LRM: A Location Recombination Mechanism for Achieving Trajectory k-Anonymity Privacy Protection

被引:11
|
作者
Wang, Yunfeng [1 ]
Li, Mingzhen [1 ]
Luo, Shoushan [1 ]
Xin, Yang [1 ,2 ]
Zhu, Hongliang [1 ]
Chen, Yuling [2 ]
Yang, Guangcan [1 ]
Yang, Yixian [1 ,2 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Cyberspace Secur, Informat Secur Ctr, Natl Engn Lab Disaster Backup & Recovery, Beijing 100876, Peoples R China
[2] Guizhou Univ, Guizhou Prov Key Lab Publ Big Data, Guiyang 550025, Peoples R China
关键词
Trajectory k-anonymity; trajectory privacy; privacy protection; location recombination mechanism; fake trajectories; PRESERVING FRAMEWORK; SCHEME;
D O I
10.1109/ACCESS.2019.2960008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Trajectory k-anonymity is a prevalent technique for protecting trajectory privacy. However, the existing techniques for generating fake trajectories can be easily broken by an adversary because of the failure to capture the probabilistic features and geographic features of the trajectories. They also reduce data availability. Thus, this paper proposes a location recombination mechanism (LRM) for achieving trajectory k-anonymity privacy protection. First, we propose a metric that measures the location pair similarity between location pairs. Based on this metric, we select sampling locations and divide locations into different equivalent probability classes. Locations in one equivalent probability class have the same probability as one corresponding base location. Then, we also introduce two metrics that measure the probabilistic similarity and geographic similarity between locations. Based on these metrics, we design algorithms to generate fake trajectories. These algorithms can recombine locations sampled from each equivalent probability class into trajectories. All of these trajectories meet the privacy protection requirements for both base trajectories and sampling trajectories. Finally, we evaluate our scheme thoroughly with real-world data. The results show that our method can protect the privacy of base trajectories and sampling trajectories and achieve a better performance of service provider utility and data availability than other schemes.
引用
收藏
页码:182886 / 182905
页数:20
相关论文
共 50 条
  • [1] Achieving k-anonymity privacy protection using generalization and suppression
    Sweeney, L
    [J]. INTERNATIONAL JOURNAL OF UNCERTAINTY FUZZINESS AND KNOWLEDGE-BASED SYSTEMS, 2002, 10 (05) : 571 - 588
  • [2] SocialCloaking: a Distributed Architecture for K-anonymity Location Privacy Protection
    Hwang, Ren-Hung
    Huang, Fu-Hui
    [J]. 2014 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2014, : 247 - 251
  • [3] An Adaptive Learning Model for k-Anonymity Location Privacy Protection
    Natesan, Gayathri
    Liu, Jigang
    [J]. IEEE 39TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC 2015), VOL 3, 2015, : 10 - 16
  • [4] Achieving Effective k-Anonymity for Query Privacy in Location-Based Services
    Wang, Jinbao
    Li, Yingshu
    Yang, Donghua
    Gao, Hong
    Luo, Guangchun
    Li, Jianzhong
    [J]. IEEE ACCESS, 2017, 5 : 24580 - 24592
  • [5] Privacy Protection Through k-anonymity in Location-based Services
    Zuberi, Rubina Shahin
    Lall, Brejesh
    Ahmad, Syed Naseem
    [J]. IETE TECHNICAL REVIEW, 2012, 29 (03) : 196 - 201
  • [6] Distributed K-Anonymity Location Privacy Protection Scheme Based on Blockchain
    Liu, Hai
    Li, Xing-Hua
    Luo, Bin
    Wang, Yun-Wei
    Ren, Yan-Bing
    Ma, Jian-Feng
    Ding, Hong-Fa
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2019, 42 (05): : 942 - 960
  • [7] A Personalized k-Anonymity with Fake Position Generation for Location Privacy Protection
    Luo, Zhi
    Huang, Xiaohong
    [J]. FRONTIERS IN INTERNET TECHNOLOGIES, 2015, 502 : 46 - 55
  • [8] Achieving k-anonymity in Privacy-Aware Location-Based Services
    Niu, Ben
    Li, Qinghua
    Zhu, Xiaoyan
    Cao, Guohong
    Li, Hui
    [J]. 2014 PROCEEDINGS IEEE INFOCOM, 2014, : 754 - 762
  • [9] A Distributed k-Anonymity Protocol for Location Privacy
    Zhong, Ge
    Hengartner, Urs
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM), VOLS 1 AND 2, 2009, : 253 - 262
  • [10] An incentive mechanism for K-anonymity in LBS privacy protection based on credit mechanism
    Li, Xinghua
    Miao, Meixia
    Liu, Hai
    Ma, Jianfeng
    Li, Kuan-Ching
    [J]. SOFT COMPUTING, 2017, 21 (14) : 3907 - 3917