首页 | 官方网站   微博 | 高级检索  
     

不确定环境下轨迹k-匿名隐私保护
引用本文:朱麟,黄胜波. 不确定环境下轨迹k-匿名隐私保护[J]. 计算机应用, 2015, 35(12): 3437-3441. DOI: 10.11772/j.issn.1001-9081.2015.12.3437
作者姓名:朱麟  黄胜波
作者单位:公安海警学院电子技术系, 浙江宁波 315801
基金项目:公安部重点研究计划项目(201201ZDYJ013);第四批宁波市高校重点建设学科军事通信学资助项目(甬教高[2013]169号)。
摘    要:综合考虑不确定环境下移动对象的影响因素,提出了对船舶自动导航系统所记录的轨迹进行k-匿名的隐私保护方法。该方法首先建立一个不确定空间索引,并将不确定空间用四叉树结构存储,然后通过使用连续近邻查询方法找出与当前轨迹相似区域的轨迹,并将这些轨迹加入匿名候选集。由于考虑到路网规模影响匿名信息的有效性以及攻击者对轨迹的攻击概率,采用启发式算法生成匿名轨迹最佳利用链,从而加大对轨迹隐私保护的力度。最后实验结果表明,所提出的方法比传统方法信息丢失率降低了20%~50%,信息扭曲度随着查询范围的增大能保持在50%以下,代价损失相比传统方法降低了10%~30%。该方法可以有效防止恶意者对轨迹进行攻击获取信息,应用于公务船艇海上执勤执法。

关 键 词:轨迹隐私  k-匿名  最佳利用链  不确定空间  隐私保护  
收稿时间:2015-06-11
修稿时间:2015-08-29

K-anonymity privacy-preserving for trajectory in uncertain environment
ZHU Lin,HUANG Shengbo. K-anonymity privacy-preserving for trajectory in uncertain environment[J]. Journal of Computer Applications, 2015, 35(12): 3437-3441. DOI: 10.11772/j.issn.1001-9081.2015.12.3437
Authors:ZHU Lin  HUANG Shengbo
Affiliation:Department of Electronics, China Maritime Police Academy, Ningbo Zhejiang 315801, China
Abstract:To comprehensively consider the factors influencing the moving objects in uncertain environment, a k-anonymity privacy-preserving method for the trajectory recorded by automatic identification system was presented. Firstly, an uncertain spatial index model was established which was stored in grid quadtree. Then the continuous k-Nearest Neighbor (KNN) query method was used to find the trajectory which had the similar area to the current trajectory, and the trajectory was added to the anonymous candidate set. By considering the network scale influence on the effectiveness of the anonymous information and the probability of attacker's attack on trajectory, the optimal exploit chain of trajectory was generated by using the heuristic algorithm to strengthen the trajectory privacy-preserving. Finally, the experimental results show that, compared with the traditional method, the proposed method can decrease the information loss by 20% to 50%,while the information distortion can maintain below 50% with the enlarge of query range and the cost loss is cut down by 10% to 30%.The proposed method can effectively prevent malicious attackers from the information access of trajectory,and can be applied for the official boat to law enforcement at sea.
Keywords:trajectory privacy, k-anonymity')"  >k-anonymity, optimal exploit chain, uncertain space, privacy-preserving
点击此处可从《计算机应用》浏览原始摘要信息
点击此处可从《计算机应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号