计算机科学

一种实时轨迹隐私保护策略

  • 廖春和 ,
  • 华嘉逊 ,
  • 田秀霞 ,
  • 秦波 ,
  • 金澈清
展开
  • 1. 华东师范大学 计算机科学与软件工程学院, 上海 200062;
    2. 上海电力学院 计算机科学与技术学院, 上海 201300;
    3. 中国人民大学 信息学院, 北京 100872
廖春和,男,硕士研究生,研究方向为基于位置的服务.E-mail:liaochunhe@stu.ecnu.edu.cn

收稿日期: 2017-06-19

  网络出版日期: 2018-07-19

基金资助

国家重点研发计划项目(2016YFB1000905);国家自然科学基金(61370101,61532021,61702423,U1501252,U1401256,61402180)

A strategy for real-time trajectory privacy protection

  • LIAO Chun-he ,
  • HUA Jia-xun ,
  • TIAN Xiu-xia ,
  • QIN Bo ,
  • JIN Che-qing
Expand
  • 1. School of Computer Science and Software Engineering, East China Normal University, Shanghai 200062, China;
    2. School of Computer Science and Technology, Shanghai University of Electric Power, Shanghai 201300, China;
    3. School of Information, Renmin University of China, Beijing 100872, China

Received date: 2017-06-19

  Online published: 2018-07-19

摘要

实时轨迹隐私问题是LBS(Location-BasedServices)领域的一个重要问题.虚假轨迹技术是一种流行的隐私保护技术,它产生多条与真实轨迹相似的虚假轨迹.然而,已有的虚假轨迹保护技术并未考虑用户所处的实际环境以及相邻时刻的位置关系等约束,从而使得攻击者很容易借助其他背景知识推测出用户的真实轨迹.因此,本文在所提出的两种全新隐私保护算法中应用了信息熵和位置可达性约束,这两种算法分别为虚假轨迹生成DTG(Dummy-Based TrajectoryGenerating)算法、增强型虚假轨迹生成EnDTG(Enhanced-DTG)算法.实验结果表明,相比于现有方案,本文所提的方案能有效保护用户的轨迹隐私.

本文引用格式

廖春和 , 华嘉逊 , 田秀霞 , 秦波 , 金澈清 . 一种实时轨迹隐私保护策略[J]. 华东师范大学学报(自然科学版), 2018 , 2018(4) : 59 -69,108 . DOI: 10.3969/j.issn.1000-5641.2018.04.006

Abstract

Real-time trajectory privacy protection is a key research topic in the field of location-based services (LBS). Dummy trajectory technology is a popular privacy protection method which generates multiple fake trajectories similar to real ones. However, existing schemes take into account neither the real environment nor the relationship between adjacent positions carefully; with the help of this ancillary information, the real trajectory can be inferred easily. Hence we integrate entropy and constraints on location reachability into our proposed schemes, named dummy-based trajectory generating (DTG) and enhanced-DTG (EnDTG). Experimental results show that both schemes offer a higher privacy level than existing ones.

参考文献

[1] LEI P R, PENG W C, SU I J, et al. Dummy-based schemes for protecting movement trajectories[J]. Journal of Information Science & Engineering, 2012, 28(2):335-350.
[2] NIU B, LI Q, ZHU X, et al. Achieving k-anonymity in privacy-aware location-based services[C]//IEEE Infocom 2014-IEEE Conference on Computer. IEEE, 2014:754-762. DOI:10.1109/INFOCOM.2014.6848002.
[3] CHOW C Y, MOKBEL M F. Trajectory privacy in location-based services and data publication[J]. ACM SIGKDD Explorations Newsletter, 2011, 13(1):19-29.
[4] CHOW C Y, MOKBEL M F, AREF W G. Casper*:Query processing for location services without compromising privacy[J]. ACM Transactions on Database Systems, 2009, 34(4):Article No 24. DOI:10.1145/1620585.1620591.
[5] GRUTESER M, GRUNWALD D. Anonymous usage of location-based services through spatial and temporal cloaking[C]//MobiSys 2003:The 1st International Conference on Mobile Systems, Applications, and Services. USENIX Association, 2003:31-42.
[6] MOKBEL M F, CHOW C Y, AREF W G. The new Casper:Query processing for location services without compromising privacy[C]//Proceedings of the 32nd International Conference on Very Large Data Bases. 2006:763-774.
[7] FREUDIGER J, SHOKRI R, HUBAUX J P. On the optimal placement of mix-zones[C]//International Symposium on Privacy Enhancing Technologies. Berlin:Springer, 2009:216-234.
[8] PALANISAMY B, LIU L. Attack-resilient mix-zones over road networks:Architecture and algorithms[J]. IEEE Transactions on Mobile Computing, 2015, 14(3):495-508.
[9] GHINITA G, DAMIANI M L, SILVESTRI C, et al. Preventing velocity-based linkage attacks in location-aware applications[C]//ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems. ACM, 2009:246-255.
[10] GHINITA G, KALNIS P, KHOSHGOZARAN A, et al. Private queries in location based services:Anonymizers are not necessary[C]//Proceeding the 2008 ACM SIGMOD International Conference on Management of Data. ACM, 2008:121-132.
[11] LU R X, LIN X D, SHI Z G, et al. PLAM:A privacy-preserving framework for local-area mobile social networks[C]//IEEE INFOCOM 2014-IEEE Conference on Computer Communications. IEEE, 2014:763-771.
[12] DAHL M, DELAUNE S, STEEL G. Formal analysis of privacy for vehicular mix-zones[C]//Proceedings of the Computer Security-ESORICS 2010, European Symposium on Research in Computer Security. DBLP, 2010:55-70.
[13] OLUMOFIN F, GOLDBERG I. Revisiting the computational practicality of private information retrieval[C]//International Conference on Financial Cryptography and Data Security. Berlin:Springer, 2011:158-172.
[14] XU T, CAI Y. Location anonymity in continuous location-based services[C]//Proceedings of the 15th Annual ACM International Symposium on Advances in Geographic Information Systems. ACM, 2007:Article No 39. DOI:10.1145/1341012.1341062.
[15] ABUL O, BONCHI F, NANNI M. Never walk alone:Uncertainty for anonymity in moving objects databases[C]//Proceedings of the 2008 IEEE 24th International Conference on Data Engineering. IEEE, 2008:376-385. DOI:10.1109/ICDE.2008.4497446.
[16] LIM N, MAJUMDAR S, SRIVASTAVA V. Security sieve:A technique for enhancing the performance of secure sockets layer-based distributed systems[J]. International Journal of Parallel Emergent and Distributed Systems, 2015, 31(5):1-23.
[17] KIDO H, YANAGISAWA Y, SATOH T. An anonymous communication technique using dummies for locationbased services[C]//International Conference on Pervasive Services. IEEE, 2005:88-97.
[18] XU T, CAI Y. Exploring Historical Location Data for Anonymity Preservation in Location-Based Services[C]//IEEE INFOCOM 2008-IEEE Conference on Computer Communications. IEEE, 2007:547-555.
[19] NIU B, LI Q, ZHU X, et al. Enhancing privacy through caching in location-based services[C]//IEEE Conference on Computer Communications. IEEE, 2015:1017-1025.
文章导航

/