期刊文献+

匿名集序列规则与转移概率矩阵的空间预测和实验 被引量:4

A Method of Spatial Prediction Based on Transition Probability Matrix and Sequential Rules of Spatial-temporal K-anonymity Datasets
原文传递
导出
摘要 随着位置服务(Location Based Service,LBS)的广泛应用,隐私保护成为LBS进一步深入发展亟待解决的问题,时空K-匿名成为一个主流方向。LBS应用服务器存储用户执行连续查询生成的历史匿名数据集,分析大时空尺度历史的匿名数据集,空间预测可以实现LBS应用的个性化服务。本文提出了一种融合概率统计与数据挖掘2种典型技术——马尔科夫链与序列规则,对匿名数据集中包含的特定空间区域进行预测的方法。方法包括4个过程:(1)分析序列规则、马尔科夫过程进行预测的特点;(2)以匿名数据集序列规则的均一化置信度为初始转移概率,构建n步转移概率矩阵;(3)设计以n步转移概率矩阵进行概略空间预测的方法,以及改进的指定精确路径的空间预测方法;(4)实验验证方法的性能。结果证明,该方法具有模型结构建立速度快、精确空间预测概率与真实概率的近似度可灵活调节等优点,具有可用性。 Recently, spatial-temporal K-anonymity has become a prominent method among a series of techniques for user privacy protection in Location Based Services (LBS) applications, because of its easy implementation and broad applicability. Analyzing spatial prediction scenarios based on spatial-temporal K- anonymity datasets is important in improving the utilization of LBS anonymity datasets for individualized services. In this paper, we present a spatial prediction method by combining the advantages of probabilistic statistics techniques and data mining techniques. The detailed process is divided into four phases: Phase 1, the predictive characteristics based on sequential rules and Markova chain are studied, and then an algorithm is designed to compute the n-step transition probability matrices of normalized sequential rules mined from sequences of spatial-temporal K-anonymity datasets; Phase 2, directly adopting the n-step transition probability matrices of example datasets, the simple predictions are performed; however, the drawback of this method is also found: the full path of the simple predictions cannot be learned, which is very important to the analysis of behavior patterns of LBS users; therefore in Phase 3, a precise predictive algorithm is designed, which recursively discovers the detailed k step path, its transition probability from the detailed k- 1 step, and the simple k step that includes the start and the stop node only; and in Phase 4, simulation expen'ments are conducted, while the experimental results demonstrate that the proposed approach can build the predictive model faster than traditional methods, and can also adjust the accuracy of the predictions flexibly by setting different confidence thresholds for sequential rules of datasets.
出处 《地球信息科学学报》 CSCD 北大核心 2015年第4期391-400,共10页 Journal of Geo-information Science
基金 2010年度江苏政府留学奖学金项目 国家自然科学基金项目"基于大时空范围LBS匿名集的推理攻击及隐私保护"(41201465) 江苏省自然科学基金项目"对抗基于时空关联规则推理攻击的LBS隐私保护研究"(BK2012439)
关键词 时空K-匿名 序列规则 马尔科夫链 转移概率矩阵 空间预测 spatial-temporal K-anonymity sequential rules Markov chain transition probability matrix spatial prediction.
  • 相关文献

参考文献19

  • 1Baldauf M, Dustdar S, Rosenberg F. A survey on context- aware systems[C]. In Proceedings of IJAHUC, 2007:263- 277.
  • 2王璐,孟小峰.位置大数据隐私保护研究综述[J].软件学报,2014,25(4):693-712. 被引量:151
  • 3Duckham M, Kulik F. Location Privacy and Location- Aware Computing in Dynamic & Mobile GIS: Investigat- ing Change in Space and Time[M]. Boca Raton: CRC Press, 2006:1-16.
  • 4Gruteser M, Grunwald D. Anonymous usage of location- based services through spatial and temporal cloaking[C]. In Proceedings of MobiSys, 2003.
  • 5Krumm J. A survey of computational location privacy[C]. In Proceedings of Personal and Ubiquitous Computing, 2009:391-399.
  • 6张海涛,黄慧慧,徐亮,高莎莎.隐私保护数据挖掘研究进展[J].计算机应用研究,2013,30(12):3529-3535. 被引量:15
  • 7Hu H, Xu J, Lee D L. PAM: An efficient and privacy- aware monitoring framework for continuously moving ob- jects[C]. In Proceedings of IEEE Transaction on Knowl- edge and Data Engineering, 2010:404-419.
  • 8Chen J, Cheng R, Mokbel M F, et al. Scalable processing of snapshot and continuous nearest-neighbor queries over one-dimensional uncertain data[C]. In Proceedings of VLDB J, 2009:1219-1240.
  • 9Pan X, Meng X, Xu J. Distortion-based anonymity for continuous queries in location-based mobile services[C]. In Proceedings of GIS, 2009:256-265.
  • 10Fournier-Viger P, Nkambou R, Tseng V S. RuleGrowth: Mining sequential rules common to several sequences by pattern-growth[C]. In Proceedings of SAC, 2011:956-961.

二级参考文献144

  • 1杨煜尧,赵方,罗海勇,陶冶,蓝星灿.一种基于地理位置信息的移动互联网社交模型[J].计算机研究与发展,2011,48(S2):307-313. 被引量:11
  • 2ALl S, TORABI T, ALl H. Ix)cation aware business process deployment[A]. Proceedings of ICCSA(4)[C]. 2006. 217-225.
  • 3BALDAUF M, DUSTDAR S, ROSENBERG F. A survey on context aware systems[A]. Proceedings of IJAHUC[C]. 2007. 263-277.
  • 4KULIK L. Privacy for real-time location-based services[A]. Proceedings of SIGSPATIAL Special[C]. 2009. 9-14.
  • 5HOH B, GRUTESER M, XIONG H, et al. Enhancing security and privacy in traffic-monitoring systems[A]. Proceedings of IEEE Pervasive Computing[C]. 2006.38-46.
  • 6KIDO H, YANAGISAWA Y, SATOH T. Protection of location privacy using dummies for location-based services[A]. Proceed ings of ICDE Workshops[C]. 2005.
  • 7JUM J,KIM H,CHANG J. An advanced cloaking algorithm using Hilbert curves for anonymous location based service[A]. Proceedings of SocialCom/PASSAT[C]. 2010. 1093-1098.
  • 8SHANG N, GHINITA G, ZHOU Y, et al. Controlling data disclosure in computational PIR protocols[A]. Proceedings of ASIACCS[C]. 2010. 310-313.
  • 9GRUTESER M, GRUNWALD D. Anonymous usage of location based services through spatial and temporal cloaking [A]. Proceedings of MobiSys[C]. 2003.
  • 10KRUMM J. A survey of computational location privacy[A]. Proceedings of Personal and Ubiquitous Computing [C]. 2009. 391-399.

共引文献232

同被引文献19

引证文献4

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部