计算机科学 ›› 2019, Vol. 46 ›› Issue (1): 190-195.doi: 10.11896/j.issn.1002-137X.2019.01.029

• 信息安全 • 上一篇    下一篇

基于轨迹多特性的隐私保护算法

许华杰1,2, 吴青华1, 胡小明3   

  1. (广西大学计算机与电子信息学院 南宁530004)1
    (广西多媒体通信与网络技术重点实验室(广西大学) 南宁530004)2
    (上海第二工业大学计算机与信息工程学院 上海201209)3
  • 收稿日期:2017-12-28 出版日期:2019-01-15 发布日期:2019-02-25
  • 作者简介:许华杰(1974-),男,博士,副教授,CCF高级会员,主要研究方向为无线网络、网络安全、智能算法,E-mail:hjxu2009@163.com(通信作者);吴青华(1992-),女,硕士生,主要研究方向为信息安全;胡小明(1978-),女,博士,副教授,主要研究方向为密码学、信息安全。
  • 基金资助:
    广西自然科学基金项目(2014GXNSFAA118382),崇左市科技计划项目(崇科FB2018001),广西科技计划项目(2017AB15008),上海市教育委员会科研创新项目(14ZZ167),国家自然科学基金项目(71463003)资助

Privacy Protection Algorithm Based on Multi-characteristics of Trajectory

XU Hua-jie1,2, WU Qing-hua1, HU Xiao-ming3   

  1. (School of Computer and Electronic Information,Guangxi University,Nanning 530004,China)1
    (Guangxi Key Laboratory of Multimedia Communications and Network Technology,Guangxi University,Nanning 530004,China)2
    (School of Computer and Information Engineering,Shanghai Second Polytechnic University,Shanghai 201209,China)3
  • Received:2017-12-28 Online:2019-01-15 Published:2019-02-25

摘要: 现有基于聚类的轨迹隐私保护算法在衡量轨迹间的相似性时大多以空间特征为标准,忽略了轨迹蕴含的其他方面的特性对轨迹相似性的影响。针对这一情况可能导致的匿名后数据可用性较低的问题,提出了一种基于轨迹多特性的隐私保护算法。该算法考虑了轨迹数据的不确定性,综合方向、速度、时间和空间4个特性的差异作为轨迹相似性度量的依据,以提高轨迹聚类过程中同一聚类集合中轨迹之间的相似度;在此基础上,通过空间平移的方式实现同一聚类集合中轨迹的k-匿名。实验结果表明,与经典隐私保护算法相比,在满足一定隐私保护需求的前提下,采用所提算法实施隐私保护之后的轨迹数据整体具有较高的数据可用性。

关键词: 不确定性, 轨迹聚类, 轨迹隐私保护, 隐私保护度

Abstract: Most of existing trajectory privacy protection algorithms based on trajectory clustering use spatial features as the standard when measuring the similarity between trajectories,ignoring the influence of other temporal and spatial characteristics of trajectories on trajectory similarity.In view of the fact that this situation may lead to the problem oflow availability of anonymous data,a protection algorithm based on integrated spatiotemporal characteristics of trajectory was proposed.The proposed algorithm combines the uncertainty of trajectory data,and uses the difference of 4 aspects of direction,speed,time and space to measure similarity between trajectories,in order to improve the similarity between the trajectories in the same cluster set.And then the trajectories of the same clustering set are spatially shifted to achieve the k-anonymization of the trajectories in the same clustering set.The experimental results show that compared with the classical privacy protection algorithm,the trajectory data protected by proposed algorithm as a whole has higherdata availability under certain privacy protection requirements.

Key words: Degree of privacy protection, Trajectory clustering, Trajectory privacy protection, Uncertainty

中图分类号: 

