期刊文献+

基于DTW距离度量函数的DTW-TA轨迹匿名算法 被引量:2

DTW-TA trajectory anonymity algorithm based on DTW distance measurement function
下载PDF
导出
摘要 在传统的基于欧几里德距离函数的轨迹相似性计算过程中,要求轨迹等长且时间点对应,无法度量不等长且有局部时间偏移的轨迹相似性。因此在构造同步轨迹集合过程中产生信息损失较大,影响轨迹数据的可用性。为此,通过引进一种可以度量不等长且有局部时间偏移的轨迹间相似性的DTW(dynamic time warping)距离度量函数,提出一种新的轨迹匿名模型——(k,δ,p)-匿名模型,构造了DTW-TA(dynamic time warping trajectory anonymity)算法。在合成数据集和真实数据集下的实验结果表明,该算法在满足轨迹k-匿名隐私保护的基础上,减少了信息损失,提高了轨迹数据的可用性。 In the process of traditional trajectory similarity calculation based on the Euclidean distance function, it required the trajectory should be same length and time point correspondence, a similarity between the local time migration trajectories couldwt be measured. So the information loss of process of the synchronous collection construction is bigger, affected the traj- ectory data availability. Therefore, this paper constructed the DTW-TA anonymity algorithm by introducing a range to measure unequal length and local time migration trajectory similarity DTW distance metric function and putt forward a new track anony- mous model:(k,8,p)-anonymity model. Under the synthetic data and real data sets of the experimental results show that the algorithm reduces the loss of information, enhances the usability of trajectory data meet the basis of k-anonymity model privacy protection.
作者 郑剑 刘聪
出处 《计算机应用研究》 CSCD 北大核心 2017年第8期2459-2463,2468,共6页 Application Research of Computers
基金 国家自然科学基金资助项目(61462034 61563019) 江西省教育厅科学技术研究项目(GJJ13415) 江西理工大学科研基金重点课题(NSFJ2014-K11)
关键词 轨迹数据 隐私保护 DTW距离度量函数 (k δ p)-匿名模型 数据可用性 trajectory data privacy protection DTW distance metric function (k,8,p) -anonymity model data availability
  • 相关文献

参考文献11

二级参考文献294

  • 1潘晓,肖珍,孟小峰.位置隐私研究综述[J].计算机科学与探索,2007,1(3):268-281. 被引量:65
  • 2Mokbel M F, Chow C Y, Aref W G. The new Casper: Query processing for location services without compromising privacy [C] //Proc of the 32nd Int Conf on Very Large Data Bases (VLDB). New York: ACM, 2006:763-774.
  • 3Chow C, Mokbel M F. Enabling privacy continuous queries for revealed user locations [C]//LNCS 4605 : Proc of the Int Syrup on Advances in Spatial and Temporal Databases (SSTD). Berlin: Springer, 2007.
  • 4Gruteser M, Grunwal D. Anonymous usage of location-based services through spatial and temporal cloaking [C] //Proe of the Int Conf on Mobile Systems, Applications, and Services (MobiSys). New York: ACM, 2003:163-168.
  • 5Xiao Zhen, Xu Jianliang, Meng Xiaofeng. P-sensitivity: A semantic privacy-protection model for location-based services [C] //Proc of the 2nd Int Workshop on PriVacy-Aware Location-Based Mobile Services(PALMS). Piscataway, NJ: IEEE, 2008:47-54.
  • 6Bamba B, Liu L. Supporting anonymous location queries in mobile environments with privacy grid [C] //Proc of Int Conf on World Wide Web (WWW). New York: ACM, 2008: 237-246.
  • 7Kido H, Yanagisawa Y, Satoh T. Protection of location privacy using dummies for location-based services [C]//Proc of the 26th Int Conf on the Physics of Semiconductors (ICPS). Piseataway, NJ: IEEE, 2005: 1248-1248.
  • 8Ghinita G, Kalnis P, Khoshgozaran A, et al. Private queries in location based services: Anonymizers are not necessary [C] //Proe of ACM SIGMOD 2008. New York: ACM, 2008.
  • 9Xu T, Cai Y. Location anonymity in continuous location based services [C]//Proc of Int Symp on Advances in Geographic Information Systems(GIS). New York: ACM, 2007.
  • 10Brinkhoff T. A framework for generating network-based moving objects [J]. An Int Journal on Advances of Computer Science for Geographic Information Systems (Geolnformatica), 2002, 6(2): 153-180.

共引文献707

同被引文献21

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部