期刊文献+

一种基于停顿和映射的隐私轨迹混淆策略

A Privacy Trajectory Obfuscation Strategy Based on Pause and Mapping
在线阅读 下载PDF
导出
摘要 针对现有的轨迹隐私保护策略的不足,如K-匿名策略需要主动发送请求,而真实使用场景下只能被动等待接口调用等情况,提出了一种新的隐私轨迹混淆策略,能在保护用户隐私的基础上尽可能保证LBS的使用.该策略核心思想包括3个方面:延迟使用,即将当前混淆区域中心置为用户一段时间前的真实位置;停顿处理,即考虑到真实轨迹中存在的停顿现象,当用户短时间停顿时虚拟轨迹也随之停顿;固定点映射,即在某些需要被暴露或固定映射的定位上采用映射点方法将真实定位映射为虚假定位.实验表明该策略既能保护用户定位隐私,又能最大程度地使用LBS. In view of the deficiencies of the existing trajectory privacy protection strategies,such as K-anonymization that needs to actively send requests,but can only passively wait for interface calls in real usage scenarios,a new trajectory privacy confusion strategy is proposed to ensure the use of LBS on the basis of protecting user’s privacy.The core idea of this strategy includes three aspects:Delayed use-the center of the current confusion area is set to the user’s real position some time ago;the processing of pause-considering the pause phenomenon in the real trajectory,when the user pauses for a short time,the dummy trajectory will also pause;fixed-point mapping-in some locations that need to be exposed or fixed-mapped,the point mapping method is used to map the real location to the dummy location.Experiments show that this strategy can not only protect user positioning privacy but also maximize the use of LBS.
作者 唐禹 吴正华 Tang Yu;Wu Zhenghua(School of Information and Software Engineering,University of Electronic Science and Technology of China,Chengdu 611731)
出处 《信息安全研究》 2021年第12期1143-1149,共7页 Journal of Information Security Research
基金 四川省科技厅重点项目(2020YFG0021)。
关键词 轨迹隐私 轨迹混淆 假轨迹 轨迹隐私保护 基于位置的服务 trajectory privacy trajectory confusion dummy-based trajectory trajectory protection location-based services
作者简介 唐禹,硕士研究生.主要研究方向为隐私保护、信息安全.alfred.y.tang@outlook.com;通信作者:吴正华,博士,副教授.主要研究方向为人工智能.wzhzxwz@sina.com。
  • 相关文献

参考文献4

二级参考文献26

  • 1Lee G J,Han J W,Li X L. Trajectory outlier detec-tion:a partition-and-detect framework[A].Cancun,Mexico,2008.140149.
  • 2Lee J G,Han J W,Li X L. TraClass:trajectory classi-fication using hierarchical region-based and trajectory-based clustering[A].Auckland,New Zealand,2008.10811094.
  • 3Lee J G;Han J W;Whang K Y.Trajectory clustering:a partition-and-group framework[A]{H}北京,2007593604.
  • 4Li X L,Han J W,Kim S. Anomaly detection in moving object[A].{H}Heidelberg:Springer-Verlag,2008.357381.
  • 5Nanni M,Pedreschi D. Time-focused clustering of traj-ectories of moving objects[J].{H}JOURNAL OF INTELLIGENT INFORMATION SYSTEMS,2006,(3):267289.
  • 6张莎妮;刘良旭;叶思敏.一种基于局部位置无关的轨迹片段聚类算法[J]{H}计算机研究与发展,2012(z1):186189.
  • 7胡立;陈健;沈书毅.基于用户轨迹聚类分析的推荐算法研究[J]{H}计算机研究与发展,2012(z1):250256.
  • 8Chow Chi-Yin,Mokbel M F. Trajectory privacy in lo-cation-based services and data publication[J].ACM SIGKDD Explorations Newsletter,2011,(1):1929.
  • 9Abul O,Bonchi F,Nanni M. Never walk alone:un-certainty for anonymity in moving objects databases[A].Cancun,Mexico,2008.376385.
  • 10Hoh B,Gruteser M,Xiong H. Achieving guar-anteed anonymity in GPS traces via uncertainty-aware path cloaking[J].IEEE Transactions on Mobile Com-puting,2010,(8):108910007.

共引文献27

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部