Trajectory differential privacy protection mechanism based on prediction and sliding window

被引:0
作者
Ye A. [1 ,2 ]
Meng L. [1 ,2 ]
Zhao Z. [1 ,2 ]
Diao Y. [1 ,2 ]
Zhang J. [1 ,2 ]
机构
[1] College of Mathematics and Informatics, Fujian Normal University, Fuzhou
[2] Fujian Provincial Key Laboratory of Network Security and Cryptology, Fuzhou
来源
Tongxin Xuebao/Journal on Communications | 2020年 / 41卷 / 04期
基金
中国国家自然科学基金;
关键词
Differential privacy; Location privacy; Privacy accumulation; Trajectory privacy;
D O I
10.11959/j.issn.1000-436x.2020049
中图分类号
学科分类号
摘要
To address the issues of privacy budget and quality of service in trajectory differential privacy protection, a trajectory differential privacy mechanism integrating prediction disturbance was proposed. Firstly, Markov chain and exponential perturbation method were used to predict the location which satisfies the differential privacy and temporal and spatial se-curity, and service similarity map was introduced to detect the availability of the location. If the prediction was successful, the prediction location was directly used to replace the location of differential disturbance, to reduce the privacy cost of continuous query and improve the quality of service. Based on this, the trajectory privacy budget allocation mechanism based on w sliding window was designed to ensure that any continuous w queries in the trajectory meet the ε-differential privacy and solve the trajectory privacy problem of continuous queries. In addition, a privacy customization strategy was designed based on the sensitivity map. By customizing the privacy sensitivity of semantic location, the privacy budget could be customized to improve its utilization. Finally, the validity of the scheme was verified by real data set experiment. The results illustrate that it offers the better privacy and quality of service. © 2020, Editorial Board of Journal on Communications. All right reserved.
引用
收藏
页码:123 / 133
页数:10
相关论文
共 17 条
[1]  
Madden M., Lenhart A., Cortesi S., Et al., Pew internet and american life project, (2010)
[2]  
Dobson J.E., Fisher P., Geoslavery, Technology and Society Magazine, 22, 1, pp. 47-52, (2003)
[3]  
Andres M.E., Bordenabe N.E., Chatzikokolakis K., Geo-indistinguishability: differential privacy for location-based systems, Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 901-914, (2013)
[4]  
Dwork C., Mcsherry F., Nissim K., Calibrating noise to sensitivity in private data analysis, Theory of Cryptography Conference, pp. 265-284, (2006)
[5]  
Gruteser M., Grunwald D., Anonymous usage of location-based services through spatial and temporal cloaking, Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, pp. 31-42, (2003)
[6]  
Niu B., Li Q., Zhu X., Et al., Achieving k-anonymity in privacy-aware location-based services, The 33rd Annual IEEE International Conference on Computer Communications, pp. 754-762, (2014)
[7]  
Hwang R.H., Hsueh Y.L., Chung H.W., A novel time-obfuscated algorithm for trajectory privacy protection, IEEE Transactions on Services Computing, 7, 2, pp. 126-139, (2013)
[8]  
Wang J., Li Y., Yang D., Et al., Achieving effective k-anonymity for query privacy in location-based services, IEEE Access, 5, pp. 24580-24592, (2017)
[9]  
Kido H., Yanagisawa Y., Satoh T., Protection of location privacy using dummies for location-based services, 21st International Conference on Data Engineering Workshops, (2005)
[10]  
Andres M.E., Bordenabe N.E., Chatzikokolakis K., Geo-indistinguishability: differential privacy for location-based systems, Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 901-914, (2013)