浏览全部资源
扫码关注微信
西安电子科技大学网络与信息安全学院,陕西 西安 710071
[ "雷凯跃(1990-),女,天津人,西安电子科技大学硕士生,主要研究方向为位置隐私保护。" ]
[ "李兴华(1978-),男,河南南阳人,博士,西安电子科技大学教授、博士生导师,主要研究方向为隐私保护、网络与信息安全。" ]
[ "刘海(1984-),男,贵州贵阳人,西安电子科技大学博士生,主要研究方向为位置隐私保护和理性密码协议。" ]
[ "裴卓雄(1993-),男,山西运城人,西安电子科技大学硕士生,主要研究方向为位置隐私保护。" ]
[ "马建峰(1963-),男,陕西西安人,博士,西安电子科技大学教授、博士生导师,主要研究方向为信道编码、网络与信息安全、密码学。" ]
[ "李晖(1968-),男,河南灵宝人,博士,西安电子科技大学教授、博士生导师,主要研究方向为密码学、无线网络安全、云计算安全、信息论与编码理论。" ]
网络出版日期:2016-12,
纸质出版日期:2016-12-25
移动端阅览
雷凯跃, 李兴华, 刘海, 等. 轨迹发布中基于时空关联性的假轨迹隐私保护方案[J]. 通信学报, 2016,37(12):156-164.
Kai-yue LEI, Xing-hua LI, Hai LIU, et al. Dummy trajectory privacy protection scheme for trajectory publishing based on the spatiotemporal correlation[J]. Journal on communications, 2016, 37(12): 156-164.
雷凯跃, 李兴华, 刘海, 等. 轨迹发布中基于时空关联性的假轨迹隐私保护方案[J]. 通信学报, 2016,37(12):156-164. DOI: 10.11959/j.issn.1000-436x.2016281.
Kai-yue LEI, Xing-hua LI, Hai LIU, et al. Dummy trajectory privacy protection scheme for trajectory publishing based on the spatiotemporal correlation[J]. Journal on communications, 2016, 37(12): 156-164. DOI: 10.11959/j.issn.1000-436x.2016281.
从轨迹的整体方向、轨迹中相邻位置的时间可达及移动距离对单条轨迹中相邻位置间的时空关联性和轨迹间的相似性进行分析,提出了一种基于时空关联性的假轨迹隐私保护方案。安全性分析表明所提方案能有效混淆假轨迹与真实轨迹,避免攻击者识别出假轨迹。大量实验表明,所提方案在仅需较少计算时间的同时,能确保生成的假轨迹与真实轨迹具有相似性,从而有效保护轨迹发布中用户的轨迹隐私。
The spatiotemporal correlation was analyzed between neighboring locations and the trajectories similarity from the movement direction
the reachable time between neighboring locations and the movement distance
and a dummy trajectory privacy protection scheme based on the spatiotemporal correlation was proposed. Security analysis shows that the presented scheme successfully confuses the user's real trajectory with dummy trajectories
thereby pro-tecting the user's trajectory privacy. Furthermore
extensive experiments indicate that the presented scheme not only has the limited computation cost
but also ensures that the generated dummy trajectories are similar to the user's real trajectory.
KRUMM J . A survey of computational location privacy [J ] . Personal and Ubiquitous Computing , 2009 , 13 ( 6 ): 391 - 399 .
霍峥 , 孟小峰 . 轨迹隐私保护技术研究 [J ] . 计算机学报 , 2011 , 34 ( 10 ): 1820 - 1830 .
ZHENG H , MENG X F . A survey of trajectory privacy-preserving techniques [J ] . Chinese Journal of Computers , 2011 , 34 ( 10 ): 1820 - 1830 .
CHOW C Y , MOKBEL M F . Trajectory privacy in location-based services and data publication [J ] . ACM SIGKDD Explorations News-letter , 2011 , 13 ( 1 ): 19 - 29 .
