计算机科学 ›› 2017, Vol. 44 ›› Issue (8): 124-128.doi: 10.11896/j.issn.1002-137X.2017.08.022

• 信息安全 • 上一篇    下一篇

一种基于假数据的新型轨迹隐私保护模型

董玉兰,皮德常   

  1. 南京航空航天大学计算机科学与技术学院 南京211106,南京航空航天大学计算机科学与技术学院 南京211106
  • 出版日期:2018-11-13 发布日期:2018-11-13
  • 基金资助:
    本文受国家自然科学基金(U1433116),中央高校基本科研业务费专项资金(NP2017208),南京航空航天大学研究生创新基地(实验室)开放基金(kfjj20171603)资助

Novel Trajectory Privacy Preserving Mechanism Based on Dummies

DONG Yu-lan and PI De-chang   

  • Online:2018-11-13 Published:2018-11-13

摘要: 基于位置服务的普及给人们的生活带来了极大的便利,但同时也带来了严重的隐私泄露问题。基于假轨迹的隐私保护技术是目前比较流行的一种方法,但是现有的大多数假轨迹方法没有考虑到用户的个性化需求。基于此问题,提出了一种改进的隐私保护模型,并按照这个模型设计了一个假轨迹生成算法。该模型包含5个参数,分别命名为短期位置暴露概率、长期轨迹暴露概率、轨迹偏移距离、轨迹局部相似度和服务请求概率,用户可以通过自身需求自定义这些度量,并通过假轨迹生成算法来生成假轨迹,从而避免隐私的泄露。实验结果表明,该算法可以在满足相同隐私的条件下生成较少的假轨迹,尤其是考虑了服务请求概率这一背景信息,该模型在保护移动对象轨迹隐私方面比之前的方案更有效。

关键词: 基于位置的服务,轨迹隐私,隐私模型,假轨迹

Abstract: The popularity of location-based services(LBS) has brought great convenience to people’s life,but it also brings serious privacy leakage at the same time.Dummy is a popular technology at present,but most existing methods do not take the individual needs of users into account.To address this problem,a improved privacy model was proposed,guided by which we designed a dummy trajectories generation algorithm.The model includes five reasonable parameters,namely short-term disclosure,long-term disclosure,trajectories distance deviation,trajectories local similarity and services request probability.People can customize these metrics through their own needs and generate dummies by dummy trajectories generation algorithm to avoid leakage of privacy.The experiment results show that the algorithm can generate fewer dummy trajectories to satisfy the same privacy-preserving requirement.So it’s more effective than exis-ting works in preserving movement trajectories,especially the probability of services request is discussed.

Key words: Location-based services(LBS),Trajectory privacy,Privacy model,Pseudonyms-based anonymization

[1] HUO Z,MENG X F.A Survey of Trajectory Privacy-Preserving Techniques[J].Chinese Journal of Computers,2011,4(10):1820-1830.(in Chinese) 霍峥,孟小峰.轨迹隐私保护技术研究[J].计算机学报,2011,4(10):1820-1830.
[2] ZHAO J,ZHANG Y,LI X,et al.A Trajectory Privacy Protection Approach via Trajectory Frequency Suppression[J].Chinese Journal of Computers,2014,7(10):2096-2106.(in Chinese) 赵婧,张渊,李兴,等.基于轨迹频率抑制的轨迹隐私保护方法[J].计算机学报,2014,7(10):2096-2106.
[3] HUO Z,MENG X F,HUANG Y.PrivateCheckIn:Trajectory Privacy-Preserving for Check-In Services in MSNS[J].Chinese Journal of Computers,2013,6(4):716-726.(in Chinese) 霍峥,孟小峰,黄毅.PrivateCheckIn:一种移动社交网络中的轨迹隐私保护方法[J].计算机学报,2013,6(4):716-726.
[4] XU T,CAI Y.Exploring Historical Location Data for Anonymity Preservation in Location-Based Services[C]∥ The 27th Conference on Computer Communications.2008:547-555.
[5] SHI M Y.Research on Trajectory Privacy Protection in Location Based Service[D].Nanjing:Nanjing University of Posts,2014.(in Chinese) 史敏仪.面向位置服务的轨迹隐私保护技术研究[D].南京:南京邮电大学,2014.
[6] PALANISAMY B,LIU L.Attack-resilient mix-zones over roadnetworks:architecture and algorithms[J].IEEE Transactions on Mobile Computing,2015,14(3):495-508.
[7] KIDO H,YANAGISAWA Y,SATOH T.An anonymous communication technique using dummies for location-basedservices[C]∥International Conference on Pervasive Services,2005(ICPS’05).2005:88-97.
[8] SUZUKI A,IWATA M,ARASE Y,et al.A user location anony-mization method for location based services in a realenvironment[C]∥Sigspatial International Conference on Advances in Geographic Information Systems.ACM,2010:398-401.
[9] KATO R,IWATA M,HARA T,et al.A dummy-based anonymization method based on user trajectory with pauses[C]∥International Conference on Advances in Geographic Information Systems.2012:249-258.
[10] KATO R,IWATA M,HARA T,et al.User Location Anonymization Method for Wide Distribution of Dummies[M]∥Database and Expert Systems Applications.Springer Berlin Heidelberg,2013:259-273.
[11] YOU T H,PENG W C,LEE W C.Protecting Moving Trajec-tories with Dummies[C]∥International Conferenceon Mobile Data Management.IEEE,2007:278-282.
[12] WU X,SUN G.A Novel Dummy-Based Mechanism to Protect Privacy on Trajectories[C]∥IEEE International Conference on Data Mining Workshop.IEEE,2014:1120-1125.
[13] LEI P R,PENG W C,SU I J,et al.Dummy-Based Schemes for Protecting Movement Trajectories[J].Journal ofInformation Science & Engineering,2012,28(2):335-350.
[14] BRINKHOFF T.Generating Network-Based Moving Objects[C]∥International Conference on Scientific and Statistical Database Management.IEEE Computer Society,2000:253-255.
[15] MONTGOMERY D C,KOWALSKI S M.Design and Analysis of Experiments:Minitab Companion[M].Wiley,2010.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!