浏览全部资源
扫码关注微信
1. 福建师范大学数学与信息学院,福建 福州 350007
2. 福建省网络安全与密码技术重点实验室,福建 福州 350007
[ "叶阿勇(1977– ),男,福建福州人,博士,福建师范大学教授,主要研究方向为无线网络技术、隐私与安全、信息服务等" ]
[ "孟玲玉(1994– ),女,黑龙江安达人,福建师范大学硕士生,主要研究方向为网络空间安全、位置隐私保护等" ]
[ "赵子文(1992– ),男,山东枣庄人,福建师范大学硕士生,主要研究方向为网络空间安全、位置隐私保护等" ]
[ "刁一晴(1997– ),女,山东济南人,福建师范大学硕士生,主要研究方向为网络空间安全、区块链隐私保护等" ]
[ "张娇美(1995– ),女,河南洛阳人,福建师范大学硕士生,主要研究方向为网络空间安全、机器学习隐私保护等" ]
网络出版日期:2020-04,
纸质出版日期:2020-04-25
移动端阅览
叶阿勇, 孟玲玉, 赵子文, 等. 基于预测和滑动窗口的轨迹差分隐私保护机制[J]. 通信学报, 2020,41(4):123-133.
Ayong YE, Lingyu MENG, Ziwen ZHAO, et al. Trajectory differential privacy protection mechanism based on prediction and sliding window[J]. Journal on communications, 2020, 41(4): 123-133.
叶阿勇, 孟玲玉, 赵子文, 等. 基于预测和滑动窗口的轨迹差分隐私保护机制[J]. 通信学报, 2020,41(4):123-133. DOI: 10.11959/j.issn.1000-436x.2020049.
Ayong YE, Lingyu MENG, Ziwen ZHAO, et al. Trajectory differential privacy protection mechanism based on prediction and sliding window[J]. Journal on communications, 2020, 41(4): 123-133. DOI: 10.11959/j.issn.1000-436x.2020049.
为解决轨迹差分隐私保护中存在的隐私预算与服务质量等问题,提出了一种融合预测扰动的轨迹差分隐私保护机制。首先,利用马尔可夫链和指数扰动方法预测满足差分隐私和时空安全的扰动位置,并引入服务相似地图检测该位置的可用性;如果预测成功,则直接采用预测位置替代差分扰动的位置,以降低连续查询的隐私开销并提高服务质量。在此基础上,设计基于w滑动窗口的轨迹隐私预算分配机制,确保轨迹中任意连续的w次查询满足ε-差分隐私,解决连续查询的轨迹隐私问题。此外,基于敏感度地图设计一种隐私定制策略,通过自定义语义位置的隐私敏感度,实现隐私预算的量身定制,从而进一步提高其利用率。最后,利用真实数据集对所提方案进行实验分析,结果显示所提方案提供了更好的隐私保护水平和服务质量。
To address the issues of privacy budget and quality of service in trajectory differential privacy protection
a trajectory differential privacy mechanism integrating prediction disturbance was proposed.Firstly
Markov chain and exponential perturbation method were used to predict the location which satisfies the differential privacy and temporal and spatial security
and service similarity map was introduced to detect the availability of the location.If the prediction was successful
the prediction location was directly used to replace the location of differential disturbance
to reduce the privacy cost of continuous query and improve the quality of service.Based on this
the trajectory privacy budget allocation mechanism based on w sliding window was designed to ensure that any continuous w queries in the trajectory meet the ε-differential privacy and solve the trajectory privacy problem of continuous queries.In addition
a privacy customization strategy was designed based on the sensitivity map.By customizing the privacy sensitivity of semantic location
the privacy budget could be customized to improve its utilization.Finally
the validity of the scheme was verified by real data set experiment.The results illustrate that it offers the better privacy and quality of service.
MADDEN M , LENHART A , CORTESI S , et al . Pew internet and american life project [J ] . Washington,DC:Pew Research Center , 2010
DOBSON J E , FISHER P . Geoslavery [J ] . Technology and Society Magazine , 2003 , 22 ( 1 ): 47 - 52 .
