期刊文献+

轨迹发布中基于时空关联性的假轨迹隐私保护方案 被引量:19

Dummy trajectory privacy protection scheme for trajectory publishing based on the spatiotemporal correlation
下载PDF
导出
摘要 从轨迹的整体方向、轨迹中相邻位置的时间可达及移动距离对单条轨迹中相邻位置间的时空关联性和轨迹间的相似性进行分析,提出了一种基于时空关联性的假轨迹隐私保护方案。安全性分析表明所提方案能有效混淆假轨迹与真实轨迹,避免攻击者识别出假轨迹。大量实验表明,所提方案在仅需较少计算时间的同时,能确保生成的假轨迹与真实轨迹具有相似性,从而有效保护轨迹发布中用户的轨迹隐私。 The spatiotemporal correlation was analyzed between neighboring locations and the trajectories similarity from the movement direction, the reachable time between neighboring locations and the movement distance, and a dummy trajectory privacy protection scheme based on the spatiotemporal correlation was proposed. Security analysis shows that the presented scheme successfully confuses the user's real trajectory with dummy trajectories, thereby protecting the user's trajectory privacy. Furthermore, extensive experiments indicate that the presented scheme not only has the limited computation cost, but also ensures that the generated dummy trajectories are similar to the user's real trajectory.
作者 雷凯跃 李兴华 刘海 裴卓雄 马建峰 李晖 LEI Kai-yue LI Xing-hua LIU Hai PEI Zhuo-xiong MA Jian-feng LI Hui(School of Cyber Engineering, Xidian University, Xi'an 710071, China)
出处 《通信学报》 EI CSCD 北大核心 2016年第12期156-164,共9页 Journal on Communications
基金 国家自然科学基金资助项目(No.61372075 No.U1405255 No.61202389 No.61472310)~~
关键词 轨迹发布 隐私保护 假轨迹 时空关联性 轨迹泄露 trajectory publishing privacy protection dummy trajectory spatiotemporal correlation trajectory leakage
  • 相关文献

参考文献5

二级参考文献118

  • 1潘晓,肖珍,孟小峰.位置隐私研究综述[J].计算机科学与探索,2007,1(3):268-281. 被引量:63
  • 2Gruteser M, Grunwald D. Anonymous usage of locationbased services through spatial and temporal cloaking//Proceedings of the 1st International Conference on Mobile Sys tems, Applications, and Services (MobiSys 2003). San Fransisco, 2003: 31 -42.
  • 3Mokbel M F, Chow C Y, Aref W G. The newcasper: Query processing for location services withoutcompromising privacy//Proceedings of the 32nd Conference of Very Large Databases (VLDB 2006). Seoul, 2006: 763-774.
  • 4Bamba B, Liu L. Supporting anonymous location queries in mobile environments with privacy grid//Proceeding of the 17th International Conference on World Wide Web (WWW 2008). Beijing, 2008:237-246.
  • 5Pan X, Meng X, Xu J. Distortion-based anonymity for continuous queries in location-based mobile services//Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems (GIS 2009). Washington, 2009:256-265.
  • 6Krumm J. A survey of computational location privacy. Personal and Ubiquitous Computing, 2009, 13(6): 391-399.
  • 7Bettini C, Wang S X, Jajodia S. Protecting privacy against location-based personal identification//Proceedings of the 2nd VLDB workshop on Secure Data Management (SDM2005). Trondheim, 2005:185-199.
  • 8Krumm J. Inference attacks on location tracks//Proceedings of the 5th International Conference on Pervasive Computing (PERVASIVE 2007). Toronto, 2007:127-143.
  • 9Luper D, Cameron D, Miller J A, Arabnia H R. Spatial and temporal target association through semantic analysis and GPS data mining//Proceedings of the 2007 International Conference on Information & Knowledge Engineering (IKE 2007). LasVegas, 2007:251-257.
  • 10Xu T, Cai Y. Exploring historical location data for anonymity preservation in location-based services//Proceedings of the 27th Conference on Computer Communications (INFOCOM 2008). Phoenix, 2008:547-555.

共引文献141

同被引文献88

引证文献19

二级引证文献39

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部