Science, Technology, Engineering and Mathematics.
Open Access

SEMANTIC PRIVACY RISKS IN SOCIAL TRAJECTORY PUBLICATION

Download as PDF

Volume 7, Issue 7, Pp 66-70, 2025

DOI: https://doi.org/10.61784/jcsee3103

Author(s)

ZhenZhen Wu, YanFei Yuan*

Affiliation(s)

College of Cyber Security, Tarim University, Alar 843301, Xinjiang, China.

Corresponding Author

YanFei Yuan

ABSTRACT

The publication of trajectory data in mobile applications raises significant privacy concerns for users. When combined with behavioral pattern analysis, the semantic similarity of published trajectories can be exploited by attackers to infer users' travel motivations, posing substantial risks to personal privacy. In this paper, we simulate such attacks by proposing an observation-based algorithm to infer user travel behavior and develop a corresponding privacy risk quantification mechanism. Extensive experiments on real-world datasets validate the effectiveness of the proposed risk quantification approach, providing a foundation for the further development of semantic privacy protection schemes.

KEYWORDS

Mobile application; Behavioral semantics; Privacy inference; Risk quantification

CITE THIS PAPER

ZhenZhen Wu, YanFei Yuan. Semantic privacy risks in social trajectory publication. Journal of Computer Science and Electrical Engineering. 2025, 7(7): 66-70. DOI: https://doi.org/10.61784/jcsee3103.

REFERENCES

[1] Qiu G, Tang G, Li C, et al. Differentiated location privacy protection in mobile communication services: A survey from the semantic perception perspective. ACM Computing Surveys(CSUR), 2023, 56(3): 1-36.

[2] Jiang H, Li J, Zhao P, et al. Location privacy-preserving mechanisms in location-based services: A comprehensive survey. ACM Computing Surveys(CSUR), 2021, 54(1): 1-36.

[3] Zheng Y. Trajectory data mining: an overview. ACM Transactions on Intelligent Systems and Technology(TIST), 2015, 6(3): 1-41.

[4] Jin X, Zhang R, Chen Y, et al. Dpsense: Differentially private crowdsourced spectrum sensing. In Proceedings of the 23rd ACM SIGSAC Conference on Computer and Communications Security(CCS), Vienna, Austria, 2016: 296-307.

[5] Primault V, Boutet A, Mokhtar SB, et al. The long road to computational location privacy: A survey. IEEE Communications Surveys and Tutorials, 2019, 21(3): 2772-2793.

[6] Zhang J, Li C, Wang B. A performance tunable cpir-based privacy protection method for location based service. Information Sciences, 2022, 589: 440-458.

[7] Zhao W, Zhou N, Zhang W, et al. A probabilistic lifestyle-based trajectory model for social strength inference from human trajectory data. IEEE Transactions on Information System, 2016, 35(1): 1-28.

[8] Song C, Raghunathan A. Information leakage in embedding models. In Proceedings of the 27th ACM SIGSAC Conference on Computer and Communications Security(CCS), Gather.town, virtual platform, 2020: 377-390.

[9] Andrés ME, Bordenabe NE, Chatzikokolakis K, et al. Geo-indistinguishability: Differential privacy for location-based systems. In Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, 2013: 901-914.

[10] Dai Y, Shao J, Zhang D. Personalized semantic trajectory privacy preservation through trajectory reconstruction. World Wide Web, 2018, 21(4): 875-914.

[11] Qiu G, Guo D, Shen Y, et al. Mobile semantic-aware trajectory for personalized location privacy preservation. IEEE Internet of Things Journal, 2020, 8(21): 16165-16180.

[12] Qiu G, Tang G, Li C, et al. Behavioral-semantic privacy protection for continual social mobility in mobile internet services. IEEE Internet of Things Journal, 2024, 11(1): 462-477.

[13] Yang C, Sun M, Zhao WX, et al. A neural network approach to jointly modeling social networks and mobile trajectories. IEEE Transactions on Information System, 2017, 35(4): 1-28.

[14] Phan N, Wang Y, Wu X, et al. Differential privacy preservation for deep auto-encoders: an application of human behavior prediction. In Proceedings of the 30th AAAI Conference on Artificial Intelligence, Phoenix, Arizona USA, 2016: 1309-1316.

All published work is licensed under a Creative Commons Attribution 4.0 International License. sitemap
Copyright © 2017 - 2025 Science, Technology, Engineering and Mathematics.   All Rights Reserved.