首页 | 本学科首页   官方微博 | 高级检索  
     

防止暴露位置攻击的轨迹隐私保护
引用本文:刘向宇,陈金梅,夏秀峰,Manish Singh,宗传玉,朱睿. 防止暴露位置攻击的轨迹隐私保护[J]. 计算机应用, 2020, 40(2): 479-485. DOI: 10.11772/j.issn.1001-9081.2019081612
作者姓名:刘向宇  陈金梅  夏秀峰  Manish Singh  宗传玉  朱睿
作者单位:沈阳航空航天大学 计算机学院,沈阳 110136
惠灵顿理工学院 信息与商科学院,新西兰 下哈特 5010
基金项目:辽宁省自然科学基金计划重点项目(20170520321)
摘    要:为解决移动对象轨迹信息被大量收集所导致的轨迹隐私泄露问题,提出了基于假轨迹的轨迹隐私保护算法。在该算法中,考虑了用户的暴露位置,基于轨迹相似性和位置多样性的综合度量,设计了一种启发式规则来选择假轨迹,从而使得生成的假轨迹能有效隐匿真实轨迹和敏感位置。此外,还提出了轨迹有向图策略和基于网格划分的地图策略来优化算法的执行效率。基于真实的轨迹数据进行实验测试和分析,实验结果表明所提算法在保持数据可用性的情况下能有效保护真实轨迹。

关 键 词:轨迹隐私保护  假轨迹  数据发布  匿名化  数据可用性  
收稿时间:2019-08-14
修稿时间:2019-08-27

Preventing location disclosure attacks through generating dummy trajectories
Xiangyu LIU,Jinmei CHEN,Xiufeng XIA,Manish Singh,Chuanyu ZONG,Rui ZHU. Preventing location disclosure attacks through generating dummy trajectories[J]. Journal of Computer Applications, 2020, 40(2): 479-485. DOI: 10.11772/j.issn.1001-9081.2019081612
Authors:Xiangyu LIU  Jinmei CHEN  Xiufeng XIA  Manish Singh  Chuanyu ZONG  Rui ZHU
Affiliation:College of Computer Science,Shenyang Aerospace University,Shenyang Liaoning 110136,China
School of IT and Business,Wellington Institute of Technology,Lower Hutt 5010,New Zealand
Abstract:In order to solve the problem of trajectory privacy leakage caused by the collection of numerous trajectory information of moving objects, a dummy trajectory-based trajectory privacy protection algorithm was proposed. In this algorithm, considering the user’s locations under disclosure, a heuristic rule was designed based on the comprehensive measure of trajectory similarity and location diversity to select the dummy trajectories, so that the generated dummy trajectories were able to effectively hide the real trajectory and sensitive locations. Besides, the trajectory directed graph strategy and the grid-based map strategy were proposed to optimize the execution efficiency of the algorithm. Experimental results on real trajectory datasets demonstrate that the proposed algorithm can effectively protect the real trajectory with high data utility.
Keywords:trajectory privacy protection   dummy trajectory   data publishing   anonymization   data utility
本文献已被 维普 万方数据 等数据库收录!
点击此处可从《计算机应用》浏览原始摘要信息
点击此处可从《计算机应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号