Privacy-Preserving Method for Trajectory Data Publication Based on Local Preferential Anonymity

被引:2
|
作者
Zhang, Xiao [1 ,2 ]
Luo, Yonglong [1 ,2 ]
Yu, Qingying [1 ,2 ]
Xu, Lina [1 ,2 ]
Lu, Zhonghao [1 ,2 ]
机构
[1] Anhui Normal Univ, Sch Comp & Informat, Wuhu 241003, Peoples R China
[2] Anhui Prov Key Lab Network & Informat Secur, Wuhu 241003, Peoples R China
基金
中国国家自然科学基金;
关键词
data processing; trajectory anonymity; privacy preservation; splitting; suppression; dummy trajectory;
D O I
10.3390/info14030157
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of mobile positioning technologies, location-based services (LBSs) have become more widely used. The amount of user location information collected and applied has increased, and if these datasets are directly released, attackers may infer other unknown locations through partial background knowledge in their possession. To solve this problem, a privacy-preserving method for trajectory data publication based on local preferential anonymity (LPA) is proposed. First, the method considers suppression, splitting, and dummy trajectory adding as candidate techniques. Second, a local preferential (LP) function based on the analysis of location loss and anonymity gain is designed to effectively select an anonymity technique for each anonymous operation. Theoretical analysis and experimental results show that the proposed method can effectively protect the privacy of trajectory data and improve the utility of anonymous datasets.
引用
收藏
页数:22
相关论文
共 50 条
  • [1] An overview of proposals towards the privacy-preserving publication of trajectory data
    Miranda-Pascual, Alex
    Guerra-Balboa, Patricia
    Parra-Arnau, Javier
    Forne, Jordi
    Strufe, Thorsten
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024,
  • [2] Privacy-preserving trajectory data publishing by local suppression
    Chen, Rui
    Fung, Benjamin C. M.
    Mohammed, Noman
    Desai, Bipin C.
    Wang, Ke
    [J]. INFORMATION SCIENCES, 2013, 231 : 83 - 97
  • [3] Anonymity-based Privacy Preserving Network Data Publication
    Liu, Peng
    Li, Yidong
    Sang, Yingpeng
    Zhang, Ji
    [J]. 2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 823 - 828
  • [4] An efficient method for privacy-preserving trajectory data publishing based on data partitioning
    Songyuan Li
    Hong Shen
    Yingpeng Sang
    Hui Tian
    [J]. The Journal of Supercomputing, 2020, 76 : 5276 - 5300
  • [5] An efficient method for privacy-preserving trajectory data publishing based on data partitioning
    Li, Songyuan
    Shen, Hong
    Sang, Yingpeng
    Tian, Hui
    [J]. JOURNAL OF SUPERCOMPUTING, 2020, 76 (07): : 5276 - 5300
  • [6] A Clustering-Based Privacy-Preserving Method for Uncertain Trajectory Data
    Cai, Zhou-Fu
    Yang, He-Xing
    Shuang, Wang
    Jian, Xu
    Wei, Wang-Ming
    Na, Wu-Li
    [J]. 2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 1 - 8
  • [7] Graph-Based Privacy-Preserving Data Publication
    Li, Xiang-Yang
    Zhang, Chunhong
    Jung, Taeho
    Qian, Jianwei
    Chen, Linlin
    [J]. IEEE INFOCOM 2016 - THE 35TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS, 2016,
  • [8] Trajectory Privacy-Preserving Approach for Consecutive Queries Based on K-Anonymity
    Zhu, Lin
    [J]. FUZZY SYSTEMS AND DATA MINING III (FSDM 2017), 2017, 299 : 416 - 421
  • [9] A Sampling-Based Method for Highly Efficient Privacy-Preserving Data Publication
    Lu, Guoming
    Zheng, Xu
    Duan, Jingyuan
    Tian, Ling
    Wang, Xia
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [10] TPPG: Privacy-preserving trajectory data publication based on 3D-Grid partition
    Chen, Chuanming
    Luo, Yonglong
    Yu, Qingying
    Hu, Guiyin
    [J]. INTELLIGENT DATA ANALYSIS, 2019, 23 (03) : 503 - 533