共查询到18条相似文献,搜索用时 421 毫秒
1.
为解决绝大多数研究未充分考虑位置对隐私预算的敏感程度以及轨迹形状带来的影响,使发布的轨迹可用性较差的问题,提出了基于相对熵和K-means的形状相似差分隐私轨迹保护机制。首先,根据地理空间的拓扑关系,利用相对熵计算真实位置对隐私预算的敏感程度,设计了位置敏感的隐私级别实时计算算法,并与差分隐私预算结合建立了一个新的隐私模型。其次,通过K-means算法对发布位置进行聚类,得到与真实位置方向最相似的发布位置集合,并引入Fréchet距离衡量发布轨迹与真实轨迹的相似性,提升发布轨迹的可用性。通过对真实数据集的实验表明,所提轨迹保护机制与其他方法相比在轨迹可用性方面有明显的优势。 相似文献
2.
3.
位置轨迹大数据的安全分享、发布需求离不开位置轨迹隐私保护技术支持。在差分隐私出现之前,K-匿名及其衍生模型为位置轨迹隐私保护提供了一种量化评估的手段,但其安全性严重依赖于攻击者所掌握的背景知识,当有新的攻击出现时模型无法提供完善的隐私保护。差分隐私技术的出现有效地弥补了上述问题,越来越多地应用于轨迹数据隐私发布领域中。该文对基于差分隐私理论的轨迹隐私保护技术进行了研究与分析,重点介绍了差分隐私模型下位置直方图、轨迹直方图等空间统计数据发布方法,差分隐私模型下轨迹数据集发布方法,以及连续轨迹实时发布隐私保护模型。与此同时,在对现有方法对比分析的基础上,提出了未来的重点发展方向。 相似文献
4.
随着移动设备和定位技术的发展,产生了大量的移动对象轨迹数据,相伴而来的是个人隐私泄露问题。现有的轨迹隐私保护研究均假设轨迹数据是准确无误的,但由于数据采集设备不精确、移动对象延迟更新等原因,轨迹数据不确定性普遍存在。提出了一种基于K-匿名的不确定轨迹数据隐私保护方法,对发布的数据进行隐私处理,该方法首次将线性轨迹转化为不确定区域的思想引进轨迹数据的隐私处理。首先,使用概率统计的方法将轨迹泛化成一个更为真实的轨迹区域,然后将相似度高的轨迹域聚合成等价类进行数据的隐匿和发布,最后在真实的数据集上进行实验。 相似文献
5.
6.
张艳格 《微电子学与计算机》2017,(2):132-135
在对异构社交网络中用户轨迹进行隐匿时,当前方法大多针对用户单个位置进行轨迹隐匿,不适于复杂的异构社交网络.为此,提出一种新的基于假轨迹的异构社交网络中用户轨迹隐匿方法,通过一个例子对所提方法的基本思想进行分析.对假轨迹方法进行概述,在中心服务器系统结构上实现.给出单个位置的暴露风险、轨迹暴露风险、距离偏移度的概念和计算公式.为了避免攻击者判断出用户真实轨迹的概率,提出记忆规则进行优化.将查询消息、真实位置等参数传输至隐私保护服务器,隐私保护服务器依据用户参数要求和记忆规则产生满足条件的假位置,将含有假位置的匿名框传输至服务提供商,隐私保护服务器对返回的查询结果进行求精后传输至用户.实验结果表明,采用所提方法得到的轨迹数据有很高的可用性. 相似文献
7.
基于匿名化技术的理论基础,采用DBSCAN聚类算法对数据记录进行聚类,实现将个体记录匿名化隐藏于一组记录中。为提高隐私保护程度,对匿名化划分的数据添加拉普拉斯噪声,扰动个体数据真实值,以实现差分隐私保护模型的要求。通过聚类,分化查询函数敏感性,提高数据可用性。对算法隐私性进行证明,并实验说明发布数据的可用性。 相似文献
8.
9.
10.
11.
The spatiotemporal correlation was analyzed between neighboring locations and the trajectories similarity from the movement direction, the reachable time between neighboring locations and the movement distance, and a dummy trajectory privacy protection scheme based on the spatiotemporal correlation was proposed. Security analysis shows that the presented scheme successfully confuses the user's real trajectory with dummy trajectories, thereby pro-tecting the user's trajectory privacy. Furthermore, extensive experiments indicate that the presented scheme not only has the limited computation cost, but also ensures that the generated dummy trajectories are similar to the user's real trajectory. 相似文献
12.
13.
