Research on Differentially Private Trajectory Data Publishing

被引:10
|
作者
Feng Dengguo [1 ,2 ]
Zhang Min [1 ,2 ]
Ye Yutong [1 ]
机构
[1] Chinese Acad Sci, Inst Software, Trusted Comp & Informat Assurance Lab, Beijing 100190, Peoples R China
[2] Chinese Acad Sci, Inst Software, State Key Lab Comp Sci, Beijing 100190, Peoples R China
基金
中国国家自然科学基金;
关键词
Privacy preserving; Differential privacy; Location big data; Trajectory big data; Data publishing;
D O I
10.11999/JEIT190632
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Securely sharing and publishing location trajectory data relies on support of location privacy protection technology. Prior to the advent of differential privacy, K-anonymity and its derived models provide a means of quantitative assessment of location-trajectory privacy protection. However, its security relies heavily on the background knowledge of the attacker, and the model can not provide perfect privacy protection when a new attack occurs. Differential privacy effectively compensates for the above problems, and it proves the level of privacy protection based on rigorous mathematical theory and is increasingly used in the field of trajectory data privacy publishing. Therefore, the trajectory privacy protection technology based on differential privacy theory is studied and analyzed, and the methods of spatial statistical data publishing are introduced such as location histogram and trajectory histogram, the method of trajectory data set publishing and the model of continuous real-time location release privacy protection. At the same time, the existing methods are compared and analyzed, the key development directions are put forward in the future.
引用
收藏
页码:74 / 88
页数:15
相关论文
共 51 条
  • [1] Deep Learning with Differential Privacy
    Abadi, Martin
    Chu, Andy
    Goodfellow, Ian
    McMahan, H. Brendan
    Mironov, Ilya
    Talwar, Kunal
    Zhang, Li
    [J]. CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 308 - 318
  • [2] Never Walk Alone:: Uncertainty for anonymity in moving objects databases
    Abul, Osman
    Bonchi, Francesco
    Nanni, Mirco
    [J]. 2008 IEEE 24TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, VOLS 1-3, 2008, : 376 - +
  • [3] [Anonymous], 2012, P 25 INT C NEUR INF
  • [4] Planning Bike Lanes based on Sharing-Bikes' Trajectories
    Bao, Jie
    He, Tianfu
    Ruan, Sijie
    Li, Yanhua
    Zheng, Yu
    [J]. KDD'17: PROCEEDINGS OF THE 23RD ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2017, : 1377 - 1386
  • [5] Local, Private, Efficient Protocols for Succinct Histograms
    Bassily, Raef
    Smith, Adam
    [J]. STOC'15: PROCEEDINGS OF THE 2015 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2015, : 127 - 135
  • [6] Chen R., 2012, P 18 ACM SIGKDD INT, P213, DOI DOI 10.1145/2339530.2339564
  • [7] Chen R, 2016, PROC INT CONF DATA, P289, DOI 10.1109/ICDE.2016.7498248
  • [8] Differentially Private Spatial Decompositions
    Cormode, Graham
    Procopiuc, Cecilia
    Srivastava, Divesh
    Shen, Entong
    Yu, Ting
    [J]. 2012 IEEE 28TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE), 2012, : 20 - 31
  • [9] DWORK C, 2006, 24 ANN INT C THEOR A, P486
  • [10] Dwork C, 2006, LECT NOTES COMPUT SC, V4052, P1