Computer Science ›› 2017, Vol. 44 ›› Issue (8): 124-128.doi: 10.11896/j.issn.1002-137X.2017.08.022

Previous Articles     Next Articles

Novel Trajectory Privacy Preserving Mechanism Based on Dummies

DONG Yu-lan and PI De-chang   

  • Online:2018-11-13 Published:2018-11-13

Abstract: The popularity of location-based services(LBS) has brought great convenience to people’s life,but it also brings serious privacy leakage at the same time.Dummy is a popular technology at present,but most existing methods do not take the individual needs of users into account.To address this problem,a improved privacy model was proposed,guided by which we designed a dummy trajectories generation algorithm.The model includes five reasonable parameters,namely short-term disclosure,long-term disclosure,trajectories distance deviation,trajectories local similarity and services request probability.People can customize these metrics through their own needs and generate dummies by dummy trajectories generation algorithm to avoid leakage of privacy.The experiment results show that the algorithm can generate fewer dummy trajectories to satisfy the same privacy-preserving requirement.So it’s more effective than exis-ting works in preserving movement trajectories,especially the probability of services request is discussed.

Key words: Location-based services(LBS),Trajectory privacy,Privacy model,Pseudonyms-based anonymization

[1] HUO Z,MENG X F.A Survey of Trajectory Privacy-Preserving Techniques[J].Chinese Journal of Computers,2011,4(10):1820-1830.(in Chinese) 霍峥,孟小峰.轨迹隐私保护技术研究[J].计算机学报,2011,4(10):1820-1830.
[2] ZHAO J,ZHANG Y,LI X,et al.A Trajectory Privacy Protection Approach via Trajectory Frequency Suppression[J].Chinese Journal of Computers,2014,7(10):2096-2106.(in Chinese) 赵婧,张渊,李兴,等.基于轨迹频率抑制的轨迹隐私保护方法[J].计算机学报,2014,7(10):2096-2106.
[3] HUO Z,MENG X F,HUANG Y.PrivateCheckIn:Trajectory Privacy-Preserving for Check-In Services in MSNS[J].Chinese Journal of Computers,2013,6(4):716-726.(in Chinese) 霍峥,孟小峰,黄毅.PrivateCheckIn:一种移动社交网络中的轨迹隐私保护方法[J].计算机学报,2013,6(4):716-726.
[4] XU T,CAI Y.Exploring Historical Location Data for Anonymity Preservation in Location-Based Services[C]∥ The 27th Conference on Computer Communications.2008:547-555.
[5] SHI M Y.Research on Trajectory Privacy Protection in Location Based Service[D].Nanjing:Nanjing University of Posts,2014.(in Chinese) 史敏仪.面向位置服务的轨迹隐私保护技术研究[D].南京:南京邮电大学,2014.
[6] PALANISAMY B,LIU L.Attack-resilient mix-zones over roadnetworks:architecture and algorithms[J].IEEE Transactions on Mobile Computing,2015,14(3):495-508.
[7] KIDO H,YANAGISAWA Y,SATOH T.An anonymous communication technique using dummies for location-basedservices[C]∥International Conference on Pervasive Services,2005(ICPS’05).2005:88-97.
[8] SUZUKI A,IWATA M,ARASE Y,et al.A user location anony-mization method for location based services in a realenvironment[C]∥Sigspatial International Conference on Advances in Geographic Information Systems.ACM,2010:398-401.
[9] KATO R,IWATA M,HARA T,et al.A dummy-based anonymization method based on user trajectory with pauses[C]∥International Conference on Advances in Geographic Information Systems.2012:249-258.
[10] KATO R,IWATA M,HARA T,et al.User Location Anonymization Method for Wide Distribution of Dummies[M]∥Database and Expert Systems Applications.Springer Berlin Heidelberg,2013:259-273.
[11] YOU T H,PENG W C,LEE W C.Protecting Moving Trajec-tories with Dummies[C]∥International Conferenceon Mobile Data Management.IEEE,2007:278-282.
[12] WU X,SUN G.A Novel Dummy-Based Mechanism to Protect Privacy on Trajectories[C]∥IEEE International Conference on Data Mining Workshop.IEEE,2014:1120-1125.
[13] LEI P R,PENG W C,SU I J,et al.Dummy-Based Schemes for Protecting Movement Trajectories[J].Journal ofInformation Science & Engineering,2012,28(2):335-350.
[14] BRINKHOFF T.Generating Network-Based Moving Objects[C]∥International Conference on Scientific and Statistical Database Management.IEEE Computer Society,2000:253-255.
[15] MONTGOMERY D C,KOWALSKI S M.Design and Analysis of Experiments:Minitab Companion[M].Wiley,2010.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!