《Journal of Location Based Services》2013,7(4):246-271
Trajectory classification is the process of predicting the class label of moving objects based on their trajectories and other features. Existing works on building trajectory classification model discover features by using spatial distribution and shape of sub-trajectory. However, they do not utilise duration and region association information available in trajectory data during feature generation. In this study, trajectory features are generated using spatial distribution, duration and region association information of trajectories. In particular, two types of features, region rules and path rules, are generated from trajectories for classification. Region rules consider the spatial distribution of trajectories, the time spent (duration) by the trajectories in the region and the association information with other regions. Path rules differentiate objects based on their travelling patterns and speed. Efficient algorithms are devised to obtain region rules and path rules. Based on the discovered rule, trajectory classification model is built to predict the class label of new trajectory. Experimental results on various real-world data-sets show that incorporating duration and region association information in trajectory classification improves accuracy. 相似文献
14.
多元假设检验GMPHD轨迹跟踪 总被引:3,自引:0,他引:3
由于在军事和民事领域逐步广泛的应用,数目不定的多目标跟踪技术正受到越来越多的关注。概率假设密度(PHD)滤波方法,特别是具有闭式递归的高斯混合概率假设密度(GMPHD)技术,在噪声和漏警等影响下仍能形成优越的群目标跟踪性能。然而PHD滤波器并不能实现多目标航迹跟踪,而其与传统数据互联的结合,复杂度高且跟踪效果不尽如人意。在该文中,各目标的航迹信息以假设形式表述,数据互联则是通过使用经典的多元假设检测方法判决假设矩阵实现。其与GMPHD的结合不仅实现了数据互联和轨迹管理,还因为积累时间信息大大降低了杂波干扰的影响。实验结果证明,该算法可以对多个目标所形成的轨迹实施正确跟踪,同时,计算量的大幅度降低带来了跟踪系统可实现性的提高。 相似文献
15.
移动对象轨迹stop区域发现是轨迹数据分析的一个重要方面.提出基于VR-tree的轨迹stop区域快速发现方法.首先选择一条轨迹使用DBSCAN算法得到stop区域,把它们作为其他轨迹的stop区域候选,构建VR-tree;然后,对于剩余每条轨迹,先与VR-tree比较,找到与其中的stops相交的区域,标记轨迹包含在这些区域中的点,再对轨迹中其他点使用DBSCAN算法得到新的stops,并将它们作为其他轨迹的候选插入到VR-tree中.每条轨迹的stops由与VR-tree比较获得的stops和新stops区域按照区域覆盖率合并得到.实验使用真实数据集,证明本方法与基于密度的轨迹stop发现方法相比,不仅能很好发现轨迹stops,而且效率提高近60%. 相似文献
16.
Sheng Gao Jianfeng Ma Weisong Shi Guoxing Zhan 《Wireless Communications and Mobile Computing》2015,15(1):155-169
The ubiquity of mobile devices has facilitated the prevalence of participatory sensing, whereby ordinary citizens use their private mobile devices to collect regional information and to share with participators. However, such applications may endanger the users' privacy by revealing their locations and trajectories information. Most of existing solutions, which hide a user's location information with a coarse region, are under k‐anonymity model. Yet, they may not be applicable in some participatory sensing applications that require precise location information. The goals are seemingly contradictory: to protect a user's location privacy while simultaneously providing precise location information for a high quality of service. In this paper, we propose a method to meet both goals. Through selecting a certain number of a user's partners, it can protect the user's location privacy while providing precise location information. The user's trajectory privacy can be protected by constructing several trajectories that are similar to the user's trajectory in an interval time T. Finally, we utilize a new metric, called slope ratio, to evaluate the partners' selection algorithm that we proposed. Then, we measure the privacy level that the location and trajectory privacy protection mechanism (LTPPM) can achieve. The analysis and simulation results show that LTPPM can protect the user's location and trajectory privacy effectively and also provide a high quality of service in participatory sensing. Copyright © 2012 John Wiley & Sons, Ltd. 相似文献
17.
18.
In order to solve the problem existing in differential privacy preserving publishing methods that the independent noise was easy to be filtered out,a differential privacy publishing method for trajectory data (CLM),was proposed.A correlated Laplace mechanism was presented by CLM,which let Gauss noises pass through a specific filter to produce noise whose auto-correlation function was similar with original trajectory series.Then the correlated noise was added to the original track and the perturbed track was released.The experimental results show that the proposed method can achieve higher privacy protection and guarantee better data utility compared with existing differential privacy preserving publishing methods for trajectory data. 相似文献