ANDRÉS M E , BORDENABE N E , CHATZIKOKOLAKIS K . Geo-indistinguishability:differential privacy for location-based systems [C ] // Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security . New York:ACM Press , 2013 : 901 - 914 .
DWORK C , MCSHERRY F , NISSIM K . Calibrating noise to sensitivity in private data analysis [C ] // Theory of Cryptography Conference . Berlin:Springer , 2006 : 265 - 284 .
GRUTESER M , GRUNWALD D . Anonymous usage of location-based services through spatial and temporal cloaking [C ] // Proceedings of the 1st International Conference on Mobile Systems,Applications And Services . New York:ACM Press , 2003 : 31 - 42 .
NIU B , LI Q , ZHU X , et al . Achieving k-anonymity in privacy-aware location-based services [C ] // The 33rd Annual IEEE International Conference on Computer Communications . Piscataway:IEEE Press , 2014 : 754 - 762 .
HWANG R H , HSUEH Y L , CHUNG H W . A novel time-obfuscated algorithm for trajectory privacy protection [J ] . IEEE Transactions on Services Computing , 2013 , 7 ( 2 ): 126 - 139 .
WANG J , LI Y , YANG D , et al . Achieving effective k-anonymity for query privacy in location-based services [J ] . IEEE Access , 2017 ( 5 ): 24580 - 24592 .
KIDO H , YANAGISAWA Y , SATOH T . Protection of location privacy using dummies for location-based services [C ] // 21st International Conference on Data Engineering Workshops . Piscataway:IEEE Press , 2005 : 1248 - 1248 .
ANDRÉS M E , BORDENABE N E , CHATZIKOKOLAKIS K . Geo-indistinguishability:differential privacy for location-based systems [C ] // Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security . New York:ACM Press , 2013 : 901 - 914 .
XIAO Y , XIONG L . Protecting locations with differential privacy under temporal correlations [C ] // ACM Sigsac Conference on Computer and Communications Security . New York:ACM Press , 2015 : 1298 - 1309 .
HUA J , TONG W , XU F . A geo-indistinguishable location perturbation mechanism for location-based services supporting frequent queries [J ] . IEEE Transactions on Information Forensics and Security , 2017 , 13 ( 5 ): 1155 - 1168 .
吴云乘 , 陈红 , 赵素云 . 一种基于时空相关性的差分隐私轨迹保护机制 [J ] . 计算机学报 , 2018 , 41 ( 2 ): 309 - 322 .
WU Y C , CHEN H , ZHAO S Y . Differentially privacy trajectory protection based on spatial and temporal correlation [J ] . Chinese Journal of Computers , 2018 , 41 ( 2 ): 309 - 322 .
CHATZIKOKOLAKIS K , PALAMIDESSI C , STRONATI M . A predictive differentially-private mechanism for mobility traces [M ] // Privacy Enhancing Technologies . Berlin:Springer International Publishing , 2014 .
叶阿勇 , 李亚成 , 马建峰 , 等 . 基于服务相似性的 k-匿名位置隐私保护方法 [J ] . 通信学报 , 2014 , 35 ( 11 ): 162 - 169 .
YE A Y , LI Y C , MA J F , et al . Location privacy-preserving method of k-anonymous based on service similarity [J ] . Journal on Communications , 2014 , 35 ( 11 ): 162 - 169 .
ZHENG Y , XIE X , MA W Y . GeoLife:a collaborative social networking service among user,location and trajectory [J ] . IEEE Data Engineering Bulletin , 2010 , 33 ( 2 ): 32 - 39 .
CHO E , MYERS S A , LESKOVEC J . Friendship and mobility:user movement in location-based social networks [C ] // Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining . New York:ACM Press , 2011 : 1082 - 1090 .
0
浏览量
989
下载量
6
CSCD
关联资源
相关文章
相关作者
相关机构