{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,11]],"date-time":"2026-01-11T01:21:47Z","timestamp":1768094507303,"version":"3.49.0"},"reference-count":60,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2011,8,31]],"date-time":"2011-08-31T00:00:00Z","timestamp":1314748800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGKDD Explor. Newsl."],"published-print":{"date-parts":[[2011,8,31]]},"abstract":"<jats:p>The ubiquity of mobile devices with global positioning functionality (e.g., GPS and AGPS) and Internet connectivity (e.g., 3G andWi-Fi) has resulted in widespread development of location-based services (LBS). Typical examples of LBS include local business search, e-marketing, social networking, and automotive traffic monitoring. Although LBS provide valuable services for mobile users, revealing their private locations to potentially untrusted LBS service providers pose privacy concerns. In general, there are two types of LBS, namely, snapshot and continuous LBS. For snapshot LBS, a mobile user only needs to report its current location to a service provider once to get its desired information. On the other hand, a mobile user has to report its location to a service provider in a periodic or on-demand manner to obtain its desired continuous LBS. Protecting user location privacy for continuous LBS is more challenging than snapshot LBS because adversaries may use the spatial and temporal correlations in the user's location samples to infer the user's location information with higher certainty. Such user location trajectories are also very important for many applications, e.g., business analysis, city planning, and intelligent transportation. However, publishing such location trajectories to the public or a third party for data analysis could pose serious privacy concerns. Privacy protection in continuous LBS and trajectory data publication has increasingly drawn attention from the research community and industry. In this survey, we give an overview of the state-of-the-art privacy-preserving techniques in these two problems.<\/jats:p>","DOI":"10.1145\/2031331.2031335","type":"journal-article","created":{"date-parts":[[2011,9,13]],"date-time":"2011-09-13T12:43:18Z","timestamp":1315917798000},"page":"19-29","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":169,"title":["Trajectory privacy in location-based services and data publication"],"prefix":"10.1145","volume":"13","author":[{"given":"Chi-Yin","family":"Chow","sequence":"first","affiliation":[{"name":"City University of Hong Kong, Kowloon, Hong Kong"}]},{"given":"Mohamed F.","family":"Mokbel","sequence":"additional","affiliation":[{"name":"University of Minnesota, Minneapolis, MN, USA"}]}],"member":"320","published-online":{"date-parts":[[2011,8,31]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497446"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1367497.1367531"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2010.40"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1186725"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/11957454_23"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1867699.1867706"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.145"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/1784462.1784477"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1620585.1620591"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10707-010-0117-0"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1183471.1183500"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10707-009-0099-y"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02982-0_19"},{"key":"e_1_2_1_14_1","unstructured":"Dateline NBC. Tracing a stalker. http:\/\/www.msnbc.msn.com\/id\/19253352 June 2007.  Dateline NBC. Tracing a stalker. http:\/\/www.msnbc.msn.com\/id\/19253352 June 2007."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/11428572_10"},{"key":"e_1_2_1_16_1","unstructured":"FoxNews. Man accused of stalking ex-girlfriend with GPS. http:\/\/www.foxnews.com\/story\/0 2933 131487 00.html September 2004.  FoxNews. Man accused of stalking ex-girlfriend with GPS. http:\/\/www.foxnews.com\/story\/0 2933 131487 00.html September 2004."},{"key":"e_1_2_1_17_1","volume-title":"Proceedings of the International Workshop on Wireless Networking for Intelligent Transportation Systems","author":"Freudiger J.","year":"2007","unstructured":"J. Freudiger , M. Raya , M. Felegyhazi , P. Papadimitratos , and J.-P. Hubaux . Mix-zones for location privacy in vehicular networks . In Proceedings of the International Workshop on Wireless Networking for Intelligent Transportation Systems , 2007 . J. Freudiger, M. Raya, M. Felegyhazi, P. Papadimitratos, and J.-P. Hubaux. Mix-zones for location privacy in vehicular networks. In Proceedings of the International Workshop on Wireless Networking for Intelligent Transportation Systems, 2007."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03168-7_13"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1749603.1749605"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2007.1062"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376631"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242623"},{"key":"e_1_2_1_23_1","volume-title":"Proceedings of the International Symposium on Spatial and Temporal Databases","author":"G.","year":"2007","unstructured":"G. Ghinita1, P. Kalnis , and S. Skiadopoulos . MobiHide: A mobile peer-to-peer system for anonymous locationbased queries . In Proceedings of the International Symposium on Spatial and Temporal Databases , 2007 . G. Ghinita1, P. Kalnis, and S. Skiadopoulos. MobiHide: A mobile peer-to-peer system for anonymous locationbased queries. In Proceedings of the International Symposium on Spatial and Temporal Databases, 2007."