隐私保护技术

基于轨迹方向的轨迹隐私保护算法

  • 邱明 ,
  • 皮德常
展开
  • 南京航空航天大学 计算机科学与技术学院,南京210016
邱明,男,硕士研究生,主要从事隐私保护和数据挖掘的研究.E-mail:931682221@qq.com.

收稿日期: 2015-07-09

  网络出版日期: 2015-10-08

基金资助

国家自然科学基金民航联合基金(U1433116)、航空科学基金(20145752033)

Trajectory privacy preserving algorithm based on trajectory direction

  • QIU Ming ,
  • PI De-Chang
Expand

Received date: 2015-07-09

  Online published: 2015-10-08

摘要

给出了一种基于轨迹运行方向的轨迹隐私保护算法.在隐私保护中,假轨迹法是位置服务中一种广泛使用的有效方法,但在用户的连续运动中,用户发出服务请求的位置可能出现在轨迹中的任何一点,如何让生成的假轨迹更加逼真是一个不小的挑战.针对此问题,本文提出了基于轨迹方向的轨迹隐私保护算法TPPATD.采用此算法,中间服务器可以根据用户不同的隐私需求,形成不同相似度的假轨迹,从而降低用户轨迹被攻击者发现的概率.实验结果表明,与传统的随机生成法相比,TPPATD在用户的隐私要求较高时能够生成更多的假轨迹,而且生成的假轨迹与用户的真实轨迹更加逼真.

本文引用格式

邱明 , 皮德常 . 基于轨迹方向的轨迹隐私保护算法[J]. 华东师范大学学报(自然科学版), 2015 , 2015(5) : 88 -95 . DOI: 10.3969/j.issn.1000-5641.2015.05.007

Abstract

A trajectory privacy preserving algorithm based on trajectory direction is proposed. In privacypreserving, dummy is an effective method that was widely used in locationbased service, but in the continuous motion of the user, the user may sends a service request to the position in any point of a track, how to make the dummy looks more realistic is a huge challenge. To solve this problem, we proposed a Trajectory Privacy Preserving Algorithm Based on Trajectory Direction (TPPATD). The middle server can generate different dummies according to different privacy requirements. So as to reduce the probability of the user trajectory being exposed. The experimental results show that, compared with the traditional method of Random Pattern Scheme, Trajectory Privacy Preserving Algorithm Based on Trajectory Direction can generate more dummies when user’s privacy requirements is higher, and dummies are more realistic with the true trajectory.

参考文献

[1]CHOW C Y, MOKBEL M F. Queryaware location anonymization for road networks[J]. Geoinformatica. 2011, 15(3):571607.

[2]周傲英, 杨彬, 金澈清, 等. 基于位置的服务:架构与进展[J]. 计算机学报, 2011, 34(7):11551171.

[3]霍峥, 孟小峰. 轨迹隐私保护技术研究[J]. 计算机学报,2011.34(10):18201830.

[4]KIDO H, YANAGISAWA Y, SATOH T. Protection of location privacy using dummies for locationbased services[C]The 21st International Conference on Data Engineering Workshops.2005:1084.

[5]YOU T, PENG W, LEE W. Protecting moving trajectories with dummies[C]2007 International Conference on Mobile Data Management. Mannheim: IEEE, 2007: 278282.

[6]SWEENEY L. kanonymity: A model for protecting privacy[J]. International Journal on Uncertainty, Fuzziness and Knowledgebased Systems, 2002, 10(5):557570.

[7]TERROVITIS M, MAMOULIS N. Privacy preserving in the publication of trajectories[C]Proceedings of the 9th International Conference on Mobile Data Management (MDM 2008). Beijing: 2008:6572.

[8]ABUL O, ATZORI M, BONCHI F, et al. Hiding sensitive trajectory patterns[C]Proceedings of the 7th IEEE International Conference on Data Mining Workshops (ICDMW 2007). Singapore: 2007: 693698.

[9]GRUTESER M, LIU X. Protecting privacy in continuous locationtracking applications[J]. IEEE Security and Privacy, 2004, 2(2): 2834.

[10]KIDO H, YANAGISAWA Y, SATOH T. An anonymous communication technique using dummies for location based services[C]Proceedings of the 21st International Conference on Data Engineering Workshops. 2005:1248.

[11]BRINKHOFF T. Generating networkbased moving objects[C]The 12th International Conference on Scientific and Statistical Database Management. Washington: IEEE Computer Society, 2000:253255.
文章导航

/