期刊文献+

一种基于隐私拆分的轨迹隐私保护方法 被引量:1

A Trajectory Privacy Preserving Algorithm Based on Privacy Splitting
下载PDF
导出
摘要 针对连续位置服务中的位置隐私问题,提出一种基于隐私拆分的轨迹隐私保护方法.首先,系统分析轨迹中基于时空关联的位置攻击方法,提出历史、空间和行进3种位置相关性,并利用差分隐私模型,建立单点位置的发布对查询轨迹的前向和后向隐私风险评估机制.在此基础上,提出一种基于多服务器的交替查询机制,通过拆分查询轨迹,消除轨迹中位置间的相关性,提高轨迹的隐私安全.最后,基于真实数据集的仿真实验验证模型的有效性和可行性. Aiming at the location privacy problem in continuous location-based services,a trajectory privacy protection method based on privacy splitting is proposed.Firstly,the location attack method based on spatiotemporal correlation in trajectory is analyzed systematically,and three kinds of location correlations,namely history,space and marching,are proposed.Then,a forward and backward privacy risk assessment mechanism for query trajectory is established by using differential privacy model.On this basis,an alternative query mechanism based on multi server is proposed.By splitting the query track,the correlation between the positions in the track is eliminated,and the privacy and security of the track are improved.Finally,we verify validity and feasibility of the model based on real data sets.
作者 程保容 叶阿勇 张强 刁一晴 张娇美 邓慧娜 CHENG Baorong;YE Ayong;ZHANG Qiang;DIAO Yiqing;ZHANG Jiaomei;DENG Huina(Fujian Provincial Key Laboratory of Network Security and Cryptology,College of Mathematics and Informatics,Fujian Normal University,Fuzhou 350007,China)
出处 《福建师范大学学报(自然科学版)》 CAS 北大核心 2020年第6期28-35,共8页 Journal of Fujian Normal University:Natural Science Edition
基金 国家自然科学基金资助项目(61972096、61771140、61872088、61872090) 福建省自然科学基金资助项目(2018J01780)。
关键词 轨迹隐私 位置隐私 拆分隐私 差分隐私 时空相关性 trajectory privacy location privacy splitting privacy differential privacy spatiotemporal correlation
  • 相关文献

参考文献2

二级参考文献24

  • 1Giannotti F,Nanni M,Pedreschi D,et al.Trajectory pattern mining//Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.San Jose,USA,2007:330-339.
  • 2Lee Jae-Gil,Han Jia-Wei,Li Xiao-Lei,et al.TraClass:Trajectory classification using hierarchical region based and trajectory-based clustering//Proceedings of the 34th Interna tional Conference on Very Large Data Bases.Auckland,New Zealand,2008:1081-1094.
  • 3Lee Jae-Gil,Han-Jia Wei,Whang Kyu-Young.Trajectory clustering a partition and group framework//Proceedings of the 2007 ACM SIGMOD International Conference on Management of Data.Beijing,China,2007:593-604.
  • 4Li Xiao-Lei,Han Jia-Wei,Lee Jae-Gil,et al.Traffic densitybased discovery of hot routes in road networks//Proceedings of the 10th International Symposium on Spatial and Temporal Databases.Boston,USA,2007:441-459.
  • 5Terrovitis M,Mamoulis N.Privacy preservation in the publication of trajectories//Proceedings of the 9th International Conference on Mobile Data Management.Beijing,China,2008:65-72.
  • 6Abul O,Bonchi F,Nanni M.Never walk alone:Uncertainty for anonymity in moving objects databases//Proceedings of the 24th IEEE International Conference on Data Engineering.Cancun,Mexico,2008:376-385.
  • 7Gao Sheng,Ma Jian-Feng,Sun Cong,et al.Balancing trajectory privacy and data utility using a personalized anony mization model.Journal of Network and Computer Applications,2013,38(9):125-134.
  • 8Domingo Ferrer J,Trujillo-Rasua R.Microaggregation and permutation based anonymization of movement data.Information Sciences,2012,208(9):55-80.
  • 9Nergiz M,Atzori M,Saygin Y.Towards trajectory anony mization:A generalization based approach//Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS.Irvine,USA,2008:52-61.
  • 10Huo Zheng,HuangYi,MengXiao-Feng.Historytrajectory privacy-preserving through graph partition//Proceedings of the 1st International Workshop on Mobile Location Based Service.Beijing,China,2011:71-82.

共引文献60

同被引文献11

引证文献1

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部