给出了一种基于轨迹运行方向的轨迹隐私保护算法.在隐私保护中,假轨迹法是位置服务中一种广泛使用的有效方法,但在用户的连续运动中,用户发出服务请求的位置可能出现在轨迹中的任何一点,如何让生成的假轨迹更加逼真是一个不小的挑战.针对此问题,本文提出了基于轨迹方向的轨迹隐私保护算法TPPATD.采用此算法,中间服务器可以根据用户不同的隐私需求,形成不同相似度的假轨迹,从而降低用户轨迹被攻击者发现的概率.实验结果表明,与传统的随机生成法相比,TPPATD在用户的隐私要求较高时能够生成更多的假轨迹,而且生成的假轨迹与用户的真实轨迹更加逼真.
A trajectory privacy preserving algorithm based on trajectory direction is proposed. In privacypreserving, dummy is an effective method that was widely used in locationbased service, but in the continuous motion of the user, the user may sends a service request to the position in any point of a track, how to make the dummy looks more realistic is a huge challenge. To solve this problem, we proposed a Trajectory Privacy Preserving Algorithm Based on Trajectory Direction (TPPATD). The middle server can generate different dummies according to different privacy requirements. So as to reduce the probability of the user trajectory being exposed. The experimental results show that, compared with the traditional method of Random Pattern Scheme, Trajectory Privacy Preserving Algorithm Based on Trajectory Direction can generate more dummies when user’s privacy requirements is higher, and dummies are more realistic with the true trajectory.
[1]CHOW C Y, MOKBEL M F. Queryaware location anonymization for road networks[J]. Geoinformatica. 2011, 15(3):571607.
[2]周傲英, 杨彬, 金澈清, 等. 基于位置的服务:架构与进展[J]. 计算机学报, 2011, 34(7):11551171.
[3]霍峥, 孟小峰. 轨迹隐私保护技术研究[J]. 计算机学报,2011.34(10):18201830.
[4]KIDO H, YANAGISAWA Y, SATOH T. Protection of location privacy using dummies for locationbased services[C]The 21st International Conference on Data Engineering Workshops.2005:1084.
[5]YOU T, PENG W, LEE W. Protecting moving trajectories with dummies[C]2007 International Conference on Mobile Data Management. Mannheim: IEEE, 2007: 278282.
[6]SWEENEY L. kanonymity: A model for protecting privacy[J]. International Journal on Uncertainty, Fuzziness and Knowledgebased Systems, 2002, 10(5):557570.
[7]TERROVITIS M, MAMOULIS N. Privacy preserving in the publication of trajectories[C]Proceedings of the 9th International Conference on Mobile Data Management (MDM 2008). Beijing: 2008:6572.
[8]ABUL O, ATZORI M, BONCHI F, et al. Hiding sensitive trajectory patterns[C]Proceedings of the 7th IEEE International Conference on Data Mining Workshops (ICDMW 2007). Singapore: 2007: 693698.
[9]GRUTESER M, LIU X. Protecting privacy in continuous locationtracking applications[J]. IEEE Security and Privacy, 2004, 2(2): 2834.
[10]KIDO H, YANAGISAWA Y, SATOH T. An anonymous communication technique using dummies for location based services[C]Proceedings of the 21st International Conference on Data Engineering Workshops. 2005:1248.
[11]BRINKHOFF T. Generating networkbased moving objects[C]The 12th International Conference on Scientific and Statistical Database Management. Washington: IEEE Computer Society, 2000:253255.