Technical Papers
Jan 28, 2023

Privacy Protection Method for Cellular Signaling Data Based on Genetic Algorithm

Publication: Journal of Transportation Engineering, Part A: Systems
Volume 149, Issue 4

Abstract

Cellular signaling data (CSD) is a new data source of intelligent transportation and has great potential in the study of human mobility. However, research recently has shown that the privacy of individual trajectories of travelers can be easily leaked due to their unique travel patterns, which will lead to the disclosure of a traveler’s trajectory privacy. To address this issue, the risk of privacy leakage in a CSD data set was quantitatively measured due to reidentification attacks. To reduce the risk of trajectory privacy leakage, a spatial generalization method based on an improved genetic algorithm (IGA) was proposed. We transformed the base station aggregation problem that meets the k-anonymity requirement into a shortest path problem. The data utility loss after privacy preservation was evaluated based on origin–destination (OD) flow analysis of traffic analysis zones (TAZs). Finally, the relationships between privacy preservation and data utility were revealed. In all of the cases, more privacy protection corresponded to less data utility. The discovered relationships provide useful guidance for data publishers on how to choose the right tradeoff between privacy protection and data utility when publishing or sharing such sensitive data.

Get full access to this article

View all available purchase options and get full access to this article.

Data Availability Statement

Some or all data, models, or code that support the findings of this study are available from the corresponding author upon reasonable request.

Acknowledgments

This work was supported in part by the National Key R&D Program of China under Grant No. 2020YFB1600400, in part by the National Natural Science Foundation of China (Grant Nos. 12002403 and U1811463), in part by the Fundamental Research Funds for the Central Universities, Sun Yat-sen University (Grant No. 2021qntd08).

