隐私保护技术

保持数据可用性的细粒度轨迹隐私保护方案

  • 熊胜超 ,
  • 吴瑕 ,
  • 彭智勇
展开
  • 武汉大学 计算机学院, 武汉430072
熊胜超,男,硕士研究生,研究方向为数据库与数据挖掘. E-mail: shengchaoxiong91@whu.edu.cn

收稿日期: 2015-07-09

  网络出版日期: 2015-10-08

基金资助

武汉市创新研究团队项目(2014070504020237)

Finegrained privacypreserving framework while ensuring  data usability in trajectory databases

  • XIONG Sheng-Chao ,
  • WU Xia ,
  • PENG Zhi-Yong
Expand

Received date: 2015-07-09

  Online published: 2015-10-08

摘要

轨迹数据的隐私保护近年来越来越受到重视,现有的工作很少考虑不同的隐私敏感位置之间的区别,也较少考虑不同的轨迹应用之间的区别(例如保险推销和紧急救助). 鉴于轨迹数据用途的多样性以及用户个性化的隐私需求,本文提出了一种细粒度的基于标签的轨迹数据隐私保护方案,此方案能让用户够灵活自主地控制不同隐私敏感的轨迹片段对不同轨迹应用的访问授权. 此外,考虑到大部分的隐私敏感位置都与轨迹停留相关,为了合理地隐藏轨迹中不可见的采样点,本文提出了一种将不可见的隐私敏感轨迹片段中的位置采样点,合理散布到周围频繁访问的多个位置中的方法. 实验结果表明,本文提出的方法能够在有效保护轨迹隐私的同时只引入较小的额外计算负担. 

本文引用格式

熊胜超 , 吴瑕 , 彭智勇 . 保持数据可用性的细粒度轨迹隐私保护方案[J]. 华东师范大学学报(自然科学版), 2015 , 2015(5) : 96 -103 . DOI: 10.3969/j.issn.1000-5641.2015.05.008

Abstract

The privacy of trajectories has aroused a wide concern. In previous works, rarely have the differences between different sensitive locations been discussed, nor the differences between different applications (eg: for advertising and for emergencies). While in fact, some sensitive locations are more important and some applications ought to be granted the access. In this paper, to meet different privacy requirements and data utility requirements, we propose a finegrained privacypreserving framework which allows the users to specify which locations are visible to some applications and invisible to others at the same time. In addition, since most sensitive locations are relevant to stay points and a significant stay in a sensitive place may last longer than the ordinary places, we also propose an efficient approach to distribute invisible location samples along the nearby popular visit sequences. Experiment results indicate that our framework performs efficiently without introducing significant performance penalties.

参考文献

[1]PELEKIS N, GKOULALASDIVANIS A, VODAS M, et al. Privacyaware querying over sensitive trajectory data[C]Proceedings of the 20th ACM International Conference on Information and Knowledge Management. ACM, 2011: 895904.

[2]FERRAIOLO D F, SANDHU R, GAVRILA S, et al.Proposed NIST standard for rolebased access control[J]. ACM Transactions on Information and System Security (TISSEC), 2001, 4(3): 224274.

[3]BERTINO E, BONATTI P A, FERRARI E. TRBAC: A temporal rolebased access control model[J]. ACM Transactions on Information and System Security (TISSEC), 2001, 4(3): 191233.

[4]BERTINO E, CATANIA B, DAMIANI M L, et al. GEORBAC:A spatially aware RBAC [C]Proceedings of the  10th ACM Symposium on Access Control Models and Technologies. ACM, 2005: 2937.

[5]CHANDRAN S M, JOSHI J B D. LoTRBAC: A location and timebased RBAC model[M]Web Information Systems Engineering. Berlin: Springer, 2005: 361375.

[6]YOU T H, PENG W C, LEE W C. Protecting moving trajectories with dummies[C]Proceedings of the 2007 International Conference on Mobile Data Management. IEEE, 2007: 278282.

[7]TERROVITIS M, MAMOULIS N. Privacy preservation in the publication of trajectories[C]Proceedings of the 9th International Conference on Mobile Data Management.  IEEE, 2008: 6572.

[8]ABUL O, BONCHI F, NANNI M. Never walk alone: Uncertainty for anonymity in moving objects databases[C]Proceedings of the IEEE 24th International Conference on Data Engineering.  IEEE, 2008: 376385.

[9]KROHN M, YIP A, BRODSKY M, et al. Information flow control for standard OS abstractions[J]. ACM SIGOPS Operating Systems Review, 2007, 41(6): 321334.

[10]HUO Z, MENG X, HU H, et al. You can walk alone: Trajectory privacypreserving through significant stays protection[M]Database Systems for Advanced Applications. Berlin: Springer, 2012: 351366.

[11]XIE K, DENG K, ZHOU X. From trajectories to activities: A spatiotemporal join approach[C]Proceedings of the 2009 International Workshop on LocationBased Social Networks. ACM, 2009: 2532.
文章导航

/