期刊文献+

基于异步信息的匿名移动数据集的用户身份识别

Identifying User's ID from Anonymous Mobility Trace Set via Asynchronous Side Information
下载PDF
导出
摘要 为了保护用户的隐私,大部分公开数据集都采用隐藏真实ID和引入噪声信息的方法来进行匿名处理。这些匿名处理即使在异步参考信息的攻击下也是脆弱的:即使只有部分位置信息暴露给攻击者并且暴露信息和公开数据集的收集过程不在同一时段内,攻击者依然能够识别出节点在公开数据集中的身份。首先,实验证明已有算法在异步信息情况下不适用;然后,提出针对异步信息的热点矩阵算法。采用3个真实移动数据集验证了识别算法的准确率。实验证明,热点矩阵法在异步信息条件下能够取得远高于已有方法的准确率。 With the development of social network applications,and to meet the demand of mobile system designing and scientific research, plenty of location trace information has been collected and published. Most public traces utilize the a- nonymous ID and adding noise to protect the privacy of users. However, these processes are vulnerable when facing a- synchronous attack. Even if partial information was exposed to adversary and the collections of side information and public trace set are not in the same duration, the adversary can also identify user's ID with high accuracy. Our experi- ment shows that the existing method is not applicable when facing asynchronous side information. A novel method ap- plicable in asynchronous condition was proposed which is called hot-matrix method. To verify this method, we employed experiments in three different mobility trace sets, whose subject is taxi, bus and human beings respectively. Experiments show that hot-matrix method performs much better than existing approach.
出处 《计算机科学》 CSCD 北大核心 2013年第11期89-93,共5页 Computer Science
基金 国家重点基础研究发展规划(973项目)(2009CB320705) 国家自然科学基金委创新研究群体科学基金项目(61021062) 国家自然科学基金项目(61003213 61073028)资助
关键词 匿名化 移动路径 异步信息 身份识别 地理空间热点 Anonymilization, Mobility trace, Identification, Geographical hot spots
  • 相关文献

参考文献14

  • 1Lba counts in apple store and android marketplace [OL]. ht- tp://www, skyhookwireless, com/locationapps/, 2010.
  • 2Quercia D, Lathia N, Calabrese F, et al. Recommending social e- vents from mobile phone location data[C]//Proceedings of the 2010 IEEE International Conference on Data Mining (ICDM' 10). Washington, DC, USA, 2010. IEEE Computer Society, 2010:971-976.
  • 3Sohn T, Li K A, Lee G, et al. Place-its A study of location-based reminders on mobile phones[C]//Fifth International Conference on Ubiquitous Computing (UbiComp' 05 ). Berlin, Heidelberg, 2005. Springer Verlag, 2005 : 232-250.
  • 4Gaonkar S, Li J, Choudhury R R, et al. Micro-biog: sharing and querying content through mobile phones and social participation[C]//Proceedings of the 6th international conference on Mobile systems, applications, and services (MobiSys 08). New York, NY, USA, 2008. ACM, 2008 : 174-186.
  • 5Motani M, Srinivasan V, Nuggehalli P S. Peoplenet.-engineering a wireless virtual soeial network[C] // Proceedings of the 11th annual international conference on Mobile computing and net- working(MobiCom' 05). New York, NY, USA, 2005. ACM, 2005 : 243-257.
  • 6NarayananA, ShmatikovV. De-anonymizingsocialnetworks[C]// Proceedings of the 2009 30th IEEE Symposium on Security and Privacy(SP' 09). Washington, DC, USA, 2009. IEEE Computer Society, 2009 : 173-187.
  • 7Sala A, Zhao X, Wilson C, et al. Sharing graphs using differenti- ally private graph models [C] /// Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference (IMC' 11). New York,NY,USA,2011. ACM,2011:81-98.
  • 8The foursquare website[OL], https,//foursquare, com/, 2012.
  • 9Piorkowski M, Sarafijanovic-Djukic N, Grossglauser M. CRAW- DAD data set epfl/mobility [OL]. http://crawdad, es. dart- mouth, edu/epfl/mobility, 2009-02-24.
  • 10Eagle N, Pentland A. Reality mining sensing complex social sys- tems[J]. Personal and Ubiquitous Computing, 2006,10(4) : 255- 268.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部