  • TP391
[1]HUO Z,MENG X F.A Survey of Trajectory Privacy Preserving Techniques [J].Chinese Journal of Computers,2011,34(10):1820-1830.(in Chinese)<br /> 霍峥,孟小峰.轨迹隐私保护技术研究[J].计算机学报,2011,34(10):1820-1830.<br /> [2]LEI K Y,LI X H,LIU H,et al.Dummy Trajectory Privacy Protection Scheme for Trajectory Publishing based on the Spatiotemporal Correlation [J].Journal on Communications,2016,37(12):156-164.(in Chinese)<br /> 雷凯跃,李兴华,刘海,等.轨迹发布中基于时空关联性的假轨迹隐私保护方案[J].通信学报,2016,37(12):156-164.<br /> [3] XU T,CAI Y.Exploring Historical Location Data for Anonymity Preservation in Location-Based Services[C]//Proceedings of IEEE Conference on Computer Communications.New York:IEEE Press,2008:547-555.<br /> [4]HWANG R H,HSUEH Y L,CHUNG H W.A Novel Time-Obfuscated Algorithm for Trajectory Privacy Protection [J].IEEE Transactions on Services Computing,2014,7(2):126-139.<br /> [5]ZHAO J,ZHANG Y,LI X H,et al.A Trajectory Privacy Protection Approach via Trajectory Frequency Suppression [J].Chinese Journal of Computers,2014,37(10):2096-2106.(in Chinese)<br /> 赵婧,张渊,李兴华,等.基于轨迹频率抑制的轨迹隐私保护方法[J].计算机学报,2014,37(10):2096-2106.<br /> [6]NERGIZ M E,ATZORI M,SAYGIN Y,et al.Towards Trajectory Anonymization:A Generalization-based Approach [J].Transactions on Data Privacy,2009,2(1):47-75.<br /> [7]YANG J,ZHANG B,ZHANG J P,et al.Personalized Trajectory Privacy Preserving Method based on Graph Partition[J].Journal on Communications,2015,36(3):1-11.(in Chinese)<br /> 杨静,张冰,张健沛,等.基于图划分的个性化轨迹隐私保护方法[J].通信学报,2015,36(3):1-11.<br /> [8] NERGIZ M E,ATZORI M,SAYGIN Y.Towards Trajectory Anonymization:A Generalization-based Approach[C]//Proceedings of ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS.California:ACM,2008:52-61.<br /> [9]DOMINGO F J,SRAMKA M,TRUJILLO-RASUA R.Privacy-preserving Publication of Trajectories Using Microaggregation[C]//Proceedings of ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS.San Jose:ACM,2010:26-33.<br /> [10]DOMINGO F J,SRAMKA M,TRUJILLO-RASUA R.Microaggregation and Permutation-based Anonymization of Movement Data[J].Information Sciences,2012,208(21):55-80.<br /> [11]ABUL O,BONCHI F,NANNI M.Never Walk Alone:Uncertainty for Anonymity in Moving Objects Databases[C]//Proceedings of the 24th IEEE International Conference on Data Engineering.Cancun:IEEE,2008:376-385.<br /> [12]ABUL O,BONCHI F,NANNI M.Anonymization of Moving Objects Databases by Clustering and Perturbation [J].Information Systems,2010,35(8):884-910.<br /> [13]WANG C,YANG J,ZHANG J P.Privacy Preserving Algorithm based on Trajectory Location and Shape Similarity [J].Journal on Communications,2015,36(2):144-157.(in Chinese)<br /> 王超,杨静,张健沛.基于轨迹位置形状相似性的隐私保护算法[J].通信学报,2015,36(2):144-157.<br /> [14]GUO X D,WU Y J,YANG W J,et al.L-diversity Algorithm for Privacy Preserving Trajectory Data Publishing [J].Computer Engineering and Applications,2015,51(2):125-130.(in Chinese)<br /> 郭旭东,吴英杰,杨文进,等.隐私保护轨迹数据发布的l-差异性算法[J].计算机工程与应用,2015,51(2):125-130.<br /> [15]SHI L K,ZHANG Y R,ZHANG X.Trajectory Data Clustering Algorithm based on Spatio-temporal Pattern[J].Journal of Computer Applications,2017,37(3):854-859.(in Chinese)<br /> 石陆魁,张延茹,张欣.基于时空模式的轨迹数据聚类算法[J].计算机应用,2017,37(3):854-859.
