasking techniques for protecting the geoprivacy of twitter users. Journal of Spatial Information Science, 2019(19):105-129, 2019. Google Scholar
  6. Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. Generative adversarial nets. In Advances in neural information processing systems, pages 2672-2680, 2014. Google Scholar
  7. Marco Gruteser and Dirk Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In Proceedings of the 1st international conference on Mobile systems, applications and services, pages 31-42. ACM, 2003. Google Scholar
  8. Agrim Gupta, Justin Johnson, Li Fei-Fei, Silvio Savarese, and Alexandre Alahi. Social GAN: Socially acceptable trajectories with generative adversarial networks. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 2255-2264, 2018. Google Scholar
  9. Kristen H Hampton, Molly K Fitch, William B Allshouse, Irene A Doherty, Dionne C Gesink, Peter A Leone, Marc L Serre, and William C Miller. Mapping health data: Improved privacy protection with donut method geomasking. American Journal of Epidemiology, 172(9):1062-1069, 2010. Google Scholar
  10. Simon Haykin. Neural networks: a comprehensive foundation. Prentice Hall PTR, 1994. Google Scholar
  11. Qunying Huang and David WS Wong. Modeling and visualizing regular human mobility patterns with uncertainty: An example using twitter data. Annals of the Association of American Geographers, 105(6):1179-1197, 2015. doi:10.1080/00045608.2015.1081120. Google Scholar
  12. Qunying Huang and Yu Xiao. Geographic situational awareness: Mining tweets for disaster preparedness, emergency response, impact, and recovery. ISPRS International Journal of Geo-Information, 4(3):1549-1568, 2015. Google Scholar
  13. Krzysztof Janowicz, Song Gao, Grant McKenzie, Yingjie Hu, and Budhendra Bhaduri. GeoAI: Spatially explicit artificial intelligence techniques for geographic knowledge discovery and beyond, 2020. Google Scholar
  14. Carsten Keßler and Grant McKenzie. A geoprivacy manifesto. Transactions in GIS, 22(1):3-19, 2018. Google Scholar
  15. Mei-Po Kwan, Irene Casas, and Ben Schmitz. Protection of geoprivacy and accuracy of spatial information: How effective are geographical masks? Cartographica: The International Journal for Geographic Information and Geovisualization, 39(2):15-28, 2004. Google Scholar
  16. Jae Hyun Lee, Adam W Davis, Seo Youn Yoon, and K. G. Goulias. Activity space estimation with longitudinal observations of social media data. Transportation, 43(6):955-977, 2016. Google Scholar
  17. Mingxiao Li, Song Gao, Feng Lu, Huan Tong, and Hengcai Zhang. Dynamic estimation of individual exposure levels to air pollution using trajectories reconstructed from mobile phone data. International journal of environmental research and public health, 16(22):4522, 2019. Google Scholar
  18. Xi Liu, Hanzhou Chen, and Clio Andris. trajGANs: Using generative adversarial networks for geo-privacy protection of trajectory data (vision paper). In Location Privacy and Security Workshop 2018 in conjunction with GIScience '18, pages 1-7, 2018. Google Scholar
  19. Yu Liu, Xi Liu, Song Gao, Li Gong, Chaogui Kang, Ye Zhi, Guanghua Chi, and Li Shi. Social sensing: A new approach to understanding our socioeconomic environments. Annals of the Association of American Geographers, 105(3):512-530, 2015. Google Scholar
  20. Gengchen Mai, Krzysztof Janowicz, Bo Yan, Rui Zhu, Ling Cai, and Ni Lao. Multi-scale representation learning for spatial feature distributions using grid cells. In The Eighth International Conference on Learning Representations. openreview, 2020. Google Scholar
  21. Lucas May Petry, Camila Silva, Andrea Esuli, Chiara Renso, and Vania Bogorny. Marc: a robust method for multiple-aspect trajectory classification via space, time, and semantic embeddings. International Journal of Geographical Information Science, pages 1-23, 2020. Google Scholar
  22. Mehmet Ercan Nergiz, Maurizio Atzori, and Yucel Saygin. Towards trajectory anonymization: a generalization-based approach. In Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS, pages 52-61, 2008. Google Scholar
  23. Ben Niu, Qinghua Li, Xiaoyan Zhu, Guohong Cao, and Hui Li. Achieving k-anonymity in privacy-aware location-based services. In IEEE INFOCOM 2014-IEEE Conference on Computer Communications, pages 754-762. IEEE, 2014. Google Scholar
  24. Balaji Palanisamy and Ling Liu. Mobimix: Protecting location privacy with mix-zones over road networks. In 2011 IEEE 27th International Conference on Data Engineering, pages 494-505. IEEE, 2011. Google Scholar
  25. Yoo Min Park and Mei-Po Kwan. Individual exposure estimates may be erroneous when spatiotemporal variability of air pollution and human mobility are ignored. Health & place, 43:85-94, 2017. Google Scholar
  26. Dara E Seidl, Piotr Jankowski, and Ming-Hsiang Tsou. Privacy and spatial pattern preservation in masked GPS trajectory data. International Journal of Geographical Information Science, 30(4):785-800, 2016. Google Scholar
  27. Zheye Wang, Xinyue Ye, and Ming-Hsiang Tsou. Spatial, temporal, and content analysis of twitter for wildfire hazards. Natural Hazards, 83(1):523-540, 2016. Google Scholar
  28. Fengli Xu, Zhen Tu, Yong Li, Pengyu Zhang, Xiaoming Fu, and Depeng Jin. Trajectory recovery from ash: User privacy is not preserved in aggregated mobility data. In Proceedings of the 26th International Conference on World Wide Web, pages 1241-1250, 2017. Google Scholar
  29. Dingqi Yang, Daqing Zhang, Vincent W Zheng, and Zhiyong Yu. Modeling user activity preference by leveraging user spatial temporal characteristics in LBSNs. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 45(1):129-142, 2014. Google Scholar
  30. Fan Zhou, Qiang Gao, Goce Trajcevski, Kunpeng Zhang, Ting Zhong, and Fengli Zhang. Trajectory-user linking via variational autoencoder. In IJCAI, pages 3212-3218, 2018. Google Scholar
  31. Huaijie Zhu, Xiaochun Yang, Bin Wang, Leixia Wang, and Wang-Chien Lee. Private trajectory data publication for trajectory classification. In International Conference on Web Information Systems and Applications, pages 347-360. Springer, 2019. Google Scholar
Questions / Remarks / Feedback
X

Feedback for Dagstuhl Publishing


Thanks for your feedback!

Feedback submitted

Could not send message

Please try again later or send an E-mail