首页 | 官方网站   微博 | 高级检索  
     

基于轨迹形状多样性的隐私保护算法
引用本文:孙丹丹,罗永龙,范国婷,郭良敏,郑孝遥.基于轨迹形状多样性的隐私保护算法[J].计算机应用,2016,36(6):1544-1551.
作者姓名:孙丹丹  罗永龙  范国婷  郭良敏  郑孝遥
作者单位:1. 安徽师范大学 计算机科学与技术系, 安徽 芜湖 241003;2. 安徽师范大学 网络与信息安全工程技术研究中心, 安徽 芜湖 241003
基金项目:国家自然科学基金资助项目(61370050);安徽省自然科学基金资助项目(1508085QF133);安徽省高校省级自然科学研究重点项目(KJ2014A084)。
摘    要:针对匿名集内轨迹间的高度相似性而导致的轨迹隐私泄露问题,提出基于轨迹形状多样性的隐私保护算法。该算法通过轨迹同步化处理的方式改进轨迹数据的预处理过程,以减少信息损失;并借鉴l-多样性思想,在贪婪聚类时选择l条具有形状多样性的轨迹作为匿名集成员,以防止集合内成员轨迹的形状相似性过高而导致轨迹形状相似性攻击。理论分析及实验结果均表明,该算法能够在保证轨迹k-匿名的同时满足l-多样性,算法运行时间较小,且减少了轨迹信息损失,增强了轨迹数据的可用性,更好地实现了轨迹隐私保护,可有效应用到隐私保护轨迹数据发布中。

关 键 词:轨迹数据发布  隐私保护  轨迹匿名  k-匿名  l-多样性  
收稿时间:2015-11-16
修稿时间:2016-01-13

Privacy protection algorithm based on trajectory shape diversity
SUN Dandan,LUO Yonglong,FAN Guoting,GUO Liangmin,ZHENG Xiaoyao.Privacy protection algorithm based on trajectory shape diversity[J].journal of Computer Applications,2016,36(6):1544-1551.
Authors:SUN Dandan  LUO Yonglong  FAN Guoting  GUO Liangmin  ZHENG Xiaoyao
Affiliation:1. Department of Computer Science and Technology, Anhui Normal University, Wuhu Anhui 241003, China;2. Engineering Technology Research Center of Network and Information Security, Anhui Normal University, Wuhu Anhui 241003, China
Abstract:The high similarity between trajectories in anonymity set may lead to the trajectory privacy leak. In order to solve the problem, a trajectory privacy preserving algorithm based on trajectory shape diversity was proposed. The exiting pre-processing method was improved to reduce the loss of information through trajectory synchronization processing. And by l-diversity, the trajectories with shape diversity were chosen as the members of the anonymity set when greedy clustering. Too high shape similarity between member trajectories of the set was prevented to avoid the attack of trajectory shape similarity. The theoretical analysis and experimental results show that, the proposed algorithm can realize k-anonymity of trajectory and l-diversity concurrently, reduce the running time and trajectory information loss, increase the trajectory data availability and realize better privacy protection. The proposed algorithm can be effectively applied to the privacy-preserving trajectory data publishing.
Keywords:trajectory data publishing  privacy protection  trajectory anonymity  k-anonymity  l-diversity  
点击此处可从《计算机应用》浏览原始摘要信息
点击此处可从《计算机应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号