期刊文献+

保持数据可用性的细粒度轨迹隐私保护方案

Fine-grained privacy-preserving framework while ensuring data usability in trajectory databases
下载PDF
导出
摘要 轨迹数据的隐私保护近年来越来越受到重视,现有的工作很少考虑不同的隐私敏感位置之间的区别,也较少考虑不同的轨迹应用之间的区别(例如保险推销和紧急救助).鉴于轨迹数据用途的多样性以及用户个性化的隐私需求,本文提出了一种细粒度的基于标签的轨迹数据隐私保护方案,此方案能让用户够灵活自主地控制不同隐私敏感的轨迹片段对不同轨迹应用的访问授权.此外,考虑到大部分的隐私敏感位置都与轨迹停留相关,为了合理地隐藏轨迹中不可见的采样点,本文提出了一种将不可见的隐私敏感轨迹片段中的位置采样点,合理散布到周围频繁访问的多个位置中的方法.实验结果表明,本文提出的方法能够在有效保护轨迹隐私的同时只引入较小的额外计算负担. The privacy of trajectories has aroused a wide concern. In previous works, rarely have the differences between different sensitive locations been discussed, nor the differences between different applications (eg: for advertising and for emergencies). While in fact, some sensi- tive locations are more important and some applications ought to be granted the access. In this paper, to meet different privacy requirements and data utility requirements, we propose a finegrained privacy-preserving framework which allows the users to specify which locations arc visible to some applications and invisible to others at the same time. In addition, since most sensitive locations are relevant to stay points and a significant stay in a sensitive place may last longer than the ordinary places, we also propose an efficient approach to distribute invisible location samples along the nearby popular visit sequences. Experiment results indicate that our framework performs efficiently without introducing significant performance penalties.
出处 《华东师范大学学报(自然科学版)》 CAS CSCD 北大核心 2015年第5期96-103,共8页 Journal of East China Normal University(Natural Science)
基金 武汉市创新研究团队项目(2014070504020237)
关键词 轨迹隐私 位置可见性 细粒度 trajectories privacy location visibility fine-grained
  • 相关文献

参考文献11

  • 1PELEKIS N,GKOULALAS-DIVANIS A,VODAS M,et al.Privacy-aware querying over sensitive trajectory data[C]//Proceedings of the 20th ACM International Conference on Information and Knowledge Management.ACM,2011:895-904.
  • 2FERRAIOLO D F,SANDHU R,GAVRILA S,et al.Proposed NIST standard for role-based access control[J].ACM Transactions on Information and System Security(TISSEC),2001,4(3):224-274.
  • 3BERTINO E,BONATTI P A,FERRARI E.TRBAC:A temporal role-based access control model[J].ACM Transactions on Information and System Security(TISSEC),2001,4(3):191-233.
  • 4BERTINO E,CATANIA B,DAMIANI M L,et al.GEO-RBAC:A spatially aware RBAC[C]//Proceedings of the 10th ACM Symposium on Access Control Models and Technologies.ACM,2005:29-37.
  • 5CHANDRAN S M,JOSHI J B D.LoT-RBAC:A location and time-based RBAC model[M]//Web Information Systems Engineering.Berlin:Springer,2005:361-375.
  • 6YOU T H,PENG W C,LEE W C.Protecting moving trajectories with dummies[C]//Proceedings of the 2007International Conference on Mobile Data Management.IEEE,2007:278-282.
  • 7TERROVITIS M,MAMOULIS N.Privacy preservation in the publication of trajectories[C]//Proceedings of the9th International Conference on Mobile Data Management.IEEE,2008:65-72.
  • 8ABUL O,BONCHI F,NANNI M.Never walk alone:Uncertainty for anonymity in moving objects databases[C]//Proceedings of the IEEE24th International Conference on Data Engineering.IEEE,2008:376-385.
  • 9KROHN M,YIP A,BRODSKY M,et al.Information flow control for standard OS abstractions[J].ACM SIGOPS Operating Systems Review,2007,41(6):321-334.
  • 10HUO Z,MENG X,HU H,et al.You can walk alone:Trajectory privacy-preserving through significant stays protection[M]//Database Systems for Advanced Applications.Berlin:Springer,2012:351-366.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部