当前位置: X-MOL 学术Mob. Inf. Syst. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
A Privacy-Preserving Trajectory Publication Method Based on Secure Start-Points and End-Points
Mobile Information Systems ( IF 1.863 ) Pub Date : 2020-04-21 , DOI: 10.1155/2020/3429256
Yannian Zhao 1, 2 , Yonglong Luo 1, 2 , Qingying Yu 1, 2 , Zhaoyan Hu 1, 2
Affiliation  

By judging whether the start-point and end-point of a trajectory conform to the user’s behavioral habits, an attacker who possesses background knowledge can breach the anonymous trajectory. Traditional trajectory privacy preservation schemes often generate an anonymous set of trajectories without considering the security of the trajectory start- and end-points. To address this problem, this paper proposes a privacy-preserving trajectory publication method based on generating secure start- and end-points. First, a candidate set containing a secure start-point and end-point is generated according to the user’s habits. Second, k−1 anonymous trajectories are generated bidirectionally according to that secure candidate set. Finally, accessibility corrections are made for each anonymous trajectory. This method integrates features such as local geographic reachability and trajectory similarity when generating an anonymized set of trajectories. This provides users with privacy preservation at the k-anonymity level, without relying on the trusted third parties and with low algorithm complexity. Compared with existing methods such as trajectory rotation and unidirectional generation, theoretical analysis and experimental results on the datasets of real trajectories show that the anonymous trajectories generated by the proposed method can ensure the security of trajectory privacy while maintaining a higher trajectory similarity.

中文翻译:

基于安全起点和终点的隐私保护轨迹发布方法

通过判断轨迹的起点和终点是否符合用户的行为习惯,拥有背景知识的攻击者可以破坏匿名轨迹。传统的轨迹隐私保护方案通常会生成一组匿名轨迹,而不会考虑轨迹起点和终点的安全性。为了解决这个问题,本文提出了一种基于生成安全起点和终点的隐私保护轨迹发布方法。首先,根据用户的习惯生成包含安全起点和终点的候选集。第二,k-1个匿名轨迹根据该安全候选集双向生成。最后,对每个匿名轨迹进行可访问性更正。当生成一组匿名轨迹时,此方法集成了诸如本地地理可达性和轨迹相似性之类的功能。这为用户提供了k匿名级别的隐私保护,而无需依赖受信任的第三方并且算法复杂度低。与现有的轨迹旋转和单向生成方法相比,对真实轨迹数据集的理论分析和实验结果表明,该方法生成的匿名轨迹可以在保证较高的轨迹相似性的同时,保证轨迹隐私的安全性。
更新日期:2020-04-21
down
wechat
bug