References

Abbasi, M., M. Rafiee, M. R. Khosravi, A. Jolfaei, V. G. Menon, and J. M. Koushyar. 2020. “An efficient parallel genetic algorithm solution for vehicle routing problem in cloud implementation of the intelligent transportation systems.” J. Cloud Comput. 9 (1): 1–14. https://doi.org/10.1186/s13677-020-0157-4.
Andrienko, G., N. Andrienko, F. Giannotti, A. Monreale, and D. Pedreschi. 2010. “Movement data anonymity through generalization.” Trans. Data Privacy 3 (2): 91–121.
Chen, X., X. Wan, Q. Li, F. Ding, C. McCarthy, Y. Cheng, and B. Ran. 2019. “Trip-chain-based travel-mode-shares-driven framework using cellular signaling data and web-based mapping service data.” Transp. Res. Rec. J. Transp. Res. Board 2673 (3): 51–64. https://doi.org/10.1177/0361198119834006.
Chin, K., H. Huang, C. Horn, I. Kasanicky, and R. Weibel. 2019. “Inferring fine-grained transport modes from mobile phone cellular signaling data.” Comput. Environ. Urban Syst. 77 (Sep): 101348. https://doi.org/10.1016/j.compenvurbsys.2019.101348.
de Montjoye, Y., C. A. Hidalgo, M. Verleysen, and V. D. Blondel. 2013. “Unique in the crowd: The privacy bounds of human mobility.” Sci. Rep. 3 (1): 1–5. https://doi.org/10.1038/srep01376.
Deville, P., C. Linard, S. Martin, M. Gilbert, F. R. Stevens, A. E. Gaughan, V. D. Blondel, and A. J. Tatem. 2014. “Dynamic population mapping using mobile phone data.” Proc. Nat. Acad. Sci. 111 (45): 15888–15893. https://doi.org/10.1073/PNAS.1408439111.
Domingo-Ferrer, J., and V. Torra. 2008. “A Critique of k-Anonymity and some of its enhancements.” In Proc., 3rd Int. Conf. on Availability, Reliability and Security, 990–993. Piscataway, NJ: IEEE. https://doi.org/10.1109/ARES.2008.97.
Dwork, C. 2008. Differential privacy: A survey of results. Berlin: Springer.
Friedrich, M., K. Immisch, P. Jehlicka, T. Otterstätter, and J. Schlaich. 2010. “Generating origin–destination matrices from mobile phone trajectories.” Transp. Res. Rec. J. Transp. Res. Board 2196 (1): 93–101. https://doi.org/10.3141/2196-10.
Gao, J., L. Sun, and M. Cai. 2019. “Quantifying privacy vulnerability of individual mobility traces: A case study of license plate recognition data.” Transp. Res. Part C: Emerging Technol. 104 (6): 78–94. https://doi.org/10.1016/j.trc.2019.04.022.
Hanaoka, K. 2016. “New insights on relationships between street crimes and ambient population: Use of hourly population data estimated from mobile phone travelers’ locations.” Environ. Plann. B: Urban Anal. City Sci. 45 (2): 295–311.
Hu, H., J. Xu, S. T. On, J. Du, and J. K. Ng. 2010. “Privacy-aware location data publishing.” ACM Trans. Database Syst. 35 (3): 1–42. https://doi.org/10.1145/1806907.1806910.
Huang, H., Y. Cheng, and R. Weibel. 2019. “Transport mode detection based on mobile phone network data: A systematic review.” Transp. Res. Part C: Emerging Technol. 101 (Apr): 297–312. https://doi.org/10.1016/j.trc.2019.02.008.
Jia, J., C. Liu, and T. Wan. 2019. “Planning of the charging station for electric vehicles utilizing cellular signaling data.” Sustainability 11 (3): 643. https://doi.org/10.3390/su11030643.
Jiang, S., G. Fiore, Y. Yang, J. J. Ferreira, E. Frazzoli, and M. González. 2013. “A review of urban computing for mobile phone traces: Current methods, challenges and opportunities.” In Proc., Int. Conf. on Knowledge Discovery and Data Mining, 1–9. New York: ACM Digital Library. https://doi.org/10.1145/2505821.2505828.
Kang, C., Y. Liu, X. Ma, and L. Wu. 2012. “Towards estimating urban population distributions from mobile call data.” J. Urban Technol. 19 (4): 3–21. https://doi.org/10.1080/10630732.2012.715479.
Li, H., Y. Wei, Y. Huang, Q. Cai, and J. Du. 2019. “Visual analytics of cellular signaling data.” Multimedia Tools Appl. 78 (20): 29447–29461. https://doi.org/10.1007/s11042-018-6966-5.
Li, S., T. Li, and S. Venkatasubramanian. 2007. “t-Closeness: Privacy beyond k-anonymity and diversity.” In Proc., Int. Conf. on Data Engineering, 106–115. Piscataway, NJ: IEEE. https://doi.org/10.1109/ICDE.2007.367856.
Li, Y., D. Yang, and X. Hu. 2020b. “A differential privacy-based privacy-preserving data publishing algorithm for transit smart card data.” Transp. Res. Part C: Emerging Technol. 115 (Jun): 102634. https://doi.org/10.1016/j.trc.2020.102634.
Li, Z., L. Yu, Y. Gao, Y. Wu, G. Song, and D. Gong. 2018. “Identifying temporal and spatial characteristics of residents’ trips from cellular signaling data: Case study of Beijing.” Transp. Res. Rec.: J. Transp. Res. Board 2672 (42): 81–90. https://doi.org/10.1177/0361198118793495.
Machanavajjhala, A., D. Kifer, J. Gehrke, and M. Venkitasubramaniam. 2007. “L-diversity.” ACM Trans. Knowl. Discovery Data 1 (1): 3. https://doi.org/10.1145/1217299.1217302.
Montjoye, M., L. Radaelli, V. K. Singh, and A. S. Pentland. 2015. “Unique in the shopping mall: On the reidentifiability of credit card metadata.” Science 347 (6221): 536–539. https://doi.org/10.1126/science.1256297.
Nergiz, M., M. Atzori, and Y. Saygin. 2009. “Towards trajectory anonymization: A generalization-based approach.” Trans. Data Privacy 2009 (1): 47–75. https://doi.org/10.1145/1503402.1503413.
Ni, L., X. C. Wang, and X. M. Chen. 2018. “A spatial econometric model for travel flow analysis and real-world applications with massive mobile phone data.” Transp. Res. Part C: Emerg. Technol. 86 (5): 510–526. https://doi.org/10.1016/j.trc.2017.12.002.
Raturi, V., J. Hong, D. P. McArthur, and M. Livingston. 2021. “The impact of privacy protection measures on the utility of crowdsourced cycling data.” J. Transp. Geogr. 92 (2021): 203020. https://doi.org/10.1016/j.jtrangeo.2021.103020.
Song, C., Z. Qu, N. Blumm, and A. Barabási. 2010. “Limits of predictability in human mobility.” Science 327 (5968): 1018–1021. https://doi.org/10.1126/science.1177170.
Sun, L., and Y. Yin. 2017. “Discovering themes and trends in transportation research using topic modeling.” Transp. Res. Part C 77 (Apr): 49–66. https://doi.org/10.1016/j.trc.2017.01.013.
Sun, Z., B. Zan, X. J. Ban, and M. Gruteser. 2013. “Privacy protection method for fine-grained urban traffic modeling using mobile sensors.” Transp. Res. Part B: Methodol. 56 (Oct): 50–69. https://doi.org/10.1016/j.trb.2013.07.010.
Sweeney, L. 2000. “Simple demographics often identify people uniquely.” Health (San Francisco) 671 (2000): 1–34.
Sweeney, L. 2002b. “k-anonymity: A model for protecting privacy.” Int. J. Uncertainty Fuzziness Knowledge-based Syst. 10 (5): 557–570. https://doi.org/10.1142/S0218488502001648.
Wang, W., and L. Yin. 2017. “Privacy protection method for mobile phone location data based on matching point sets of frequent activity locations.” Appl. Res. Comput. 34 (3): 867–870.
Yan, L., D. Wang, S. Zhang, and D. Xie. 2019. “Evaluating the multi-scale patterns of jobs-residence balance and commuting time–cost using cellular signaling data: A case study in Shanghai.” Transportation 46 (3): 777–792. https://doi.org/10.1007/s11116-018-9894-3.
Yin, L., Q. Wang, S. Shaw, Z. Fang, J. Hu, Y. Tao, and W. Wang. 2015. “Re-identification risk versus data utility for aggregated mobility research using mobile phone location data.” PLoS One 10 (10): e0140589. https://doi.org/10.1371/journal.pone.0140589.
Zang, H., and J. Bolot. 2011. “Anonymization of location data does not work: A large-scale measurement study.” In Proc., 17th Annual Int. Conf. on Mobile Computing and Networking, 145–156. New York: ACM Digital Library. https://doi.org/10.1145/2030613.2030630.
Zhong, G., X. Wan, J. Zhang, T. Yin, and B. Ran. 2017. “Characterizing passenger flow for a transportation hub based on mobile phone data.” IEEE Trans. Intell. Transp. Syst. 18 (6): 1507–1518. https://doi.org/10.1109/TITS.2016.2607760.
Zhu, T., Z. Song, D. Wu, and J. Yu. 2016. “A novel freeway traffic speed estimation model with massive cellular signaling data.” Int. J. Web Services Res. 13 (1): 69–87. https://doi.org/10.4018/IJWSR.2016010105.

