期刊文献+

基于轨迹特征及动态邻近性的轨迹匿名方法研究 被引量:7

Research on Trajectory Privacy Preserving Method Based on Trajectory Characteristics and Dynamic Proximity
下载PDF
导出
摘要 移动社会网络的兴起以及移动智能终端的发展产生了大量的时空轨迹数据,发布并分析这样的时空数据有助于改善智能交通,研究商圈的动态变化等.然而,如果攻击者能够识别出轨迹对应的用户身份,将会严重威胁到用户的隐私信息.现有的轨迹匿名算法在度量相似性时仅考虑轨迹在采样点位置的邻近性,忽略轨迹位置的动态邻近性,因此产生的匿名轨迹集合可用性相对较低.针对这一问题,本文提出了邻域扭曲密度和邻域相似性的概念,充分考虑轨迹位置的动态邻近性,并分别提出了基于邻域相似性和邻域扭曲密度的轨迹匿名算法;前者仅考虑了轨迹位置的动态邻近性,后者不仅能衡量轨迹位置的动态邻近性,而且在聚类过程中通过最小化邻域扭曲密度来减少匿名集合的信息损失.最后,在合成轨迹数据集和真实轨迹数据集上的实验结果表明,本文提出的算法具有更高的数据可用性. The rise of mobile social networks as well as mobile intelligent terminal has generated a lot of spatial-temporal trajectory data, publishing and analyzing such data is essential to improve transportation, to understand the dynamics of the economy in a region, etc. However, it will be a serious threat to the user's privacy, if adversary is able to identify user's identity corresponding to the trajectory. While calculating similarity of trajectories, the existing methods consider only locations proximity of the sampling point in the trajectory, and ignore the dynamic proximity of locations in the trajectory. So the produced trajectory anonymity set has a low utility. To solve this problem, we first present the concept of neighborhood similarity and neighborhood distortion density to fully consider the dynamics proximity of locations in the trajectory, and then propose two algorithms, i.e., trajectory anonymity algorithm based on neighborhood similarity and trajectory anonymity algorithm based on trajectory neighborhood distortion density. The former one only considers the dynamics proximity of locations in the trajectory, while the latter one also reduces information loss of anonymous collection by minimizing neighborhood distortion density during the clustering process. Finally, experimental results on a synthetic data set and a real-life data set demonstrate that our method offers better utility than comparable previous proposals in the literature.
出处 《自动化学报》 EI CSCD 北大核心 2015年第2期330-341,共12页 Acta Automatica Sinica
基金 国家自然科学基金(61370083 61073041 61073043 61402126) 高等学校博士学科点专项科研基金(20112304110011 20122304110012)资助~~
关键词 隐私保护 轨迹匿名 动态邻近性 邻域相似性 邻域扭曲密度 Privacy preserving, trajectory anonymity, dynamic proximity, neighborhood similarity, neighborhood dis-tortion density
  • 相关文献

参考文献35

二级参考文献494

共引文献1001

同被引文献114

  • 1张昕,李晓光,王大玲,于戈.数据流中一种快速启发式频繁模式挖掘方法[J].软件学报,2005,16(12):2099-2105. 被引量:14
  • 2潘云鹤,王金龙,徐从富.数据流频繁模式挖掘研究进展[J].自动化学报,2006,32(4):594-602. 被引量:34
  • 3FUYU L, HUA K A, YING C. Query 1-diversity in Location-Based Services[C]//Proceedings of the Mobile Data Management: Systems, Services and Middleware, 2009 MDM '09 Tenth International Conference on, 2009: 436-442.
  • 4KHOSHGOZARAN A, SHAHABI C, SHIRANI-MEHR H. Location privacy: going beyond K-anonymity, cloaking and anonymizers[J]. Knowledge and Information Systems, 2011, 26(3): 435-465.
  • 5REBOLLO-MONEDERO D, FORNE J, Solanas A, et al. Private location-based information retrieval through user collaboration[J]. Computer Communications, 2010, 33(6): 762-774.
  • 6BONCHI F. Privacy Preserving Publication of Moving Object Data[M]. Springer-Verlag, 2009: 190-215.
  • 7BONCHI F, LAKSHMANAN L V S, WANG H. Trajectory anonymity in publishing personal mobility data[J]. SIGKDD Explor Newsl, 2011, 13(1): 30-42.
  • 8CHOW C Y, MOKBEL M F. Trajectory privacy in location-based services and data publication[J]. SIGKDD Explor Newsl, 2011, 13(1): 19-29.
  • 9BERESFORD A R, STAJANO F. Location privacy in pervasive computing[J]. Pervasive Computing, IEEE, 2003, 2(1): 46-55.
  • 10FREUDIGER J, SHOKRI R, HUBAUX J P. On the optimal placement of mix zones[C]//9th International Symposium, PETS 2009, Seattle, WA, USA, 2009: 216-234.

引证文献7

二级引证文献71

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部