期刊文献+

移动对象不确定轨迹隐私保护算法研究 被引量:5

Uncertain trajectory privacy-preserving method of moving object
下载PDF
导出
摘要 随着移动设备和定位技术的发展,产生了大量的移动对象轨迹数据,相伴而来的是个人隐私泄露问题。现有的轨迹隐私保护研究均假设轨迹数据是准确无误的,但由于数据采集设备不精确、移动对象延迟更新等原因,轨迹数据不确定性普遍存在。提出了一种基于K-匿名的不确定轨迹数据隐私保护方法,对发布的数据进行隐私处理,该方法首次将线性轨迹转化为不确定区域的思想引进轨迹数据的隐私处理。首先,使用概率统计的方法将轨迹泛化成一个更为真实的轨迹区域,然后将相似度高的轨迹域聚合成等价类进行数据的隐匿和发布,最后在真实的数据集上进行实验。 With the development of location based service(LBS) and location-aware devices,the amount of trajectories of moving objects collected by service providers was continuously increasing, meanwhile, it can cause great threaten for personal privacy. Most researches of trajectory privacy preserving were on deterministic data, however, trajectory's uncertainty was inherent due to the inaccuracy of data acquisition equipment, delayed update, and so on. A new method was prosed to protect the privacy of trajectory data in publishing. It is the first time to present the idea that transforming the trajectory to an uncertain area to cluster. First, a probability statistics method to model the trajectory to an uncertain area was proposed. Second, the similar uncertain area into a cluster was put and sanitized in an equivalence class. Finally, the performance of the proposal was compared with(K δ)-anonymity model in real datasets.
出处 《通信学报》 EI CSCD 北大核心 2015年第S1期94-102,共9页 Journal on Communications
基金 国家自然科学基金资助项目(61440014 61300196) 中央高校基本科研业务费专项基金资助项目(130317003)~~
关键词 轨迹数据发布 隐私保护 不确定性轨迹 K匿名 轨迹聚类 trajectory data publishing privacy-preserving uncertain trajectory K-anonymity trajectory clustering
  • 相关文献

参考文献16

  • 1Moein Ghasemzadeh,Benjamin C.M. Fung,Rui Chen,Anjali Awasthi.??Anonymizing trajectory data for passenger flow analysis(J)Transportation Research Part C . 2014 被引量:1
  • 2霍峥,孟小峰.轨迹隐私保护技术研究[J].计算机学报,2011,34(10):1820-1830. 被引量:109
  • 3霍峥,孟小峰,黄毅.PrivateCheckIn:一种移动社交网络中的轨迹隐私保护方法[J].计算机学报,2013,36(4):716-726. 被引量:69
  • 4JEUNG H,LU H,SATHE S,et al.Managing evolving uncertainty in trajectory databases. IEEE Transactions on Knowledge and Data Engineering . 2014 被引量:1
  • 5LIU H,SCHNEIDER M.Querying moving objects with uncertainty in spatio-temporal databases. Proc of the 16th Database Systems for Advanced Applications . 2011 被引量:1
  • 6Bart Kuijpers,Walied Othman.??Trajectory databases: Data models, uncertainty and complete query languages(J)Journal of Computer and System Sciences . 2009 (7) 被引量:1
  • 7Osman Abul,Francesco Bonchi,Mirco Nanni.??Anonymization of moving objects databases by clustering and perturbation(J)Information Systems . 2010 (8) 被引量:1
  • 8FAROOKH K H,ELIZABETH C,THARAM S D.Markov model for modelling and managing dynamic trust. Proc of the 3rd IEEE International Conference on Industrial Informatics . 2005 被引量:1
  • 9CHUNYANG M,HUA L,LI D S,et al.KSQ:top-k similarity query on uncertain trajectories. IEEE Transactions on Knowledge and Data Engineering . 2013 被引量:1
  • 10MARCO GRUTESER,Dirk GRUNWALD.Anonymous usage of location-based services through spatial and temporal cloaking. Proc of the First International Conference on Mobile Systems,Applications,and Services . 2003 被引量:1

二级参考文献53

  • 1潘晓,肖珍,孟小峰.位置隐私研究综述[J].计算机科学与探索,2007,1(3):268-281. 被引量:65
  • 2Gruteser M, Grunwald D. Anonymous usage of locationbased services through spatial and temporal cloaking//Proceedings of the 1st International Conference on Mobile Sys tems, Applications, and Services (MobiSys 2003). San Fransisco, 2003: 31 -42. 被引量:1
  • 3Mokbel M F, Chow C Y, Aref W G. The newcasper: Query processing for location services withoutcompromising privacy//Proceedings of the 32nd Conference of Very Large Databases (VLDB 2006). Seoul, 2006: 763-774. 被引量:1
  • 4Bamba B, Liu L. Supporting anonymous location queries in mobile environments with privacy grid//Proceeding of the 17th International Conference on World Wide Web (WWW 2008). Beijing, 2008:237-246. 被引量:1
  • 5Pan X, Meng X, Xu J. Distortion-based anonymity for continuous queries in location-based mobile services//Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems (GIS 2009). Washington, 2009:256-265. 被引量:1
  • 6Krumm J. A survey of computational location privacy. Personal and Ubiquitous Computing, 2009, 13(6): 391-399. 被引量:1
  • 7Bettini C, Wang S X, Jajodia S. Protecting privacy against location-based personal identification//Proceedings of the 2nd VLDB workshop on Secure Data Management (SDM2005). Trondheim, 2005:185-199. 被引量:1
  • 8Krumm J. Inference attacks on location tracks//Proceedings of the 5th International Conference on Pervasive Computing (PERVASIVE 2007). Toronto, 2007:127-143. 被引量:1
  • 9Luper D, Cameron D, Miller J A, Arabnia H R. Spatial and temporal target association through semantic analysis and GPS data mining//Proceedings of the 2007 International Conference on Information & Knowledge Engineering (IKE 2007). LasVegas, 2007:251-257. 被引量:1
  • 10Xu T, Cai Y. Exploring historical location data for anonymity preservation in location-based services//Proceedings of the 27th Conference on Computer Communications (INFOCOM 2008). Phoenix, 2008:547-555. 被引量:1

共引文献163

同被引文献16

引证文献5

二级引证文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部