计算机科学 ›› 2013, Vol. 40 ›› Issue (11): 89-93.
张宏基,李文中,陆桑璐
ZHANG Hong-ji,LI Wen-zhong and LU Sang-lu
摘要: 为了保护用户的隐私,大部分公开数据集都采用隐藏真实ID和引入噪声信 息的方法来进行匿名处理。这些匿名处理即使在异步参考信息的攻击下也是脆弱的:即使只有部分位置信息暴露给攻击者并且暴露信息和公开数据集的收集过程不在同一时段内,攻击者依然能够识别出节点在公开数据集中的身份。首先,实验证明已有算法在异步信息情况下不适用;然后,提出针对异步信息的热点矩阵算法。采用3个真实移动数据集验证了识别算法的准确率。实验证明,热点矩阵法在异步信息条件下能够取得远高于已有方法的准确率。
[1] Lba counts in apple store and android marketplace.ht-tp://www.skyhookwireless.com/locationapps/,2010 [2] Quercia D,Lathia N,Calabrese F,et al.Recommending social events from mobile phone location data[C]∥Proceedings of the 2010IEEE International Conference on Data Mining(ICDM’ 10).Washington,DC,USA,2010.IEEE Computer Society,2010:971-976 [3] Sohn T,Li K A,Lee G,et al.Place-its:A study of location-based reminders on mobile phones [C]∥Fifth International Conference on Ubiquitous Computing(UbiComp’ 05).Berlin,Heidelberg,2005.Springer Verlag,2005:232-250 [4] Gaonkar S,Li J,Choudhury R R,et al.Micro-blog:sharing and querying content through mobile phones and social participation[C]∥Proceedings of the 6th international conference on Mobile systems,applications,and services(MobiSys’ 08).New York,NY,USA,2008.ACM,2008:174-186 [5] Motani M,Srinivasan V,Nuggehalli P S.Peoplenet:engineering a wireless virtual social network[C]∥Proceedings of the 11th annual international conference on Mobile computing and networking(MobiCom’ 05).New York,NY,USA,2005.ACM,2005:243-257 [6] Narayanan A,Shmatikov V.De-anonymizing social networks[C]∥Proceedings of the 200930th IEEE Symposium on Security and Privacy(SP’ 09).Washington,DC,USA,2009.IEEE Computer Society,2009:173-187 [7] Sala A,Zhao X,Wilson C,et al.Sharing graphs using differenti-ally private graph models[C]∥Proceedings of the 2011ACM SIGCOMM conference on Internet measurement conference(IMC’ 11).New York,NY,USA,2011.ACM,2011:81-98 [8] The foursquare website.https://foursquare.com/,2012 [9] Piorkowski M,Sarafijanovic-Djukic N,Grossglauser M.CRAWDAD data set epfl/mobility.http://crawdad.cs.dartmouth.edu/epfl/mobility,2009-02-24 [10] Eagle N,Pentland A.Reality mining:sensing complex social sys-tems[J].Personal and Ubiquitous Computing,2006,10(4):255-268 [11] University S J.Suvnet-trace data.http://wirelesslab.sjtu.edu.cn [12] Ma C Y,Yau D K,Yip N K,et al.Privacy vulnerability of published anonymous mobility traces[C]∥Proceedings of the sixteenth annual international conference on Mobile computing and networking(MobiCom’ 10).New York,NY,USA,2010.ACM,2010:185-196 [13] Gonzalez M C,Hidalgo C A,Barabasi A-L.Understanding individual human mobility patterns[J].Nature,2008,453:779-782 [14] Eagle N,Pentland A S.CRAWDAD data set mit/reality.http://crawdad.cs.dartmouth.edu/mit/reality,2005-07-01 |
No related articles found! |
|