Information & Authors

Information

Published In

Go to Journal of Transportation Engineering, Part A: Systems
Journal of Transportation Engineering, Part A: Systems
Volume 149Issue 4April 2023

History

Received: Nov 15, 2021
Accepted: Nov 7, 2022
Published online: Jan 28, 2023
Published in print: Apr 1, 2023
Discussion open until: Jun 28, 2023

Permissions

Request permissions for this article.

Authors

Affiliations

Office of Foshan Cyberspace Affairs Commission, Foshan Human Resources Public Service Center, Foshan 528000, PR China. ORCID: https://orcid.org/0000-0003-1397-2637. Email: [email protected]
Professor, School of Intelligent Systems Engineering, Sun Yat-sen Univ., Guangzhou 510275, PR China (corresponding author). Email: [email protected]
Postdoctoral Fellow, School of Intelligent Systems Engineering, Sun Yat-sen Univ., Guangzhou 510275, PR China. Email: [email protected]

Metrics & Citations

Metrics

Citations

Download citation

If you have the appropriate software installed, you can download article citation data to the citation manager of your choice. Simply select your manager software from the list below and click Download.

View Options

Get Access

Access content

Please select your options to get access

Log in/Register Log in via your institution (Shibboleth)
ASCE Members: Please log in to see member pricing

Purchase

Save for later Information on ASCE Library Cards
ASCE Library Cards let you download journal articles, proceedings papers, and available book chapters across the entire ASCE Library platform. ASCE Library Cards remain active for 24 months or until all downloads are used. Note: This content will be debited as one download at time of checkout.

Terms of Use: ASCE Library Cards are for individual, personal use only. Reselling, republishing, or forwarding the materials to libraries or reading rooms is prohibited.
ASCE Library Card (5 downloads)
$105.00
Add to cart
ASCE Library Card (20 downloads)
$280.00
Add to cart
Buy Single Article
$35.00
Add to cart

Get Access

Access content

Please select your options to get access

Log in/Register Log in via your institution (Shibboleth)
ASCE Members: Please log in to see member pricing

Purchase

Save for later Information on ASCE Library Cards
ASCE Library Cards let you download journal articles, proceedings papers, and available book chapters across the entire ASCE Library platform. ASCE Library Cards remain active for 24 months or until all downloads are used. Note: This content will be debited as one download at time of checkout.

Terms of Use: ASCE Library Cards are for individual, personal use only. Reselling, republishing, or forwarding the materials to libraries or reading rooms is prohibited.
ASCE Library Card (5 downloads)
$105.00
Add to cart
ASCE Library Card (20 downloads)
$280.00
Add to cart
Buy Single Article
$35.00
Add to cart

Media

Figures

Other

Tables

Share

Share

Copy the content Link

Share with email

Email a colleague

Share