Trajectory privacy protection on Spatial Streaming Data with Differential Privacy

被引:0
|
作者
Liu, Xiang [1 ]
Guo, Yuchun [1 ]
Chen, Yishuai [1 ]
Tan, Xiaoying [1 ]
机构
[1] Beijing Jiaotong Univ, Sch Elect & Informat Engn, Beijing, Peoples R China
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Continuously sharing user's trajectory data which contain one's location information makes the crowd sensing of the traffic dynamics and mobility trends feasible. This kind of spatial streaming data is beneficial for intelligent transportation but at the risk of disclosing personal privacy, even if it is published in statistical form such as "the number of users in an area at time t". The user number on a location at time t is similar to that of previous release on the same location, and to that on adjacent locations. Such spatio-temporal correlation makes it a challenge to find solutions to protect user's trajectory privacy. The state-ofthe-art privacy protection framework, differential privacy, has been extended to streaming scenario for preventing the privacy leak causing by the temporal correlation. However, such schemes neglect the importance of spatial correlation so that they may suffer the leak of user trajectory privacy or the degradation of data utility. Based on the observation that any piece of trajectory has temporal and spatial locality, we propose a flexible trajectory privacy model of omega-event n(2) -block differential privacy, short as (omega, n)-differential privacy, to ensure any trajectory occurring in an area of n x n blocks during omega successive timestamps under the protection of epsilon-differential privacy. Then we design the Spatial Temporal Budget Distribution (STBD) algorithm for achieving (omega, n)-differential privacy. Validation results of this algorithm on two real-life datasets and one synthetic dataset confirm its practicality.
引用
收藏
页数:7
相关论文
共 50 条
  • [21] Synthesizing Realistic Trajectory Data With Differential Privacy
    Sun, Xinyue
    Ye, Qingqing
    Hu, Haibo
    Wang, Yuandong
    Huang, Kai
    Wo, Tianyu
    Xu, Jie
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2023, 24 (05) : 5502 - 5515
  • [22] A privacy-preserving trajectory data synthesis framework based on differential privacy
    Ma, Tinghuai
    Deng, Qian
    Rong, Huan
    Al-Nabhan, Najla
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 77
  • [23] Location Data Record Privacy Protection Based on Differential Privacy Mechanism
    Gu, Ke
    Yang, Lihao
    Yin, Bo
    INFORMATION TECHNOLOGY AND CONTROL, 2018, 47 (04): : 639 - 654
  • [24] BiGRU-DP: Improved differential privacy protection method for trajectory data publishing
    Shen, Zihao
    Zhang, Yuyang
    Wang, Hui
    Liu, Peiqian
    Liu, Kun
    Shen, Yanmei
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 252
  • [25] Correlated differential privacy protection for big data
    Lv, Denglong
    Zhu, Shibing
    PROCEEDINGS 2018 IEEE 32ND INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2018, : 1011 - 1018
  • [26] Protection of user data by differential privacy algorithms
    School of Automobile and Transportation, Chengdu Technological University, No. 1, The second section of Zhongxin Avenue, Pidu Dist., Chengdu, Sichuan
    611730, China
    不详
    611730, China
    Qin, Feilong, 1600, Femto Technique Co., Ltd. (22): : 838 - 844
  • [27] A Local Differential Privacy Trajectory Protection Method Based on Temporal and Spatial Restrictions for Staying Detection
    Zhang, Weiqi
    Xie, Zhenzhen
    Sai, Akshita Maradapu Vera Venkata
    Zia, Qasim
    He, Zaobo
    Yin, Guisheng
    TSINGHUA SCIENCE AND TECHNOLOGY, 2024, 29 (02): : 617 - 633
  • [28] Privacy Preservation for Trajectory Publication Based on Differential Privacy
    Yao, Lin
    Chen, Zhenyu
    Hu, Haibo
    Wu, Guowei
    Wu, Bin
    ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, 2022, 13 (03)
  • [29] Research on Trajectory Data Releasing Method via Differential Privacy Based on Spatial Partition
    Han, Qilong
    Xiong, Zuobin
    Zhang, Kejia
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [30] An Effective Data Privacy Protection Algorithm Based on Differential Privacy in Edge Computing
    Qiao, Yi
    Liu, Zhaobin
    Lv, Haoze
    Li, Minghui
    Huang, Zhiyi
    Li, Zhiyang
    Liu, Weijiang
    IEEE ACCESS, 2019, 7 : 136203 - 136213