{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T02:38:36Z","timestamp":1776220716837,"version":"3.50.1"},"reference-count":47,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2018,2,7]],"date-time":"2018-02-07T00:00:00Z","timestamp":1517961600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Shenzhen Technology Development Grant","award":["CXZZ20150813155917544"],"award-info":[{"award-number":["CXZZ20150813155917544"]}]},{"name":"Shenzhen Fundamental Research Foundation Grant","award":["JCYJ20150630114942277"],"award-info":[{"award-number":["JCYJ20150630114942277"]}]},{"name":"Guangdong Province Research Grant","award":["2015A030310364"],"award-info":[{"award-number":["2015A030310364"]}]},{"name":"CAS-TWAS President's Fellowship for International Ph.D. students"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IJGI"],"abstract":"<jats:p>How can training performance data (e.g., running or walking routes) be collected, measured, and published in a mobile program while preserving user privacy? This question is becoming important in the context of the growing use of reward-based location-based service (LBS) applications, which aim to promote employee training activities and to share such data with insurance companies in order to reduce the healthcare insurance costs of an organization. One of the main concerns of such applications is the privacy of user trajectories, because the applications normally collect user locations over time with identities. The leak of the identified trajectories often results in personal privacy breaches. For instance, a trajectory would expose user interest in places and behaviors in time by inference and linking attacks. This information can be used for spam advertisements or individual-based assaults. To the best of our knowledge, no existing studies can be directly applied to solve the problem while keeping data utility. In this paper, we identify the personal privacy problem in a reward-based LBS application and propose privacy architecture with a bounded perturbation technique to protect user\u2019s trajectory from the privacy breaches. Bounded perturbation uses global location set (GLS) to anonymize the trajectory data. In addition, the bounded perturbation will not generate any visiting points that are not possible to visit in real time. The experimental results on real-world datasets demonstrate that the proposed bounded perturbation can effectively anonymize location information while preserving data utility compared to the existing methods.<\/jats:p>","DOI":"10.3390\/ijgi7020053","type":"journal-article","created":{"date-parts":[[2018,2,7]],"date-time":"2018-02-07T12:20:29Z","timestamp":1518006029000},"page":"53","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["An Effective Privacy Architecture to Preserve User Trajectories in Reward-Based LBS Applications"],"prefix":"10.3390","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0929-6499","authenticated-orcid":false,"given":"A","family":"Hasan","sequence":"first","affiliation":[{"name":"Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences, Shenzhen 518055, China"},{"name":"Shenzhen College of Advanced Technology, University of Chinese Academy of Sciences, Shenzhen 518055, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5814-8460","authenticated-orcid":false,"given":"Qiang","family":"Qu","sequence":"additional","affiliation":[{"name":"Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences, Shenzhen 518055, China"}]},{"given":"Chengming","family":"Li","sequence":"additional","affiliation":[{"name":"Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences, Shenzhen 518055, China"}]},{"given":"Lifei","family":"Chen","sequence":"additional","affiliation":[{"name":"College of Mathematics and Computer Science, Fujian Normal University, Fuzhou 350117, China"}]},{"given":"Qingshan","family":"Jiang","sequence":"additional","affiliation":[{"name":"Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences, Shenzhen 518055, China"}]}],"member":"1968","published-online":{"date-parts":[[2018,2,7]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Mattke, S., Liu, H., Caloyeras, J.P., Huang, C.Y., Van Busum, K.R., Khodyakov, D., and Shier, V. (2013). Workplace Wellness Programs Study, Rand Corporation.","DOI":"10.7249\/RR254"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Raij, A., Ghosh, A., Kumar, S., and Srivastava, M. (2011, January 7\u201312). Privacy risks emerging from the adoption of innocuous wearable sensors in the mobile environment. