
ACSAC ’22, December 5–9, 2022, Austin, TX, USA Erik Buchholz, Alsharif Abuadbba, Shuo Wang, Surya Nepal, and Salil S. Kanhere
they do not take geographical constraints into consideration [
37
].
For instance, protected trajectories of cars do not follow roads or
ship trajectories pass over land. To highlight the risk posed by
current publication mechanisms, we address the research question:
RQ1.
Can an adversary (partly) reconstruct trajectories from a
dierential private trajectory release?
We nd that the dierential private mechanisms, such as the Sam-
pling Distance and Direction (SDD) approach [
23
], yield trajectories
that are structurally distinguishable from unperturbed trajectories.
By exploiting these characteristics, we propose a novel Long Short-
Term Memory (LSTM)-based Reconstruction Attack on Protected
Trajectories (RAoPT) to address the dened research question
RQ1
.
The RAoPT model receives trajectories protected with a dierential
private publication mechanism as input and outputs reconstructed
trajectories which are closer to the original trajectories.
Our attack is evaluated on two real-world GPS datasets, the T-
Drive [
59
], and the GeoLife [
60
] dataset. We evaluate the reduction
of the Euclidean and Hausdor distances between the recovered
and original trajectories compared to the distances between the
protected and original trajectories. These metrics are commonly
used to measure the distance between trajectories [
22
,
23
,
28
,
33
,
49
,
52
,
52
]. We also measure the increase of the Jaccard index of the
trajectories’ convex hulls before and after reconstruction, as the
convex hull can represent a trajectory’s activity space, i.e., the area
in which a user is active [
27
]. A small physical distance to a victim
represents a security threat in various settings, e.g., stalkers can
follow or intercept a victim [18], or pirates can plan attacks [23].
For an adversary with knowledge about the used protection
method and access to ground truth trajectories for the training, our
RAoPT model can reduce both distances even for privacy settings
with very high privacy guarantees (
𝜀≤
0
.
1) by over
98 %
in case of
Laplace noise-based protection and by
68 %
to
84 %
considering a
state-of-the-art protection mechanism. In these settings, the Jaccard
index is increased by at least
180 %
. In the realistic scenario that the
adversary knows about the protection method (SDD with
𝜀=
0
.
1)
but no ground truth for training is accessible, the Euclidean distance
can still be reduced by approx.
40
to
61 %
, and the Hausdor distance
by approx.
62 %
to
67 %
when transferring from one dataset to
the other. Even an adversary without background knowledge can
achieve reductions of over 60 % in some settings.
Contributions. Our main contributions are as follows:
•
We propose the rst LSTM-based reconstruction attack on
dierential private protected trajectories.
•
The RAoPT model can reduce the Euclidean and Hausdor
distances by over
68 %
on T-Drive trajectories protected with
the Laplace mechanism or a state-of-the-art protection mech-
anism and 𝜀≤1, decreasing the provided level of privacy.
•
We show the real-world applicability of the attack via two
datasets, namely T-Drive [
59
] and GeoLife [
60
], with dier-
ent granularities and transport modes.
•
We open-source our RAoPT model
1
including the considered
protection mechanisms and pre-processing scripts.
1Our source code is available at: https://github.com/erik-buchholz/RAoPT
This article is organised as follows. We introduce the required
background knowledge in Section 2 and dene our problem state-
ment and threat model in Sections 2.3 and 2.4, respectively. In
Section 3, we discuss related work addressing attacks on protection
mechanisms, and approaches utilising deep learning for trajectory
protection. Then, we introduce our proposed RAoPT model in Sec-
tion 4. In Section 5, we provide implementation details and show
the results of our evaluations. Subsequently, we discuss our ndings
in Section 6. Finally, we conclude this paper in Section 7.
2 PRELIMINARIES
In Section 2.1, we rst dene the term location trajectory and provide
some general knowledge on trajectory protection mechanisms. The
SDD mechanism, which is used for the evaluation of our attack,
is explained in Section 2.2. In Section 2.3, we state our problem
statement, and in Section 2.4, we present our threat model. We refer
readers not familiar with dierential privacy to Appendix B.
2.1 Location Trajectory Protection
A location trajectory
𝑇
consists of a sequence of locations
𝑇=
(𝑡1, . . . , 𝑡𝑛)
. In the most basic case, each location consists of two
values
𝑡𝑖=(𝑥𝑖, 𝑦𝑖)
which can either represent the location within a
reference (coordinate) system or latitude and longitude. For exact
localisation, the altitude or elevation can be added to latitude and
longitude as a third coordinate. Many trajectory datasets record
atimestamp for each location [
59
,
60
]. Lastly, trajectories can be
enhanced by semantic information [55], such as Point of Interests
(POIs), i.e., the knowledge of whether a location within a trajectory
represents a restaurant, shop, or gym. While such additional infor-
mation can increase the utility of a dataset for analyses, semantic
information can be exploited for attacks such as Trajectory User
Linking (TUL) [
34
,
55
]. Semantic information can also be added to
a dataset retrospectively, e.g., by matching the location points of a
trajectory against semantic datasets, such as OpenStreetMap [9].
Protection mechanisms for the release of trajectory datasets tar-
get two dierent scenarios. In the rst scenario, a dataset of multiple
trajectories is released, each trajectory represents one record of
the dataset. Second, one trajectory represents a database and each
location can be considered as one record. Moreover, protection
mechanisms either rely on
𝑘
-anonymity and related privacy no-
tions, or on dierential privacy.
𝐾
-Anonymity follows the intuition
of hiding one user in a crowd of users. While this class of privacy
notion is very intuitive, it cannot provide strong privacy guarantees
[
6
,
7
,
18
,
24
,
33
]. Background knowledge can be exploited to derive
knowledge from the protected dataset even when a dataset pro-
vides
𝑘
-anonymity or a similar notion. Therefore, much research
has focused on dierential privacy (cf. Appendix B for details).
The dierential private SDD [
23
] mechanism is described in the
following section, as we use this mechanism for our evaluation.
2.2 Sampling Distance and Direction
The Sampling Distance and Direction (SDD) mechanism is one ap-
proach to publish location trajectories while providing dierential
privacy. We consider the SDD mechanism as one target for our
reconstruction attack because the mechanism can provide signi-
cantly better utility than the standard Laplace mechanism [
23
]. SDD