ZHANG Z , SUN Y , XIE X , et al . An efficient method on trajectory privacy preservation [C ] // International Conference on Big Data Computing and Communications. Springer International Publishing . 2015 : 231 - 240 .
YOU T H , PENG W C , LEE W C . Protecting moving trajectories with dummies [C ] // 2007 International Conference on Mobile Data Man-agement. IEEE , 2007 : 278 - 282 .
LEI P R , PENG W C , SU I J , et al . Dummy-based schemes for pro-tecting movement trajectories [J ] . Journal of Information Science and Engineering , 2012 , 28 ( 2 ): 335 - 350 .
WU X , SUN G . A novel dummy-based mechanism to protect privacy on trajectories [C ] // 2014 IEEE International Conference on Data Min-ing Workshop (ICDMW). IEEE , 2014 : 1120 - 1125 .
李凤华 , 张翠 , 牛犇 , 等 . 高效的轨迹隐私保护方案 [J ] . 通信学报 , 2015 , 36 ( 12 ): 114 - 123 .
LI F H , ZHANG C , NUI B , et al . Efficient scheme for user's trajectory privacy [J ] . Journal on Communications , 2015 , 36 ( 12 ): 114 - 123 .
XU T , CAI Y . Exploring historical location data for anonymity preser-vation in location-based services [C ] // The 27th Conference on Com-puter Communications. IEEE , 2008 .
王超 , 杨静 , 张健沛 . 基于轨迹位置形状相似性的隐私保护算法 [J ] . 通信学报 , 2015 , 36 ( 2 ): 144 - 157 .
WANG C , YANG J , ZHANG J P . Privacy preserving algorithm based on trajectory location and shape similarity [J ] . Journal on Communica-tions , 2015 , 36 ( 2 ): 144 - 157 .
王爽 , 周福才 , 吴丽娜 . 移动对象不确定轨迹隐私保护算法研究 [J ] . 通信学报 , 2015 , 36 ( Z1 ): 94 - 102 .
WANG S , ZHOU F C , WU L N . Uncertain trajectory privacy pre-serving method of moving object [J ] . Journal on Communications , 2015 , 36 ( Z1 ): 94 - 102 .
TERROVITIS M , MAMOULIS N . Privacy preservation in the publi-cation of trajectories [C ] // 9th International Conference on Mobile Data Management. IEEE , 2008 : 65 - 72 .
赵婧 , 张渊 , 李兴华 , 等 . 基于轨迹频率抑制的轨迹隐私保护方法 [J ] . 计算机学报 , 2014 , 37 ( 10 ): 2096 - 2106 .
ZHAO J , ZHANG Y , LI X H , et al . A trajectory privacy protection approach via trajectory frequency suppression [J ] . Chinese Journal of Computers , 2014 , 37 ( 10 ): 2096 - 2106 .
KIDO H , YANAGISAWA Y , SATOH T . An anonymous communication technique using dummies for location-based services [C ] // International Conference on Pervasive Services. IEEE , 2005 : 88 - 97 .
KIDO H , YANAGISAWA Y , SATOH T . Protection of location privacy using dummies for location-based services [C ] // 21st International Confer-ence on Data Engineering Workshops. IEEE , 2005 : 1248 - 1248 .
LU H , JENSEN C S , YIU M L . Pad: privacy-area aware, dummy-based location privacy in mobile services [C ] // The Seventh ACM In-ternational Workshop on Data Engineering for Wireless and Mobile Access. ACM , 2008 : 16 - 23 .
NIU B , LI Q , ZHU X , et al . Achieving k-anonymity in privacy-aware location-based services [C ] // IEEE INFOCOM 2014-IEEE Conference on Computer Communications. IEEE , 2014 : 754 - 762 .
HUO Z , HUANG Y , MENG X . History trajectory privacy-preserving through graph partition [C ] // The 1st International Workshop on Mobile Location-Based Service. ACM , 2011 : 71 - 78 .
0
浏览量
908
下载量
10
CSCD
关联资源
相关文章
相关作者
相关机构