TLPP: Deep-Learning-Based Two-Layer Privacy Preserving Mechanism for Protecting Vehicle Trajectory Data

被引:1
作者
Fan, Na [1 ]
Liu, Jia [2 ]
Zhao, Shudi [1 ]
Dai, Yifan [3 ]
Fan, Wenjun [4 ]
机构
[1] Changan Univ, Sch Informat & Engn, Xian 710064, Peoples R China
[2] Univ Liverpool, Dept Comp Sci, Liverpool L69 3BX, England
[3] Tsinghua Univ, Suzhou Automot Res Inst, Suzhou 215200, Peoples R China
[4] Xian Jiaotong Liverpool Univ, Sch Adv Technol, Suzhou 215123, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2024年 / 11卷 / 22期
关键词
Trajectory; Protection; Privacy; Differential privacy; Generative adversarial networks; Noise; Internet of Things; Deep learning (DL); differential privacy; generative adversarial network (GAN); privacy preserving; trajectory clustering; vehicle trajectory; MODEL; NETWORK;
D O I
10.1109/JIOT.2024.3439393
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the popularity of the global positioning system (GPS) and mobile Internet, a large amount of vehicle trajectory data has been generated and applied in intelligent transportation systems. The collected trajectory data often contains sensitive user information, which poses a risk of user privacy disclosure. To enhance the privacy of vehicle trajectory data, this article proposes a novel two-layer privacy preserving (TLPP) mechanism that leverages clustering features. Initially, density-based clustering is employed to derive regional attributes and density characteristics of trajectory points. Subsequently, a generative adversarial network (GAN) incorporating a long short-term memory (LSTM) network is utilized to learn the distribution of clustered trajectories, facilitating the generation of synthetic trajectories. These synthetic trajectories are then substituted for the original trajectories, constituting the first layer of privacy protection. To ensure the fidelity of the synthetic data, a novel generator loss function is designed, utilizing the Wasserstein distance to quantify the spatial similarity between the real and synthetic trajectories. Furthermore, to accommodate the personalized privacy requirements, a tailored differential privacy mechanism is introduced. This mechanism provides a second layer of privacy protection by introducing the region-specific perturbations to the data. The experimental results show that, compared with the other models, our approach can effectively protect the user privacy while ensuring the trajectory data utility.
引用
收藏
页码:36084 / 36098
页数:15
相关论文
共 45 条
[1]  
Andres M.E., 2013, 2013 ACM SIGSAC C CO, P901, DOI DOI 10.1145/2508859.2516735
[2]  
[Anonymous], 2014, P 4 ACM WORKSH SEC P, DOI DOI 10.1145/2666620.2666625
[3]  
[Anonymous], 2012, CCS
[4]   A Transformer decoder-based Generative Adversarial Model with TrajLoss Function for Privacy-Preserving Trajectory Publishing [J].
Cao, Xiaoqian ;
Yu, Juan ;
Han, Jianmin ;
Yao, Xin ;
Lu, Jianfeng ;
Peng, Hao .
2022 5TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND NATURAL LANGUAGE PROCESSING, MLNLP 2022, 2022, :271-278
[5]   TrajVAE: A Variational AutoEncoder model for trajectory generation [J].
Chen, Xinyu ;
Xu, Jiajie ;
Zhou, Rui ;
Chen, Wei ;
Fang, Junhua ;
Liu, Chengfei .
NEUROCOMPUTING, 2021, 428 :332-339
[6]   OPTDP: Towards optimal personalized trajectory differential privacy for trajectory data publishing [J].
Cheng, Wenqing ;
Wen, Ruxue ;
Huang, Haojun ;
Miao, Wang ;
Wang, Chen .
NEUROCOMPUTING, 2022, 472 :201-211
[7]   TrajGAIL: Generating urban vehicle trajectories using generative adversarial imitation learning [J].
Choi, Seongjin ;
Kim, Jiwon ;
Yeo, Hwasoo .
TRANSPORTATION RESEARCH PART C-EMERGING TECHNOLOGIES, 2021, 128
[8]   Probabilistic Attack Sequence Generation and Execution Based on MITRE ATT&CK for ICS Datasets [J].
Choi, Seungoh ;
Yun, Jeong-Han ;
Min, Byung-Gil .
PROCEEDINGS OF 14TH WORKSHOP ON CYBER SECURITY EXPERIMENTATION AND TEST (CSET 2021), 2021, :41-48
[9]   PLDP-TD: Personalized-location differentially private data analysis on trajectory databases [J].
Deldar, Fatemeh ;
Abadi, Mahdi .
PERVASIVE AND MOBILE COMPUTING, 2018, 49 :1-22
[10]   Differential privacy: A survey of results [J].
Dwork, Cynthia .
THEORY AND APPLICATIONS OF MODELS OF COMPUTATION, PROCEEDINGS, 2008, 4978 :1-19