首页 | 官方网站   微博 | 高级检索  
     

隐私保护轨迹数据发布的l-差异性算法
引用本文:郭旭东,吴英杰,杨文进,王晓东.隐私保护轨迹数据发布的l-差异性算法[J].计算机工程与应用,2015,51(2):125-130.
作者姓名:郭旭东  吴英杰  杨文进  王晓东
作者单位:福州大学 数学与计算机科学学院,福州 350108
基金项目:福建省自然科学基金(No.2010J01330);福州大学科技发展基金(No.2012-XQ-27)。
摘    要:针对基于传统的k-匿名模型下移动用户轨迹数据发布隐私保护算法有可能将相似度极高的轨迹匿名在同一个匿名集中从而导致可能出现的用户个人隐私泄露风险的不足。设计了一种新的轨迹数据发布隐私保护算法。该算法基于k-匿名模型,将轨迹所在的二维空间划分成大小相等的单元格,之后将由轨迹数据得到对应轨迹经过的单元格序列,从而定义轨迹k-匿名下的l-差异性,算法在满足k-匿名模型的前提下通过聚类的方法构建匿名集,并保证匿名集中的轨迹满足l-差异性标准,以达到降低由于差异性不足引起用户隐私泄露的风险的目的。实验结果表明,该算法是可行有效的。

关 键 词:隐私保护  差异性  k-匿名  轨迹数据发布  

l-diversity algorithm for privacy preserving trajectory data pub-lishing
GUO Xudong,WU Yingjie,YANG Wenjin,WANG Xiaodong.l-diversity algorithm for privacy preserving trajectory data pub-lishing[J].Computer Engineering and Applications,2015,51(2):125-130.
Authors:GUO Xudong  WU Yingjie  YANG Wenjin  WANG Xiaodong
Affiliation:College of Mathematics and Computer Science, Fuzhou University, Fuzhou 350108, China
Abstract:Based on k-anonymity model, the traditional algorithm which protects mobile objects’trajectory data when they are publishing has a possibility of leaking the objects’personal privacy. To solve this problem, this thesis designs a new kind of algorithm which can protect trajectory data privacy when publishing. This algorithm is based on k-anonymity, divides the two-dimensional space into cells of equal size, defines the standard of l-diversity under trajectory, structures anonymous set via clustering under the premise of k-anonymity model and makes sure that the trajectories which gather anonymously meet the standard of l-diversity so as to minimize the risk of leaking user’s privacy that caused by the lack of diversity. The experimental results show that this algorithm is feasible and effective.
Keywords:privacy preservation  diversity  k-anonymity  trajectory data publication
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《计算机工程与应用》浏览原始摘要信息
点击此处可从《计算机工程与应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号