[1] 郁舒昊, 周辉, 叶春杨, 王太正.
SDFA:基于多特征融合的船舶轨迹聚类方法研究
SDFA:Study on Ship Trajectory Clustering Method Based on Multi-feature Fusion
计算机科学, 2022, 49(6A): 256-260. https://doi.org/10.11896/jsjkx.211100253
[2] 林潮伟, 林兵, 陈星.
边缘环境下基于模糊理论的科学工作流调度研究
Study on Scientific Workflow Scheduling Based on Fuzzy Theory Under Edge Environment
计算机科学, 2022, 49(2): 312-320. https://doi.org/10.11896/jsjkx.201000102
[3] 高岩, 闫秋艳, 夏士雄, 张紫涵.
基于骨骼轨迹聚合模型的课堂交互群体发现
Interactive Group Discovery Based on Skeleton Trajectory Aggregation Model in ClassEnvironment
计算机科学, 2021, 48(8): 334-339. https://doi.org/10.11896/jsjkx.201000036
[4] 韦建华, 许建秋.
不确定时态数据Top-k查询
Efficient Top-k Query Processing on Uncertain Temporal Data
计算机科学, 2020, 47(9): 67-73. https://doi.org/10.11896/jsjkx.190800143
[5] 杨洁,王国胤,李帅.
基于边界域的邻域知识距离度量模型
Neighborhood Knowledge Distance Measure Model Based on Boundary Regions
计算机科学, 2020, 47(3): 61-66. https://doi.org/10.11896/jsjkx.190500174
[6] Renata WONG.
量子计算与不确定性原理
Uncertainty Principle as Related to Quantum Computation
计算机科学, 2020, 47(1): 40-50. https://doi.org/10.11896/jsjkx.190400432
[7] 杨洁, 王国胤, 张清华, 冯林.
层次粒结构下粗糙模糊集的不确定性度量
Uncertainty Measure of Rough Fuzzy Sets in Hierarchical Granular Structure
计算机科学, 2019, 46(1): 45-50. https://doi.org/10.11896/j.issn.1002-137X.2019.01.007
[8] 郑宏亮, 侯雪辉, 宋笑迎, 庞阔, 邹丽.
基于犹豫模糊可信度的知识推理
Approach for Knowledge Reasoning Based on Hesitate Fuzzy Credibility
计算机科学, 2019, 46(1): 131-137. https://doi.org/10.11896/j.issn.1002-137X.2019.01.020
[9] 夏扬波, 杨文忠, 张振宇, 王庆鹏, 石研.
一种移动无线传感器网络的节点位置预测方法
Node Position Prediction Method for Mobile Wireless Sensor Networks
计算机科学, 2018, 45(8): 113-118. https://doi.org/10.11896/j.issn.1002-137X.2018.08.020
[10] 汪琳娜, 杨新, 杨习贝.
监督邻域粗糙集
Supervised Neighborhood Rough Set
计算机科学, 2018, 45(8): 186-190. https://doi.org/10.11896/j.issn.1002-137X.2018.08.033
[11] 毛莺池,陈杨.
不确定性车辆路口的轨迹预测
Uncertain Vehicle Intersection Trajectory Prediction
计算机科学, 2018, 45(3): 235-240. https://doi.org/10.11896/j.issn.1002-137X.2018.03.037
[12] 魏方圆,黄德才.
基于区间数的多维不确定性数据UID-DBSCAN聚类算法
UID-DBSCAN Clustering Algorithm of Multi-dimensional Uncertain Data Based on Interval Number
计算机科学, 2017, 44(Z11): 442-447. https://doi.org/10.11896/j.issn.1002-137X.2017.11A.094
[13] 赵凡,魏玲.
D型概率决策形式背景下的规则获取
Rule Acquisition of D-type Probabilistic Decision Formal Context
计算机科学, 2017, 44(8): 274-279. https://doi.org/10.11896/j.issn.1002-137X.2017.08.047
[14] 徐俊洁,陈荣.
基于故障关联的多故障概率诊断方法
Probabilistic Diagnosis Approach to Diagnosing Multiple-fault Programs with Fault Correlation
计算机科学, 2017, 44(4): 124-130. https://doi.org/10.11896/j.issn.1002-137X.2017.04.027
[15] 刘德浩,王倩.
一种具有相依关系的二维云推理方法及其在预测中的应用
Uncertainty Reasoning Based on Related Planar Cloud and Application in Prediction
计算机科学, 2016, 43(Z6): 99-102. https://doi.org/10.11896/j.issn.1002-137X.2016.6A.024
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!