计算机科学 ›› 2017, Vol. 44 ›› Issue (8): 124-128.doi: 10.11896/j.issn.1002-137X.2017.08.022
董玉兰,皮德常
DONG Yu-lan and PI De-chang
摘要: 基于位置服务的普及给人们的生活带来了极大的便利,但同时也带来了严重的隐私泄露问题。基于假轨迹的隐私保护技术是目前比较流行的一种方法,但是现有的大多数假轨迹方法没有考虑到用户的个性化需求。基于此问题,提出了一种改进的隐私保护模型,并按照这个模型设计了一个假轨迹生成算法。该模型包含5个参数,分别命名为短期位置暴露概率、长期轨迹暴露概率、轨迹偏移距离、轨迹局部相似度和服务请求概率,用户可以通过自身需求自定义这些度量,并通过假轨迹生成算法来生成假轨迹,从而避免隐私的泄露。实验结果表明,该算法可以在满足相同隐私的条件下生成较少的假轨迹,尤其是考虑了服务请求概率这一背景信息,该模型在保护移动对象轨迹隐私方面比之前的方案更有效。
[1] HUO Z,MENG X F.A Survey of Trajectory Privacy-Preserving Techniques[J].Chinese Journal of Computers,2011,4(10):1820-1830.(in Chinese) 霍峥,孟小峰.轨迹隐私保护技术研究[J].计算机学报,2011,4(10):1820-1830. [2] ZHAO J,ZHANG Y,LI X,et al.A Trajectory Privacy Protection Approach via Trajectory Frequency Suppression[J].Chinese Journal of Computers,2014,7(10):2096-2106.(in Chinese) 赵婧,张渊,李兴,等.基于轨迹频率抑制的轨迹隐私保护方法[J].计算机学报,2014,7(10):2096-2106. [3] HUO Z,MENG X F,HUANG Y.PrivateCheckIn:Trajectory Privacy-Preserving for Check-In Services in MSNS[J].Chinese Journal of Computers,2013,6(4):716-726.(in Chinese) 霍峥,孟小峰,黄毅.PrivateCheckIn:一种移动社交网络中的轨迹隐私保护方法[J].计算机学报,2013,6(4):716-726. [4] XU T,CAI Y.Exploring Historical Location Data for Anonymity Preservation in Location-Based Services[C]∥ The 27th Conference on Computer Communications.2008:547-555. [5] SHI M Y.Research on Trajectory Privacy Protection in Location Based Service[D].Nanjing:Nanjing University of Posts,2014.(in Chinese) 史敏仪.面向位置服务的轨迹隐私保护技术研究[D].南京:南京邮电大学,2014. [6] PALANISAMY B,LIU L.Attack-resilient mix-zones over roadnetworks:architecture and algorithms[J].IEEE Transactions on Mobile Computing,2015,14(3):495-508. [7] KIDO H,YANAGISAWA Y,SATOH T.An anonymous communication technique using dummies for location-basedservices[C]∥International Conference on Pervasive Services,2005(ICPS’05).2005:88-97. [8] SUZUKI A,IWATA M,ARASE Y,et al.A user location anony-mization method for location based services in a realenvironment[C]∥Sigspatial International Conference on Advances in Geographic Information Systems.ACM,2010:398-401. [9] KATO R,IWATA M,HARA T,et al.A dummy-based anonymization method based on user trajectory with pauses[C]∥International Conference on Advances in Geographic Information Systems.2012:249-258. [10] KATO R,IWATA M,HARA T,et al.User Location Anonymization Method for Wide Distribution of Dummies[M]∥Database and Expert Systems Applications.Springer Berlin Heidelberg,2013:259-273. [11] YOU T H,PENG W C,LEE W C.Protecting Moving Trajec-tories with Dummies[C]∥International Conferenceon Mobile Data Management.IEEE,2007:278-282. [12] WU X,SUN G.A Novel Dummy-Based Mechanism to Protect Privacy on Trajectories[C]∥IEEE International Conference on Data Mining Workshop.IEEE,2014:1120-1125. [13] LEI P R,PENG W C,SU I J,et al.Dummy-Based Schemes for Protecting Movement Trajectories[J].Journal ofInformation Science & Engineering,2012,28(2):335-350. [14] BRINKHOFF T.Generating Network-Based Moving Objects[C]∥International Conference on Scientific and Statistical Database Management.IEEE Computer Society,2000:253-255. [15] MONTGOMERY D C,KOWALSKI S M.Design and Analysis of Experiments:Minitab Companion[M].Wiley,2010. |
No related articles found! |
|