Novel trajectory privacy-preserving method based on clustering using differential privacy

被引:26
|
作者
Zhao, Xiaodong [1 ]
Pi, Dechang [1 ]
Chen, Junfu [1 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 211106, Peoples R China
基金
中国国家自然科学基金;
关键词
Trajectory data; Cluster analysis; Privacy protection; Differential privacy;
D O I
10.1016/j.eswa.2020.113241
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the development of location-aware technology, a large amount of location data of users is collected by the trajectory database. If these trajectory data are directly used for data mining without being processed, it will pose a threat to the user's personal privacy. At the moment, differential privacy is favored by experts and scholars because of its strict mathematical rigor, but how to apply differential privacy technology to trajectory clustering analysis is a difficult problem. To solve the problems in which existing trajectory privacy-preserving models have poor data availability or difficulty to resist complex privacy attacks, we devise novel trajectory privacy-preserving method based on clustering using differential privacy. More specifically, Laplacian noise is added to the count of trajectory location in the cluster to resist the continuous query attack. Then, radius-constrained Laplacian noise is added to the trajectory location data in the cluster to avoid too much noise affecting the clustering effect. According to the noise location data and the count of noise location, the noise clustering center in the cluster is obtained. Finally, it is considered that the attacker can associate the user trajectory with other information to form secret reasoning attack, and secret reasoning attack model is proposed. And we use the differential privacy technology to give corresponding resistance. Experimental results using the open data show that the proposed algorithm can not only effectively protect the private information of the trajectory data, but also ensure the data availability in cluster analysis. And compared with other algorithms, our algorithm has good effect on some evaluation indicators. (C) 2020 Elsevier Ltd. All rights reserved.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] Novel trajectory privacy-preserving method based on prefix tree using differential privacy
    Zhao, Xiaodong
    Pi, Dechang
    Chen, Junfu
    [J]. KNOWLEDGE-BASED SYSTEMS, 2020, 198
  • [2] A Local Differential Privacy Based Privacy-Preserving Grid Clustering Method
    Zhang D.-Y.
    Ni W.-W.
    Zhang S.
    Fu N.
    Hou L.-H.
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2023, 46 (02): : 422 - 435
  • [3] A privacy-preserving trajectory data synthesis framework based on differential privacy
    Ma, Tinghuai
    Deng, Qian
    Rong, Huan
    Al-Nabhan, Najla
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 77
  • [4] A Clustering-Based Privacy-Preserving Method for Uncertain Trajectory Data
    Cai, Zhou-Fu
    Yang, He-Xing
    Shuang, Wang
    Jian, Xu
    Wei, Wang-Ming
    Na, Wu-Li
    [J]. 2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 1 - 8
  • [5] Trajectory-aware privacy-preserving method with local differential privacy in crowdsourcing
    Hong, Yingcong
    Li, Junyi
    Lin, Yaping
    Hu, Qiao
    Li, Xiehua
    [J]. EURASIP JOURNAL ON INFORMATION SECURITY, 2024, 2024 (01):
  • [6] A privacy-preserving vehicle trajectory clustering framework
    Tian, Ran
    Gao, Pulun
    Liu, Yanxing
    [J]. FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2024, 25 (07) : 988 - 1002
  • [7] TCPP: Achieving Privacy-Preserving Trajectory Correlation With Differential Privacy
    Wu, Lei
    Qin, Chengyi
    Xu, Zihui
    Guan, Yunguo
    Lu, Rongxing
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 4006 - 4020
  • [8] Privacy-preserving mechanism for mixed data clustering with local differential privacy
    Yuan, Liujie
    Zhang, Shaobo
    Zhu, Gengming
    Alinani, Karim
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (19):
  • [9] Privacy-preserving trajectory similarity computation method
    Yu H.
    Zhang H.
    Yu X.
    Qu J.
    Ge M.
    [J]. Tongxin Xuebao/Journal on Communications, 2022, 43 (11): : 1 - 13
  • [10] A Trajectory Privacy-Preserving Method Based on Single Point Gain
    Chen C.-M.
    Lin W.-S.
    Yu Q.-Y.
    Luo Y.-L.
    [J]. Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2020, 48 (01): : 143 - 152