期刊文献+

轨迹数据发布中基于敏感语义位置的隐私保护算法 被引量:1

Privacy Protection Algorithm Based on Sensitive Semantic Location in Trajectory Data Publishing
下载PDF
导出
摘要 针对轨迹数据隐私保护中数据可用性低及易受语义推断攻击问题,提出一种基于敏感语义位置的轨迹隐私保护算法。该算法利用Voronoi图将语义位置预先划分为独立的Voronoi单元,再依据语义位置流行度以及用户设定的敏感语义位置类型、语义安全阈值对轨迹停留位置进行空间匿名,构建语义安全匿名区域,防止语义推断攻击和提高数据可用性。实验结果表明,与其他算法相比,所提算法在信息损失率上平均降低约30%,算法运行时间上平均降低约30%。 Aiming at the problems of low data availability and vulnerability to semantic inference attacks in trajectory data privacy pro⁃tection,a trajectory privacy protection algorithm based on sensitive semantic position is proposed.The algorithm uses Vor⁃onoi diagram to divide the semantic location into independent Voronoi units in advance,and then according to the sensitive semantic location type,semantic security threshold and semantic location popularity set by the user,spatial anonymity is used to construct the semantic security anonymous area to prevent semantic inference attacks and improve data availability.Experimental results show that,compared with other algorithms,our algorithm has an average reduction in information loss rate of about 30%and an average reduction in algorithm running time of about 30%.
作者 俞望年 宣占祥 马小明 岳威 左开中 YU Wang-nian;XUAN Zhan-xiang;MA Xiao-ming;YUE Wei;ZUO Kai-zhong(School of Computer and Information,Anhui Normal University,Wuhu 241002;Anhui Provincial Key Laboratory of Network and Information Security,Anhui Normal University,Wuhu 241002)
出处 《现代计算机》 2020年第27期3-9,共7页 Modern Computer
基金 国家自然科学基金面上项目(No.61972438) 安徽省高校自然科学研究重点项目(No.KJ2019A1164) 安徽省大学生创新创业训练计划项目(No.S201910370150)。
关键词 轨迹数据发布 隐私保护 语义位置 VORONOI图 Trajectory Data Publishing Privacy Protection Semantic Location Voronoi Diagram
  • 相关文献

参考文献6

二级参考文献101

  • 1FUYU L, HUA K A, YING C. Query 1-diversity in Location-Based Services[C]//Proceedings of the Mobile Data Management: Systems, Services and Middleware, 2009 MDM '09 Tenth International Conference on, 2009: 436-442. 被引量:1
  • 2KHOSHGOZARAN A, SHAHABI C, SHIRANI-MEHR H. Location privacy: going beyond K-anonymity, cloaking and anonymizers[J]. Knowledge and Information Systems, 2011, 26(3): 435-465. 被引量:1
  • 3REBOLLO-MONEDERO D, FORNE J, Solanas A, et al. Private location-based information retrieval through user collaboration[J]. Computer Communications, 2010, 33(6): 762-774. 被引量:1
  • 4BONCHI F. Privacy Preserving Publication of Moving Object Data[M]. Springer-Verlag, 2009: 190-215. 被引量:1
  • 5BONCHI F, LAKSHMANAN L V S, WANG H. Trajectory anonymity in publishing personal mobility data[J]. SIGKDD Explor Newsl, 2011, 13(1): 30-42. 被引量:1
  • 6CHOW C Y, MOKBEL M F. Trajectory privacy in location-based services and data publication[J]. SIGKDD Explor Newsl, 2011, 13(1): 19-29. 被引量:1
  • 7BERESFORD A R, STAJANO F. Location privacy in pervasive computing[J]. Pervasive Computing, IEEE, 2003, 2(1): 46-55. 被引量:1
  • 8FREUDIGER J, SHOKRI R, HUBAUX J P. On the optimal placement of mix zones[C]//9th International Symposium, PETS 2009, Seattle, WA, USA, 2009: 216-234. 被引量:1
  • 9FREUDIGERJ, RAYA M, FELEGYHAZI M, et al. Mix-zones for location privacy in vehicular networks[C]//first international workshop on wireless networking for intelligent transportation systems (Win-ITS), Canada, 2007: 216-234. 被引量:1
  • 10PALANISAMY B, LING L. MobiMix: Protecting location privacy with mix-zones over road networks[C]//the Data Engineering (ICDE), 2011 IEEE 27th International Conference on,, Hannover, 2011: 494-505. 被引量:1

共引文献63

同被引文献8

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部