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Vancouver, BC, Canada.","DOI":"10.1145\/1978942.1978945"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Choi, H., Chakraborty, S., Charbiwala, Z.M., and Srivastava, M.B. (2011). Sensorsafe: a framework for privacy-preserving management of personal sensory information. Secure Data Management, Springer.","DOI":"10.1007\/978-3-642-23556-6_6"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Issa, H., Shafaee, A., Agne, S., Baumann, S., and Dengel, A. (2015, January 20\u201322). User-sentiment based evaluation for market fitness trackers-evaluation of fitbit one, jawbone up and nike+ fuelband based on amazon.com customer reviews. Proceedings of the 1st International Conference on Information and Communication Technologies for Ageing Well and e-Health, ICT4AgeingWell 2015, Lisbon, Portugal.","DOI":"10.5220\/0005447401710179"},{"key":"ref_5","unstructured":"Plarre, K., Raij, A., Hossain, S.M., Ali, A.A., Nakajima, M., al\u2019Absi, E., Ertin, T., Kamarck, T., Kumar, S., and Scott, M. (2011, January 12\u201314). Continuous inference of psychological stress from sensory measurements collected in the natural environment. Proceedings of the 2011 10th International Conference on Information Processing in Sensor Networks (IPSN), Chicago, IL, USA."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Reddy, S., Burke, J., Estrin, D., Hansen, M., and Srivastava, M. (October, January 28). Determining transportation mode on mobile phones. Proceedings of the 12th IEEE International Symposium on Wearable Computers, ISWC 2008, Pittsburgh, PA, USA.","DOI":"10.1109\/ISWC.2008.4911579"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Kotz, D., Avancha, S., and Baxi, A. (2009, January 13). A privacy framework for mobile health and home-care systems. Proceedings of the First ACM Workshop on Security and Privacy in Medical and Home-Care Systems, Chicago, IL, USA.","DOI":"10.1145\/1655084.1655086"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Krumm, J. (2007). Inference attacks on location tracks. Pervasive Computing, Springer.","DOI":"10.1007\/978-3-540-72037-9_8"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1016\/j.trc.2016.09.017","article-title":"Meeting points in ridesharing: A privacy-preserving approach","volume":"72","author":"Gambs","year":"2016","journal-title":"Transp. Res. Part C Emerg. Technol."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Hasan, A.S.M.T., Jiang, Q., Li, C., and Chen, L. (2016, January 26\u201329). An effective model for anonymizing personal location trajectory. Proceedings of the 6th International Conference on Communication and Network Security, Singapore.","DOI":"10.1145\/3017971.3017986"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Hasan, A.S.M.T., Jiang, Q., and Li, C. (2017). An effective grouping method for privacy-preserving bike sharing data publishing. Future Internet, 9.","DOI":"10.3390\/fi9040065"},{"key":"ref_12","unstructured":"(2017, April 03). Citi Bike Daily Ridership and Membership Data. Available online: https:\/\/www.citibikenyc.com\/system-data."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Fan, L., Xiong, L., and Sunderam, V. (2013, January 22\u201327). Fast: Differentially private real-time aggregate monitor with filtering and adaptive sampling. Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data, New York, NY, USA.","DOI":"10.1145\/2463676.2465253"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Cao, Y., and Yoshikawa, M. (2015, January 15\u201318). Differentially private real-time data release over infinite trajectory streams. Proceedings of the 2015 16th IEEE International Conference on Mobile Data Management (MDM), Pittsburgh, PA, USA.","DOI":"10.1109\/MDM.2015.15"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"497","DOI":"10.1002\/(SICI)1097-0258(19990315)18:5<497::AID-SIM45>3.0.CO;2-#","article-title":"Geographically masking health data to preserve confidentiality","volume":"18","author":"Armstrong","year":"1999","journal-title":"Stat. Med."