期刊文献+

稀疏环境下基于假轨迹的轨迹隐私保护方法

Trajectory Privacy Protection Method Based on Dummy Trajectory in Sparse Environment
下载PDF
导出
摘要 针对稀疏环境下的移动对象轨迹数据经匿名处理后可用性低的问题,提出一种稀疏环境下基于假轨迹的轨迹隐私保护算法。在本文算法中,考虑了移动对象所处的地理环境,将轨迹的整体方向和轨迹间距作为选择假轨迹的重要依据。此外,还提出了使用访问概率的概念来平衡匿名和数据可用性,从而实现轨迹数据匿名。基于移动对象的轨迹数据集进行实验与分析,实验结果表明,本文算法在满足轨迹数据匿名需求的情况下有更高的数据可用性。 Aiming at the problem of low availability of moving object trajectory data in sparse environment after anonymous processing, a trajectory privacy protection algorithm based on dummy trajectories in sparse environment is proposed. In the algorithm of this paper, the geographical environment of the moving object is considered, and the overall direction of the trajectory and the distance between the trajectories are taken as an important basis for selecting dummy trajectories. In addition, the concept of using access probability is proposed to balance anonymity and data availability, so as to achieve anonymity of trajectory data. Experiments and analyses are carried out based on the trajectory data set of moving objects. The experimental results show that the algorithm in this paper has higher data availability while meeting the anonymity requirements of trajectory data.
作者 黄景 柳毅
出处 《计算机科学与应用》 2022年第1期135-146,共12页 Computer Science and Application
  • 相关文献

参考文献6

二级参考文献103

  • 1潘晓,肖珍,孟小峰.位置隐私研究综述[J].计算机科学与探索,2007,1(3):268-281. 被引量:65
  • 2Gruteser M, Grunwald D. Anonymous usage of locationbased services through spatial and temporal cloaking//Proceedings of the 1st International Conference on Mobile Sys tems, Applications, and Services (MobiSys 2003). San Fransisco, 2003: 31 -42.
  • 3Mokbel M F, Chow C Y, Aref W G. The newcasper: Query processing for location services withoutcompromising privacy//Proceedings of the 32nd Conference of Very Large Databases (VLDB 2006). Seoul, 2006: 763-774.
  • 4Bamba B, Liu L. Supporting anonymous location queries in mobile environments with privacy grid//Proceeding of the 17th International Conference on World Wide Web (WWW 2008). Beijing, 2008:237-246.
  • 5Pan X, Meng X, Xu J. Distortion-based anonymity for continuous queries in location-based mobile services//Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems (GIS 2009). Washington, 2009:256-265.
  • 6Krumm J. A survey of computational location privacy. Personal and Ubiquitous Computing, 2009, 13(6): 391-399.
  • 7Bettini C, Wang S X, Jajodia S. Protecting privacy against location-based personal identification//Proceedings of the 2nd VLDB workshop on Secure Data Management (SDM2005). Trondheim, 2005:185-199.
  • 8Krumm J. Inference attacks on location tracks//Proceedings of the 5th International Conference on Pervasive Computing (PERVASIVE 2007). Toronto, 2007:127-143.
  • 9Luper D, Cameron D, Miller J A, Arabnia H R. Spatial and temporal target association through semantic analysis and GPS data mining//Proceedings of the 2007 International Conference on Information & Knowledge Engineering (IKE 2007). LasVegas, 2007:251-257.
  • 10Xu T, Cai Y. Exploring historical location data for anonymity preservation in location-based services//Proceedings of the 27th Conference on Computer Communications (INFOCOM 2008). Phoenix, 2008:547-555.

共引文献138

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部