A trajectory privacy preserving algorithm based on trajectory direction is proposed. In privacypreserving, dummy is an effective method that was widely used in locationbased service, but in the continuous motion of the user, the user may sends a service request to the position in any point of a track, how to make the dummy looks more realistic is a huge challenge. To solve this problem, we proposed a Trajectory Privacy Preserving Algorithm Based on Trajectory Direction (TPPATD). The middle server can generate different dummies according to different privacy requirements. So as to reduce the probability of the user trajectory being exposed. The experimental results show that, compared with the traditional method of Random Pattern Scheme, Trajectory Privacy Preserving Algorithm Based on Trajectory Direction can generate more dummies when user’s privacy requirements is higher, and dummies are more realistic with the true trajectory.
QIU Ming
,
PI De-Chang
. Trajectory privacy preserving algorithm based on trajectory direction[J]. Journal of East China Normal University(Natural Science), 2015
, 2015(5)
: 88
-95
.
DOI: 10.3969/j.issn.1000-5641.2015.05.007
[1]CHOW C Y, MOKBEL M F. Queryaware location anonymization for road networks[J]. Geoinformatica. 2011, 15(3):571607.
[2]周傲英, 杨彬, 金澈清, 等. 基于位置的服务:架构与进展[J]. 计算机学报, 2011, 34(7):11551171.
[3]霍峥, 孟小峰. 轨迹隐私保护技术研究[J]. 计算机学报,2011.34(10):18201830.
[4]KIDO H, YANAGISAWA Y, SATOH T. Protection of location privacy using dummies for locationbased services[C]The 21st International Conference on Data Engineering Workshops.2005:1084.
[5]YOU T, PENG W, LEE W. Protecting moving trajectories with dummies[C]2007 International Conference on Mobile Data Management. Mannheim: IEEE, 2007: 278282.
[6]SWEENEY L. kanonymity: A model for protecting privacy[J]. International Journal on Uncertainty, Fuzziness and Knowledgebased Systems, 2002, 10(5):557570.
[7]TERROVITIS M, MAMOULIS N. Privacy preserving in the publication of trajectories[C]Proceedings of the 9th International Conference on Mobile Data Management (MDM 2008). Beijing: 2008:6572.
[8]ABUL O, ATZORI M, BONCHI F, et al. Hiding sensitive trajectory patterns[C]Proceedings of the 7th IEEE International Conference on Data Mining Workshops (ICDMW 2007). Singapore: 2007: 693698.
[9]GRUTESER M, LIU X. Protecting privacy in continuous locationtracking applications[J]. IEEE Security and Privacy, 2004, 2(2): 2834.
[10]KIDO H, YANAGISAWA Y, SATOH T. An anonymous communication technique using dummies for location based services[C]Proceedings of the 21st International Conference on Data Engineering Workshops. 2005:1248.
[11]BRINKHOFF T. Generating networkbased moving objects[C]The 12th International Conference on Scientific and Statistical Database Management. Washington: IEEE Computer Society, 2000:253255.