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1142\/S0218488502001648","article-title":"k-anonymity: A model for protecting privacy","volume":"10","author":"Sweeney","year":"2002","journal-title":"Int. J. Uncertain. Fuzz. Knowl. Based Syst."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/1217299.1217302","article-title":"L-diversity: Privacy beyond k-anonymity","volume":"1","author":"Machanavajjhala","year":"2007","journal-title":"ACM Trans. Knowl. Discov. Data"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Gambs, S., Killijian, M.-O., and del Prado Cortez, M.N. (2010, January 2). Show me how you move and i will tell you who you are. Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, San Jose, CA, USA.","DOI":"10.1145\/1868470.1868479"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Sun, Y., Xie, X., and Pan, H. (2015). An efficient method on trajectory privacy preservation. Big Data Computing and Communications, Springer.","DOI":"10.1007\/978-3-319-22047-5_19"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Langheinrich, M. (2001). Privacy by design principles of privacy aware ubiquitous Systems. International Conference on Ubiquitous Computing, Springer.","DOI":"10.1007\/3-540-45427-6_23"},{"key":"ref_21","first-page":"15","article-title":"Protection of geoprivacy and accuracy of spatial information: How effective are geographical masks?","volume":"39","author":"Kwan","year":"2004","journal-title":"Cartogr. Int. J. Geogr. Inform. Geovisual."},{"key":"ref_22","first-page":"C4","article-title":"Aol removes search data on vast group of web users","volume":"8","author":"Hansell","year":"2006","journal-title":"N. Y. Times"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Narayanan, A., and Shmatikov, V. (2009, January 17\u201320). De-anonymizing social networks. Proceedings of the 2009 30th IEEE Symposium on Security and Privacy, Oakland, CA, USA.","DOI":"10.1109\/SP.2009.22"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1007\/s00779-008-0212-5","article-title":"A survey of computational location privacy","volume":"13","author":"Krumm","year":"2009","journal-title":"Pers. Ubiquitous Comput."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"779","DOI":"10.1038\/nature06958","article-title":"Understanding individual human mobility patterns","volume":"453","author":"Gonzalez","year":"2008","journal-title":"Nature"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"1018","DOI":"10.1126\/science.1177170","article-title":"Limits of predictability in human mobility","volume":"327","author":"Song","year":"2010","journal-title":"Science"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Gkoulalas-Divanis, A., and Verykios, V. (2008). A free terrain model for trajectory k\u2013Anonymity. Database and Expert Systems Applications, Springer.","DOI":"10.1007\/978-3-540-85654-2_6"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"3219","DOI":"10.1002\/sec.1527","article-title":"An effective value swapping method for privacy preserving data publishing","volume":"9","author":"Hasan","year":"2016","journal-title":"Secur. Commun. Netw."},{"key":"ref_29","unstructured":"Pfitzmann, A., and Hansen, M. (2017, April 06). Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management-a Consolidated Proposal for Terminology; version v0.25, December 2005, Citeseer. Available online: https:\/\/www.freehaven.net\/anonbib\/cache\/terminology.pdf."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Gruteser, M., and Grunwald, D. (2003, January 5\u20138). Anonymous usage of location-based services through spatial and temporal cloaking. Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, San Francisco, CA, USA.","DOI":"10.1145\/1066116.1189037"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Domingo-Ferrer, J., Sramka, M., and Trujillo-Ras\u00faa, R. (2010, January 2). Privacy-preserving publication of trajectories using microaggregation. Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, San Jose, CA, USA.","DOI":"10.1145\/1868470.1868478"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Samarati, P., and Sweeney, L. (1998, January 1\u20133). Generalizing data to provide anonymity when disclosing information. Proceedings of the seventeenth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems, Seattle, DC, USA.","DOI":"10.1145\/275487.275508"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1109\/TBDATA.2015.2498156","article-title":"SMC: A practical schema for privacy-preserved data sharing over distributed data streams","volume":"1","author":"Liu","year":"2015","journal-title":"IEEE Trans. Big Data"},{"key":"ref_34","unstructured":"(2017, March 03). OpenStreetMap Contributors. Available online: https:\/\/www.openstreetmap.org."