稀疏环境下基于假轨迹的轨迹隐私保护方法
Trajectory Privacy Protection Method Based on Dummy Trajectory in Sparse Environment
DOI: 10.12677/CSA.2022.121015, PDF,    科研立项经费支持
作者: 黄 景, 柳 毅:广东工业大学计算机学院,广东 广州
关键词: 轨迹数据k-Anonymity假轨迹数据可用性数据发布Trajectory Data k-Anonymity Dummy Trajectory Data Availability Data Publishing
摘要: 针对稀疏环境下的移动对象轨迹数据经匿名处理后可用性低的问题,提出一种稀疏环境下基于假轨迹的轨迹隐私保护算法。在本文算法中,考虑了移动对象所处的地理环境,将轨迹的整体方向和轨迹间距作为选择假轨迹的重要依据。此外,还提出了使用访问概率的概念来平衡匿名和数据可用性,从而实现轨迹数据匿名。基于移动对象的轨迹数据集进行实验与分析,实验结果表明,本文算法在满足轨迹数据匿名需求的情况下有更高的数据可用性。
Abstract: Aiming at the problem of low availability of moving object trajectory data in sparse environment after anonymous processing, a trajectory privacy protection algorithm based on dummy trajectories in sparse environment is proposed. In the algorithm of this paper, the geographical environment of the moving object is considered, and the overall direction of the trajectory and the distance between the trajectories are taken as an important basis for selecting dummy trajectories. In addition, the concept of using access probability is proposed to balance anonymity and data availability, so as to achieve anonymity of trajectory data. Experiments and analyses are carried out based on the trajectory data set of moving objects. The experimental results show that the algorithm in this paper has higher data availability while meeting the anonymity requirements of trajectory data.
文章引用:黄景, 柳毅. 稀疏环境下基于假轨迹的轨迹隐私保护方法[J]. 计算机科学与应用, 2022, 12(1): 135-146. https://doi.org/10.12677/CSA.2022.121015

参考文献

[1] Zhang, S.B., Mao, X.J., Choo, K.K.R., Peng, T. and Wang, G.J. (2020) A Trajectory Privacy-Preserving Scheme Based on a Dual-K Mechanism for Continuous Location-Based Services. Information Sciences, 527, 406-419. [Google Scholar] [CrossRef
[2] Feng, Z.N. and Zhu, Y.M. (2017) A Survey on Trajectory Data Mining: Techniques and Applications. IEEE Access, 4, 2056-2067. [Google Scholar] [CrossRef
[3] Guo, L.M., Huang, G.Y., Gao, X., He, J., Wu, B. and Guo, H.M. (2015) DoSTra: Discovering Common Behaviors of Objects Using the Duration of Staying on Each Location of Trajectories. Radiation Research, 161, 137-142.
[4] Huang, G.Y., He, J., Zhou, W.L., et al. (2016) Discovery of Stop Regions for Understanding Repeat Travel Behaviors of Moving Objects. Journal of Computer & System Sciences, 82, 582-593. [Google Scholar] [CrossRef
[5] Shen, Y., Zhao, L.G. and Fan, J. (2015) Analysis and Visualization for Hot Spot Based Route Recommendation Using Short-Dated Taxi GPS Traces. Information, 6, 134-151. [Google Scholar] [CrossRef
[6] Chun-Guang, M.A., Zhang, L. and Yang, S.T. (2015) Review on Location Trajectory Privacy Protection. Netinfo Security, 10, 24-31.
[7] Wernke, M., Skvortsov, P., Duerr, F., et al. (2014) A Classification of Location Privacy Attacks and Approaches. Personal & Ubiquitous Computing, 18, 163-175. [Google Scholar] [CrossRef
[8] 霍峥, 孟小峰. 轨迹隐私保护技术研究[J]. 计算机学报, 2011, 34(10): 1820-1830.
[9] 雷凯跃, 李兴华, 刘海, 裴卓雄, 马建峰, 李晖. 轨迹发布中基于时空关联性的假轨迹隐私保护方案[J]. 通信学报, 2016, 37(12): 156-164.
[10] Gruteser, M. and Grunwald, D. (2003) Anonymous Usage of Location-Based Services through Spatial and Temporal Cloaking. Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, San Francisco, 5-8 May 2003, 31-42. [Google Scholar] [CrossRef
[11] Abul, O., Bonchi, F. and Nanni, M. (2008) Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases. 2008 IEEE 24th International Conference on Data Engi-neering, Cancun, 7-12 April 2008, 376-385. [Google Scholar] [CrossRef
[12] Poulis, G., Skiadopoulos, S., Loukides, G. and Gkou-lalas-Divanis, A. (2013) Distance-Based k^m-Anonymization of Trajectory Data. 2013 IEEE 14th International Con-ference on Mobile Data Management, Milan, 3-6 June 2013, 57-62. [Google Scholar] [CrossRef
[13] Wu, X.C. and Sun, G.Z. (2015) A Novel Dummy-Based Mechanism to Protect Privacy on Trajectories. 2014 IEEE International Conference on Data Mining Workshop, Shenzhen, 14 De-cember 2014, 1120-1125. [Google Scholar] [CrossRef
[14] 雷凯跃, 李兴华, 刘海, 裴卓雄, 马建峰, 李晖. 轨迹发布中基于时空关联性的假轨迹隐私保护方案[J]. 通信学报, 2016, 37(12): 156-164.
[15] Terrovitis, M., Poulis, G., Mamoulis, N., et al. (2017) Local Suppression and Splitting Techniques for Privacy Preserving Publication of Trajec-tories. IEEE Transactions on Knowledge & Data Engineering, 29, 1466-1479. [Google Scholar] [CrossRef
[16] 刘向宇, 陈金梅, 夏秀峰, Singh, M., 宗传玉, 朱睿. 防止暴露位置攻击的轨迹隐私保护[J]. 计算机应用, 2020, 40(2): 479-485.
[17] Zhao, Y.N., Luo, Y.L., Yu, Q.Y., et al. (2020) A Privacy-Preserving Trajectory Publication Method Based on Secure Start-Points and End-Points. Mobile In-formation Systems, 2020, Article ID: 3429256. [Google Scholar] [CrossRef
[18] 许华杰, 吴青华, 胡小明. 基于轨迹多特性的隐私保护算法[J]. 计算机科学, 2019, 46(1): 190-195.
[19] 陈传明, 林文诗, 俞庆英, 罗永龙. 一种基于单点收益的轨迹隐私保护方法[J]. 电子学报, 2020, 48(1): 143-152.