LRM: A Location Recombination Mechanism for Achieving Trajectory k-Anonymity Privacy Protection

被引:11
|
作者
Wang, Yunfeng [1 ]
Li, Mingzhen [1 ]
Luo, Shoushan [1 ]
Xin, Yang [1 ,2 ]
Zhu, Hongliang [1 ]
Chen, Yuling [2 ]
Yang, Guangcan [1 ]
Yang, Yixian [1 ,2 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Cyberspace Secur, Informat Secur Ctr, Natl Engn Lab Disaster Backup & Recovery, Beijing 100876, Peoples R China
[2] Guizhou Univ, Guizhou Prov Key Lab Publ Big Data, Guiyang 550025, Peoples R China
关键词
Trajectory k-anonymity; trajectory privacy; privacy protection; location recombination mechanism; fake trajectories; PRESERVING FRAMEWORK; SCHEME;
D O I
10.1109/ACCESS.2019.2960008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Trajectory k-anonymity is a prevalent technique for protecting trajectory privacy. However, the existing techniques for generating fake trajectories can be easily broken by an adversary because of the failure to capture the probabilistic features and geographic features of the trajectories. They also reduce data availability. Thus, this paper proposes a location recombination mechanism (LRM) for achieving trajectory k-anonymity privacy protection. First, we propose a metric that measures the location pair similarity between location pairs. Based on this metric, we select sampling locations and divide locations into different equivalent probability classes. Locations in one equivalent probability class have the same probability as one corresponding base location. Then, we also introduce two metrics that measure the probabilistic similarity and geographic similarity between locations. Based on these metrics, we design algorithms to generate fake trajectories. These algorithms can recombine locations sampled from each equivalent probability class into trajectories. All of these trajectories meet the privacy protection requirements for both base trajectories and sampling trajectories. Finally, we evaluate our scheme thoroughly with real-world data. The results show that our method can protect the privacy of base trajectories and sampling trajectories and achieve a better performance of service provider utility and data availability than other schemes.
引用
收藏
页码:182886 / 182905
页数:20
相关论文
共 50 条
  • [31] Protecting location privacy with personalized k-anonymity:: Architecture and algorithms
    Gedik, Bugra
    Liu, Ling
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2008, 7 (01) : 1 - 18
  • [32] Anatomy: Uncertain data k-anonymity privacy protection algorithm
    Ren, Xiangmin
    Jia, Boxuan
    Wang, Kechao
    [J]. ADVANCES IN MECHATRONICS AND CONTROL ENGINEERING II, PTS 1-3, 2013, 433-435 : 1689 - +
  • [33] Achieving the Optimal k-Anonymity for Content Privacy in Interactive Cyberphysical Systems
    Wang, Jinbao
    Tian, Ling
    Huang, Yan
    Yang, Donghua
    Gao, Hong
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [34] A New Privacy Protection Approach Based on K-Anonymity for Location-Based Cloud Services
    Wang, Tian
    Xu, Linli
    Zhang, Mingyue
    Zhang, Huanhuan
    Zhang, Gongxuan
    [J]. JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2022, 31 (05)
  • [35] Research on uncertain data privacy protection based on K-anonymity
    Jing, Yang
    Xiangmin, Ren
    Jianpei, Zhang
    Kechao, Wang
    [J]. Jing, Y. (yangjing@hrbeu.edu.cn), 1600, Advanced Institute of Convergence Information Technology (04): : 140 - 149
  • [36] Decentralized Enforcement of k-Anonymity for Location Privacy Using Secret Sharing
    Foerster, David
    Loehr, Hans
    Kargl, Frank
    [J]. 2015 IEEE VEHICULAR NETWORKING CONFERENCE (VNC), 2015, : 279 - 286
  • [37] -diversity: Privacy beyond k-anonymity
    Cornell University
    不详
    [J]. ACM Trans. Knowl. Discov. Data, 2007, 1
  • [38] k-anonymity:: A model for protecting privacy
    Sweeney, L
    [J]. INTERNATIONAL JOURNAL OF UNCERTAINTY FUZZINESS AND KNOWLEDGE-BASED SYSTEMS, 2002, 10 (05) : 557 - 570
  • [39] Location Privacy in Buildings: A 3-Dimensional K-anonymity Model
    Zhu, Yujia
    Zhai, Lidong
    [J]. 2014 10TH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR NETWORKS (MSN), 2014, : 195 - 200
  • [40] Poster: Smart-Contract Based Incentive Mechanism for K-Anonymity Privacy Protection in LBSs
    Geng, Ziye
    He, Yunhua
    Niu, Tong
    Li, Hong
    Sun, Limin
    Cheng, Wei
    Li, Xu
    [J]. 2017 1ST IEEE SYMPOSIUM ON PRIVACY-AWARE COMPUTING (PAC), 2017, : 200 - 201