期刊文献+

基于重力模型生成假轨迹的隐私保护方法 被引量:2

Generating Dummies Based on Gravity Model for User's Trajectory Privacy
原文传递
导出
摘要 针对连续查询场景中用户实时位置的隐私保护问题,设计了一种基于客户端的假轨迹生成方法.该方法使用网格划分地理空间,统计网格划分后每个网格内的历史查询数据.通过分析网格内的历史查询数据构建实时预测用户移动轨迹的重力模型.在重力模型基础上结合历史查询概率定义了轨迹熵度量轨迹隐私保护等级,并在最大运行速度限制下,提出了一种具有最大轨迹熵的基于k-匿名的假轨迹隐私保护算法.实验结果验证了所设计的假轨迹生成方法能够有效地保护真实轨迹的隐私. The real-time location privacy preserving is a hotspot in continuous Location-Based Services (LBSs).A client-based dummy trajectory generation method is proposed.Based on the spatial grid partition, the history data in each cell of this grid is analyzed.Using the gravity model, a prediction model for users movement pattern is built.Combined with the movement pattern model and the history query probability, the author defines a trajectory entropy to metric the trajectory privacy level.Based on k-anonymity principle, a limited velocity dummy trajectory generation algorithm with maximum trajectory entropy is proposed.Experiments from synthesis data and real-world data validate the effectiveness of our proposed method.
作者 张翠
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 2017年第2期57-66,共10页 Journal of Beijing University of Posts and Telecommunications
基金 国家高技术研究发展计划(863计划)项目(2015AA016007) 国家自然科学基金青年基金项目(61502489)
关键词 连续位置服务 重力模型 轨迹隐私 推理攻击 continuous location-based services gravity model trajectory privacy inference attack
  • 相关文献

参考文献3

二级参考文献33

  • 1刘树义,严新平,徐堃,张兢.重力分布模型在TransCAD中的应用研究[J].交通与计算机,2005,23(1):64-67. 被引量:12
  • 2ZHANG H, XU L, HUANG H, et al. Mining spatial association rules from LBS anonymity data set for improving utilization [A]. Proceed- ings of the 2 lth IEEE International Conference on Geoinformatics [C]. Kaifeng, China, 2013.1-6.
  • 3WERNKE M, SKVORTSOV P, DURR F, et al. A classification of location privacy attacks and approaches [J], Personal & Ubiquitous Computing, 2014, 18(1):163-175.
  • 4HIDETOSHI K, YANAGISAWA Y, SATOH T. An anonymous com- munication technique using dummies for location-based services [A]. Proceedings of International Conference on Pervasive Services [C]. Santorini, Greece, 2005.88-97.
  • 5JIA J, ZHANG F. Nonexposure accurate location k-anonymity algo- rithm in LBS [J], The Scientific World Journal, 2014, 2014(1): 619357-619357.
  • 6PAN X, MENG X F, XU J L. Distortion-based anonymity for con- tinuous queries in location-based mobile services [A]. Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems [C]. New York, USA, 2009. 256-265.
  • 7GAO S, MA J F, SHI W, et al. TRPF: a trajectory privacy-preserving framework for participatory sensing [J]. IEEE Transactions on Infor- mation Forensics and Security, 2013, 8(6): 874-887.
  • 8XU T, CAI Y. Exploring historical location data for anonymity preser- vation in location-based services [A]. Proceedings of the 27th IEEE International Conference on Computer Communications 2008 [C]. Phoenix, USA, 2008. 1220-1228.
  • 9HWANG R H, HSUEH Y L. A novel time-obfuscated algorithm for trajectory privacy protection [J]. IEEE Transactions on Services Computing, 2014, 7(22): 126-139.
  • 10PALANISAMY B, LIU L. Attack-resilient mix-zones over road net- works: architecture and algorithms[J]. IEEE Transactions on Mobile Computing, 2015, 14(3): 495-508.

共引文献31

同被引文献12

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部