期刊文献+

一种基于几何变换的数字脚印轨迹隐私保护方法研究 被引量:1

Digital Footprint Trajectory Privacy Protection Method Based on Geometric Transformation
下载PDF
导出
摘要 随着信息技术的快速发展,人们在网络空间留下了形式各异的数字脚印。数字脚印可以揭示个人和群体的行为爱好,在方便人们交流的同时,也带来了隐私安全问题,引起人们的广泛关注。针对数字脚印中的用户移动轨迹,文章提出了基于几何变换的数字脚印轨迹隐私保护方法。根据用户对隐私保护的需求强度,中心匿名服务器对真实轨迹进行旋转、平移变换生成满足要求的假轨迹,从而减小真实轨迹被识别的概率。仿真实验表明,当用户对隐私保护需求程度较高时,相比于随机模式生成法和旋转模式生成法,文章所提方法生成的假轨迹相似度更高,假轨迹生成效率更高。 With the rapid development of information technology,people leave digital footprints indifferent forms in cyberspace.Digital footprints can reveal personal and group behaviors and hobbies,which brings privacy issues while brings conveniences to people to communicate with each other,causing wide public concerns.Aiming at the moving trajectory of user in digital footprint,this paperproposes a trajectory privacy protection method based on geometric transformation in digital footprint.In this method,the central anonymous server generates false tracks that satisfy the user's requirementsby rotating and translating the real trajectory,thereby reducing the probability that the real trajectoryis recognized.The simulation experiments show that,when the user's demand for privacy protection ishigh,the false trajectory similarity that the method generates is higher than the random pattern generationmethod and the rotation pattern generation method,and the generation effi ciency is also high.
作者 邹建成 徐淑情 ZOU Jiancheng;XU Shuqing(College of Science, North China University of Technology, Beijing 100144, China;Institute of Image Processing and Pattern Recognition, North China University of Technology, Beijing 100144, China)
出处 《信息网络安全》 CSCD 2017年第6期1-5,共5页 Netinfo Security
基金 国家科技重大专项课题[2014ZX02502003] 国家自然科学基金[61170327] 北京市自然科学基金[KZ201410009013]
关键词 数字脚印 轨迹隐私 假轨迹 几何变换 digital footprint trajectory privacy false trajectory geometric transformation
  • 相关文献

参考文献8

二级参考文献131

  • 1潘晓,肖珍,孟小峰.位置隐私研究综述[J].计算机科学与探索,2007,1(3):268-281. 被引量:65
  • 2Gruteser M, Grunwald D. Anonymous usage of locationbased services through spatial and temporal cloaking//Proceedings of the 1st International Conference on Mobile Sys tems, Applications, and Services (MobiSys 2003). San Fransisco, 2003: 31 -42.
  • 3Mokbel M F, Chow C Y, Aref W G. The newcasper: Query processing for location services withoutcompromising privacy//Proceedings of the 32nd Conference of Very Large Databases (VLDB 2006). Seoul, 2006: 763-774.
  • 4Bamba B, Liu L. Supporting anonymous location queries in mobile environments with privacy grid//Proceeding of the 17th International Conference on World Wide Web (WWW 2008). Beijing, 2008:237-246.
  • 5Pan X, Meng X, Xu J. Distortion-based anonymity for continuous queries in location-based mobile services//Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems (GIS 2009). Washington, 2009:256-265.
  • 6Krumm J. A survey of computational location privacy. Personal and Ubiquitous Computing, 2009, 13(6): 391-399.
  • 7Bettini C, Wang S X, Jajodia S. Protecting privacy against location-based personal identification//Proceedings of the 2nd VLDB workshop on Secure Data Management (SDM2005). Trondheim, 2005:185-199.
  • 8Krumm J. Inference attacks on location tracks//Proceedings of the 5th International Conference on Pervasive Computing (PERVASIVE 2007). Toronto, 2007:127-143.
  • 9Luper D, Cameron D, Miller J A, Arabnia H R. Spatial and temporal target association through semantic analysis and GPS data mining//Proceedings of the 2007 International Conference on Information & Knowledge Engineering (IKE 2007). LasVegas, 2007:251-257.
  • 10Xu T, Cai Y. Exploring historical location data for anonymity preservation in location-based services//Proceedings of the 27th Conference on Computer Communications (INFOCOM 2008). Phoenix, 2008:547-555.

共引文献145

同被引文献11

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部