},{"key":"ref_35","unstructured":"Greenfeld, J.S. (2002, January 13\u201317). Matching gps observations to locations on a digital map. Proceedings of the Transportation Research Board 81st Annual Meeting, Washington, DC, USA."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Zheng, Y., Zhang, L., Xie, X., and Ma, W.-Y. (2009, January 20\u201324). Mining interesting locations and travel sequences from gps trajectories. Proceedings of the 18th International Conference on World Wide Web, Madrid, Spain.","DOI":"10.1145\/1526709.1526816"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Zheng, Y., Li, Q., Chen, Y., Xie, X., and Ma, W.-Y. (2008, January 21\u201324). Understanding mobility based on gps data. Proceedings of the 10th International Conference On Ubiquitous Computing, Seoul, Korea.","DOI":"10.1145\/1409635.1409677"},{"key":"ref_38","unstructured":"R Core Team (2015). R: A Language and Environment for Statistical Computing, R Foundation for Statistical Computing."},{"key":"ref_39","unstructured":"Eugster, M.J.A., and Schlesinger, T. (2017, January 04). osmar: OpenStreetMap and R Journal, 2010. Available online: http:\/\/osmar.r-forge.r-project.org\/RJpreprint.pdf."},{"key":"ref_40","unstructured":"Wickham, H., and Francois, R. (2017, January 04). dplyr: A Grammar of Data Manipulation, 2015, r Package Version 0.4.3. Available online: https:\/\/CRAN.R-project.org\/package=dplyr."},{"key":"ref_41","unstructured":"(2017, March 03). QGIS Development Team, QGIS Geographic Information System, Open Source Geospatial Foundation, 2009. Available online: http:\/\/qgis.osgeo.org."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Gonzalez, H., Halevy, A.Y., Jensen, C.S., Langen, A., Madhavan, J., Shapley, R., Shen, W., and Goldberg-Kidon, J. (2010, January 6\u201310). Google fusion tables: web-centered data management and collaboration. Proceedings of the 2010 ACM SIGMOD International Conference on Management of Data, Indianapolis, IN, USA.","DOI":"10.1145\/1807167.1807286"},{"key":"ref_43","unstructured":"Ester, M., Kriegel, H.-P., Sander, J., and Xu, X. (1996, January 2\u20134). A density-based algorithm for discovering clusters in large spatial databases with noise. Proceedings of the Second International Conference on Knowledge Discovery and Data Mining, Portland, Oregon."},{"key":"ref_44","unstructured":"Peixoto, D.A., and Xie, L. (2017, December 28). Mining Trajectory Data. Available online: https:\/\/www.researchgate.net\/profile\/Douglas_Peixoto\/publication\/275381558_Mining_Trajectory_Data\/links\/553b4e320cf245bdd76468c5.pdf."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1145\/2743025","article-title":"Trajectory data mining: An overview","volume":"6","author":"Zheng","year":"2015","journal-title":"ACM Trans. Intell. Syst. Technol."},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Li, Q., Zheng, Y., Xie, X., Chen, Y., Liu, W., and Ma, W.-Y. (2008, January 5\u20137). Mining user similarity based on location history. Proceedings of the 16th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, Irvine, CA, USA.","DOI":"10.1145\/1463434.1463477"},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Zhang, Q., Koudas, N., Srivastava, D., and Yu, T. (2007, January 15\u201320). Aggregate query answering on anonymized tables. Proceedings of the IEEE 23rd International Conference on Data Engineering, Istanbul, Turkey.","DOI":"10.1109\/ICDE.2007.367857"}],"container-title":["ISPRS International Journal of Geo-Information"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2220-9964\/7\/2\/53\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T14:54:04Z","timestamp":1760194444000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2220-9964\/7\/2\/53"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2,7]]},"references-count":47,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2018,2]]}},"alternative-id":["ijgi7020053"],"URL":"https:\/\/doi.org\/10.3390\/ijgi7020053","relation":{},"ISSN":["2220-9964"],"issn-type":[{"value":"2220-9964","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,2,7]]}}}