},{"key":"e_1_2_1_24_1","unstructured":"Google Geocoding API. http:\/\/code.google.com\/apis\/maps\/documentation\/geocoding\/.  Google Geocoding API. http:\/\/code.google.com\/apis\/maps\/documentation\/geocoding\/."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066116.1189037"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-32004-3_19"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.62"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/990064.990087"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2006.15"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1670679.1670682"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.190662"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/1784462.1784476"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERSER.2005.1506394"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDEW.2007.4400994"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.101"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.139"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1859995.1860017"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"key":"e_1_2_1_39_1","volume-title":"July 14, 2010.","author":"Marist Institute for Public Opinion (MIPO).","unstructured":"Marist Institute for Public Opinion (MIPO). Half of Social Networkers Online Concerned about Privacy. http:\/\/maristpoll.marist.edu\/714-half-of-social-networkers-online-concerned-about-privacy\/ . July 14, 2010. Marist Institute for Public Opinion (MIPO). Half of Social Networkers Online Concerned about Privacy. http:\/\/maristpoll.marist.edu\/714-half-of-social-networkers-online-concerned-about-privacy\/. July 14, 2010."},{"key":"e_1_2_1_40_1","volume-title":"Proceedings of the International Conference on Very Large Data Bases","author":"Mokbel M. F.","year":"2006","unstructured":"M. F. Mokbel , C.-Y. Chow , and W. G. Aref . The new casper: Query procesing for location services without compromising privacy . In Proceedings of the International Conference on Very Large Data Bases , 2006 . M. F. Mokbel, C.-Y. Chow, and W. G. Aref. The new casper: Query procesing for location services without compromising privacy. In Proceedings of the International Conference on Very Large Data Bases, 2006."},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1594139.1594150"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.48"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.5555\/1556406.1556410"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2011.5767898"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653771.1653808"},{"key":"e_1_2_1_46_1","volume-title":"Proceedings of the Workshop on Design Issues in Anonymity and Unobservability","author":"Pfitzmann A.","year":"2000","unstructured":"A. Pfitzmann and M. Kohntopp . Anonymity, unobservability, and pseudonymity - a proposal for terminology . In Proceedings of the Workshop on Design Issues in Anonymity and Unobservability , 2000 . A. Pfitzmann and M. Kohntopp. Anonymity, unobservability, and pseudonymity - a proposal for terminology. In Proceedings of the Workshop on Design Issues in Anonymity and Unobservability, 2000."},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.1979.1102177"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/69.971193"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1142\/S021848850200165X"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_2_1_51_1","unstructured":"USA Today. Authorities: GPS system used to stalk woman. http:\/\/www.usatoday.com\/tech\/news\/2002-12-30-gps-stalker_x.htm December 2002.  USA Today. Authorities: GPS system used to stalk woman. http:\/\/www.usatoday.com\/tech\/news\/2002-12-30-gps-stalker_x.htm December 2002."},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2006.1652998"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.14778\/1687627.1687745"},{"key":"e_1_2_1_54_1","unstructured":"Webroot Software Inc. Webroot survey finds geolocation apps prevalent amongst mobile device users but 55% concerned about loss of privacy. http:\/\/pr.webroot.com\/threat-research\/cons\/social-networks-mobile-security-071310.html. July 13 2010.  Webroot Software Inc. Webroot survey finds geolocation apps prevalent amongst mobile device users but 55% concerned about loss of privacy. http:\/\/pr.webroot.com\/threat-research\/cons\/social-networks-mobile-security-071310.html. July 13 2010."},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/1739041.1739060"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/1341012.1341062"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.103"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497445"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2007.58"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10707-008-0047-2"}],"container-title":["ACM SIGKDD Explorations Newsletter"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2031331.2031335","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2031331.2031335","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:48:33Z","timestamp":1750240113000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2031331.2031335"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,8,31]]},"references-count":60,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,8,31]]}},"alternative-id":["10.1145\/2031331.2031335"],"URL":"https:\/\/doi.org\/10.1145\/2031331.2031335","relation":{},"ISSN":["1931-0145","1931-0153"],"issn-type":[{"value":"1931-0145","type":"print"},{"value":"1931-0153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,8,31]]},"assertion":[{"value":"2011-08-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}