Dummy trajectory privacy protection scheme for trajectory publishing based on the spatiotemporal correlation
Academic communication|更新时间:2024-06-05
|
Dummy trajectory privacy protection scheme for trajectory publishing based on the spatiotemporal correlation
Journal on CommunicationsVol. 37, Issue 12, Pages: 156-164(2016)
作者机构:
西安电子科技大学网络与信息安全学院,陕西 西安 710071
作者简介:
基金信息:
The National Natural Science Foundation of China(61372075);The National Natural Science Foundation of China(U1405255);The National Natural Science Foundation of China(61202389);The National Natural Science Foundation of China(61472310)
Kai-yue LEI, Xing-hua LI, Hai LIU, et al. Dummy trajectory privacy protection scheme for trajectory publishing based on the spatiotemporal correlation[J]. Journal on Communications, 2016, 37(12): 156-164.
DOI:
Kai-yue LEI, Xing-hua LI, Hai LIU, et al. Dummy trajectory privacy protection scheme for trajectory publishing based on the spatiotemporal correlation[J]. Journal on Communications, 2016, 37(12): 156-164. DOI: 10.11959/j.issn.1000-436x.2016281.
Dummy trajectory privacy protection scheme for trajectory publishing based on the spatiotemporal correlation
The spatiotemporal correlation was analyzed between neighboring locations and the trajectories similarity from the movement direction
the reachable time between neighboring locations and the movement distance
and a dummy trajectory privacy protection scheme based on the spatiotemporal correlation was proposed. Security analysis shows that the presented scheme successfully confuses the user's real trajectory with dummy trajectories
thereby pro-tecting the user's trajectory privacy. Furthermore
extensive experiments indicate that the presented scheme not only has the limited computation cost
but also ensures that the generated dummy trajectories are similar to the user's real trajectory.
关键词
Keywords
references
KRUMM J . A survey of computational location privacy [J ] . Personal and Ubiquitous Computing , 2009 , 13 ( 6 ): 391 - 399 .
ZHENG H , MENG X F . A survey of trajectory privacy-preserving techniques [J ] . Chinese Journal of Computers , 2011 , 34 ( 10 ): 1820 - 1830 .
CHOW C Y , MOKBEL M F . Trajectory privacy in location-based services and data publication [J ] . ACM SIGKDD Explorations News-letter , 2011 , 13 ( 1 ): 19 - 29 .
ZHANG Z , SUN Y , XIE X , et al . An efficient method on trajectory privacy preservation [C ] // International Conference on Big Data Computing and Communications. Springer International Publishing . 2015 : 231 - 240 .
YOU T H , PENG W C , LEE W C . Protecting moving trajectories with dummies [C ] // 2007 International Conference on Mobile Data Man-agement. IEEE , 2007 : 278 - 282 .
LEI P R , PENG W C , SU I J , et al . Dummy-based schemes for pro-tecting movement trajectories [J ] . Journal of Information Science and Engineering , 2012 , 28 ( 2 ): 335 - 350 .
WU X , SUN G . A novel dummy-based mechanism to protect privacy on trajectories [C ] // 2014 IEEE International Conference on Data Min-ing Workshop (ICDMW). IEEE , 2014 : 1120 - 1125 .
LI F H , ZHANG C , NUI B , et al . Efficient scheme for user's trajectory privacy [J ] . Journal on Communications , 2015 , 36 ( 12 ): 114 - 123 .
XU T , CAI Y . Exploring historical location data for anonymity preser-vation in location-based services [C ] // The 27th Conference on Com-puter Communications. IEEE , 2008 .
WANG C , YANG J , ZHANG J P . Privacy preserving algorithm based on trajectory location and shape similarity [J ] . Journal on Communica-tions , 2015 , 36 ( 2 ): 144 - 157 .
WANG S , ZHOU F C , WU L N . Uncertain trajectory privacy pre-serving method of moving object [J ] . Journal on Communications , 2015 , 36 ( Z1 ): 94 - 102 .
TERROVITIS M , MAMOULIS N . Privacy preservation in the publi-cation of trajectories [C ] // 9th International Conference on Mobile Data Management. IEEE , 2008 : 65 - 72 .
ZHAO J , ZHANG Y , LI X H , et al . A trajectory privacy protection approach via trajectory frequency suppression [J ] . Chinese Journal of Computers , 2014 , 37 ( 10 ): 2096 - 2106 .
KIDO H , YANAGISAWA Y , SATOH T . An anonymous communication technique using dummies for location-based services [C ] // International Conference on Pervasive Services. IEEE , 2005 : 88 - 97 .
KIDO H , YANAGISAWA Y , SATOH T . Protection of location privacy using dummies for location-based services [C ] // 21st International Confer-ence on Data Engineering Workshops. IEEE , 2005 : 1248 - 1248 .
LU H , JENSEN C S , YIU M L . Pad: privacy-area aware, dummy-based location privacy in mobile services [C ] // The Seventh ACM In-ternational Workshop on Data Engineering for Wireless and Mobile Access. ACM , 2008 : 16 - 23 .
NIU B , LI Q , ZHU X , et al . Achieving k-anonymity in privacy-aware location-based services [C ] // IEEE INFOCOM 2014-IEEE Conference on Computer Communications. IEEE , 2014 : 754 - 762 .
HUO Z , HUANG Y , MENG X . History trajectory privacy-preserving through graph partition [C ] // The 1st International Workshop on Mobile Location-Based Service. ACM , 2011 : 71 - 78 .