浏览全部资源
扫码关注微信
哈尔滨工程大学 计算机科学与技术学院,黑龙江 哈尔滨 150001
[ "杨静(1962-),女,黑龙江哈尔滨人,哈尔滨工程大学教授、博士生导师,主要研究方向为数据挖掘、隐私保护等。" ]
[ "张冰(1986-),女,黑龙江哈尔滨人,哈尔滨工程大学博士生,主要研究方向为隐私保护、人工智能。" ]
[ "张健沛(1956-),男,黑龙江哈尔滨人,哈尔滨工程大学教授、博士生导师,主要研究方向为社会网络、数据挖掘。" ]
[ "谢静(1986-),女,湖北随州人,哈尔滨工程大学博士生,主要研究方向为数据挖掘、隐私保护。" ]
网络出版日期:2015-03,
纸质出版日期:2015-03-25
移动端阅览
杨静, 张冰, 张健沛, 等. 基于图划分的个性化轨迹隐私保护方法[J]. 通信学报, 2015,36(3):1-11.
Jing YANG, Bing ZHANG, Jian-pei ZHANG, et al. Personalized trajectory privacy preserving method based on graph partition[J]. Journal of communications, 2015, 36(3): 1-11.
杨静, 张冰, 张健沛, 等. 基于图划分的个性化轨迹隐私保护方法[J]. 通信学报, 2015,36(3):1-11. DOI: 10.11959/j.issn.1000-436x.2015053.
Jing YANG, Bing ZHANG, Jian-pei ZHANG, et al. Personalized trajectory privacy preserving method based on graph partition[J]. Journal of communications, 2015, 36(3): 1-11. DOI: 10.11959/j.issn.1000-436x.2015053.
针对用户对轨迹匿名数据的个性化需求,提出一种基于轨迹间夹角和位置重合的(s
λ)-覆盖个性化轨迹间关联构建方法,并根据轨迹间距离和方向度量轨迹间边权,以构造规模可变的个性化轨迹图模型。同时,将轨迹k-匿名集的构建转化为轨迹图划分问题,提出了一种基于贪心策略寻找近似最优的k条轨迹构建轨迹k-匿名集的方法。通过对比实验,在合成轨迹数据集上验证了所提算法的有效性和合理性。
A (s
λ)-overlap was proposed which based on the angle and location between two trajectories to construct the relationship between them
and also measure the weight between two trajectories by trajectory angle and distance
to-gether to construct the personal trajectory graph model. Then a greedy partition method to was proposed construct trajec-tory k-anonymization sets by finding the approximate optimal k trajectories. Experiment results on synthetic dataset show the effectiveness and reasonableness of proposed method.
MOKBEL M F . Privacy in location-based services: start-of-the-art and research directions [A ] . The Int Conf on Mobile Data Management (MDM'07) [C ] . Mannheim: IEEE, German , 2007 . 228 - 235 .
吴英杰 , 唐庆明 , 倪巍伟 . 基于聚类杂交的隐私保护轨迹数据发布算法 [J ] . 计算机研究与发展 , 2013 , 50 ( 3 ): 578 - 593 .
WU Y J , TANG Q M , NI W W . A clustering hybrid based algorithm for privacy preserving trajectory data publishing [J ] . Journal of Com-puter Research and Development , 2013 , 50 ( 3 ): 578 - 593 .
张建明 , 赵玉娟 , 姜浩斌 等 . 车辆自组网的位置隐私保护技术研究 [J ] . 通信学报 , 2012 , 33 ( 8 ): 180 - 189 .
ZHANG J M , ZHAO Y J , JIANG H B , et al . Research on protection technology for location privacy in VANET [J ] . Journal on Communications , 2012 , 33 ( 8 ): 180 - 189 .
CHOW C , MOKBEL M F , LIU X . A peer-to-peer spatial cloaking algorithm for anonymous location-based services [A ] . Proc of the ACM Symposium on Advances in Geographic Information Systems(ACM GIS'06) [C ] . Arlington: ACM, USA , 2006 . 171 - 178 .
GHINITA G , KALNIS P , KHOSHGOZARAN A . Private queries in location based services: anonymizers are not necessary [A ] . ACM SIGMOD Int Conf on Management of data (SIGMOD'08) [C ] . New York: ACM, USA , 2008 . 121 - 132 .
GRUTESER M , GRUNWALD D . Anonymous usage of loca-tion-based services through spatial and temporal cloaking [A ] . Proc of the Int Conf on Mobile Systems, Applications, and Services (Mobi-Sys'03) [C ] . San Francisco: USA , 2003 . 163 - 168 .
SWEENEY L . k-Anonymity: a model for protecting privacy [J ] . International Journal on Uncertainty, Fuzziness and Konwledge Based Systems , 2002 , 10 ( 5 ): 557 - 570 .
ARIS G D , PANOS K , VASSILIOS S . Providing k-anonymity in location based services [J ] ACM SIGKDD Explorations Newsletter , 2010 , 1 ( 12 ): 3 - 10 .
YAROVOY R , BONCHI F , LAK SHMANAN L V S . Anonymizing moving objects: how to hide a MOB in a crowd [A ] . Proc of the 12th Int Conf on Extending Database Technology: Advances in Database Technology(EDBT'09) [C ] . New York: ACM, USA , 2009 . 72 - 83 .
CHOW C Y , MOHAMED F M . Trajectory privacy in location-based services and data publication [J ] . ACM SIGKDD Explorations News-letter , 2011 , 1 ( 13 ): 19 - 29 .
NERGIZ M E , ATZORI M , SAYGIN Y . Towards trajectory ano-nymization: a generalization-based approach [A ] . Proc of the SIG-SPATIAL ACM GIS 2008 Int Workshop on Security and Privacy in GIS and LBS(SPRINGL'08) [C ] . New York: ACM, USA , 2008 . 52 - 61 .
ABUL O , BONCHI F , NANNI M . Never walk alone: uncertainty for anonymity in moving objects databases [A ] . Proc of the IEEE 24th Int Conf on Data Engineering(ICDE'08) [C ] . Cancun: IEEE, Mexico , 2008 . 376 - 385 .
HUO Z , HU H , MENG X . History trajectory privacy-preserving through graph partition [A ] . Proc of the 1st Int Conf on Mobile Location-based service(MLBS'11) [C ] . Beijing: ACM, China , 2011 . 88 - 97 .
GAO S , MA J , SUN C . Balancing trajectory privacy and data utility using a personalized anonymization model [J ] . Journal of Network and Computer Applications , 2014 , 38 : 125 - 134 .
BRINKHO T . Generating traffic data [J ] . Bulletin of the Technical Committee on Data Engineering , 2003 , 26 ( 2 ): 19 - 25 .
0
浏览量
1166
下载量
1
CSCD
关联资源
相关文章
相关作者
相关机构