期刊文献+

基于多边形构建的差分隐私位置保护方法

Differential Privacy Location Privacy Protection Method Based on Polygon Construction
下载PDF
导出
摘要 笔者提出了一种基于多边形构建的差分隐私位置数据保护方案。在该方案中,算法首先从相关数据点集中选择邻接位置点,然后根据受保护的点选择的邻接点构成多边形,并求得多边形的质心,最后利用差分隐私算法加入多边形的质心,用加噪后的多边形质心代替被保护的点,然后重构并发布新的轨迹数据。实验结果表明,算法的隐私保护效果好,数据可用性高。 This paper proposes a differential privacy location data protection scheme based on polygon construction.In this scheme,the algorithm first selects the adjacent location points from the relevant data points,then constructs the polygon according to the adjacent points selected by the protected points,and obtains the center of the polygon.Finally,the center of the polygon is added by the differential privacy algorithm,and the protected points are replaced by the noisy polygon center,and then the new trajectory data is reconstructed and published.Experimental results show that the algorithm has good privacy protection effect and high data availability.
作者 张开宇 Zhang Kaiyu(School of Computer Science and Engineering,Shandong University of Science and Technology,Qingdao Shandong 266000,China)
出处 《信息与电脑》 2020年第4期55-58,共4页 Information & Computer
关键词 多边形构建 差分隐私 位置隐私 polygon construction differential privacy location privacy
  • 相关文献

参考文献4

二级参考文献109

  • 1潘晓,肖珍,孟小峰.位置隐私研究综述[J].计算机科学与探索,2007,1(3):268-281. 被引量:65
  • 2Gruteser M, Grunwald D. Anonymous usage of locationbased services through spatial and temporal cloaking//Proceedings of the 1st International Conference on Mobile Sys tems, Applications, and Services (MobiSys 2003). San Fransisco, 2003: 31 -42.
  • 3Mokbel M F, Chow C Y, Aref W G. The newcasper: Query processing for location services withoutcompromising privacy//Proceedings of the 32nd Conference of Very Large Databases (VLDB 2006). Seoul, 2006: 763-774.
  • 4Bamba B, Liu L. Supporting anonymous location queries in mobile environments with privacy grid//Proceeding of the 17th International Conference on World Wide Web (WWW 2008). Beijing, 2008:237-246.
  • 5Pan X, Meng X, Xu J. Distortion-based anonymity for continuous queries in location-based mobile services//Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems (GIS 2009). Washington, 2009:256-265.
  • 6Krumm J. A survey of computational location privacy. Personal and Ubiquitous Computing, 2009, 13(6): 391-399.
  • 7Bettini C, Wang S X, Jajodia S. Protecting privacy against location-based personal identification//Proceedings of the 2nd VLDB workshop on Secure Data Management (SDM2005). Trondheim, 2005:185-199.
  • 8Krumm J. Inference attacks on location tracks//Proceedings of the 5th International Conference on Pervasive Computing (PERVASIVE 2007). Toronto, 2007:127-143.
  • 9Luper D, Cameron D, Miller J A, Arabnia H R. Spatial and temporal target association through semantic analysis and GPS data mining//Proceedings of the 2007 International Conference on Information & Knowledge Engineering (IKE 2007). LasVegas, 2007:251-257.
  • 10Xu T, Cai Y. Exploring historical location data for anonymity preservation in location-based services//Proceedings of the 27th Conference on Computer Communications (INFOCOM 2008). Phoenix, 2008:547-555.

共引文献134

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部