期刊文献+

一种基于单点收益的轨迹隐私保护方法 被引量:5

A Trajectory Privacy-Preserving Method Based on Single Point Gain
下载PDF
导出
摘要 如何在轨迹数据发布时保护用户隐私信息并且最大程度地减少数据损失是隐私保护研究领域的一个重要课题.本文提出一种基于单点收益的轨迹隐私保护方法,在满足用户隐私要求的情况下,根据收益计算结果,在轨迹数据集中抑制位置点或者添加假轨迹,保证每次处理轨迹数据集时能达到最大收益,从而减少信息损失.理论分析和实验结果表明,在隐私容忍度要求较高或者攻击者数量较多的情况下,本文方法能在保证隐私保护强度前提下有效降低数据损失率. How to preserve users’ privacy information and minimize the loss of information when publishing trajectory data has become an important topic in the research field of privacy preservation.In this paper,we propose a trajectory privacy-preserving method based on single point gain,which satisfies the privacy requirements of users.According to the single point gain values,we suppress location points or add dummy trajectories into the trajectory dataset to ensure that the maximum benefit can be achieved at each iteration,thus reducing the loss of information.Theoretical analysis and experimental results show that,in the case of high privacy tolerance or a large number of attackers,the proposed method effectively reduces the information loss rate while guaranteeing the intensity of privacy preserving.
作者 陈传明 林文诗 俞庆英 罗永龙 CHEN Chuan-ming;LIN Wen-shi;YU Qing-ying;LUO Yong-long(School of Computer and Information,Anhui Normal University,Wuhu,Anhui 241002,China;Anhui Provincial Key Laboratory of Network and Information Security,Wuhu,Anhui 241002,China)
出处 《电子学报》 EI CAS CSCD 北大核心 2020年第1期143-152,共10页 Acta Electronica Sinica
基金 国家自然科学基金(No.61702010,No.61972439,No.61672039)
关键词 假轨迹 隐私保护 单点收益 轨迹发布 轨迹抑制 问题点对 dummy trajectory privacy preservation single point gain trajectory publication trajectory suppression problematic point pair
  • 相关文献

参考文献3

二级参考文献73

  • 1潘晓,肖珍,孟小峰.位置隐私研究综述[J].计算机科学与探索,2007,1(3):268-281. 被引量:63
  • 2Gruteser M, Grunwald D. Anonymous usage of locationbased services through spatial and temporal cloaking//Proceedings of the 1st International Conference on Mobile Sys tems, Applications, and Services (MobiSys 2003). San Fransisco, 2003: 31 -42.
  • 3Mokbel M F, Chow C Y, Aref W G. The newcasper: Query processing for location services withoutcompromising privacy//Proceedings of the 32nd Conference of Very Large Databases (VLDB 2006). Seoul, 2006: 763-774.
  • 4Bamba B, Liu L. Supporting anonymous location queries in mobile environments with privacy grid//Proceeding of the 17th International Conference on World Wide Web (WWW 2008). Beijing, 2008:237-246.
  • 5Pan X, Meng X, Xu J. Distortion-based anonymity for continuous queries in location-based mobile services//Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems (GIS 2009). Washington, 2009:256-265.
  • 6Krumm J. A survey of computational location privacy. Personal and Ubiquitous Computing, 2009, 13(6): 391-399.
  • 7Bettini C, Wang S X, Jajodia S. Protecting privacy against location-based personal identification//Proceedings of the 2nd VLDB workshop on Secure Data Management (SDM2005). Trondheim, 2005:185-199.
  • 8Krumm J. Inference attacks on location tracks//Proceedings of the 5th International Conference on Pervasive Computing (PERVASIVE 2007). Toronto, 2007:127-143.
  • 9Luper D, Cameron D, Miller J A, Arabnia H R. Spatial and temporal target association through semantic analysis and GPS data mining//Proceedings of the 2007 International Conference on Information & Knowledge Engineering (IKE 2007). LasVegas, 2007:251-257.
  • 10Xu T, Cai Y. Exploring historical location data for anonymity preservation in location-based services//Proceedings of the 27th Conference on Computer Communications (INFOCOM 2008). Phoenix, 2008:547-555.

共引文献132

同被引文献27

引证文献5

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部