A Clustering-Anonymity Approach for Trajectory Data Publishing Considering both Distance and Direction

被引:1
作者
Jiang H.-W. [1 ]
Hu K.-K. [2 ]
机构
[1] College of Mathematics and Computer Science, Jiangxi Science and Technology Normal University, Nanchang
[2] State Key Laboratory of High-end Server and Storage Technology, Inspur Group Co., Ltd, Jinan
基金
中国国家自然科学基金;
关键词
Clustering-anonymity; Direction; Distance; Privacy-preserving; Trajectory data;
D O I
10.20532/cit.2021.1005276
中图分类号
学科分类号
摘要
Trajectory data contains rich spatio-temporal information of moving objects. Directly publishing it for mining and analysis will result in severe privacy disclosure problems. Most existing clustering-anonymity methods cluster trajectories according to either distance or direction-based similarities, leading to a high information loss. To bridge this gap, in this paper, we present a clustering-anonymity approach considering both these two types of similarities. As trajectories may not be synchronized, we first design a trajectory synchronization algorithm to synchronize them. Then, two similarity metrics between trajectories are quantitatively defined, followed by a comprehensive one. Furthermore, a clustering-anonymity algorithm for trajectory data publishing with privacy-preserving is proposed. It groups trajectories into clusters according to the comprehensive similarity metric. These clusters are finally anonymized. Experimental results show that our algorithm is effective in preserving privacy with low information loss. ACM CCS (2012) Classification: Security and privacy → Database and storage security → Data anonymization and sanitization Security and privacy → Human and societal aspects of security and privacy → Privacy protections © 2021. Journal of Computing and Information Technology.All Rights Reserved.
引用
收藏
相关论文
共 18 条
[1]  
Qin B., Et al., Review on Location Privacy Protection Research, Journal of East China Normal University (Nature Science), 5, pp. 14-27, (2015)
[2]  
Yuan J., Et al., T-Drive: Enhancing Driving Directions with Taxi Drivers' Intelligence, IEEE Transactions on Knowledge and Data Engineering, 25, 1, pp. 220-232, (2013)
[3]  
Yuan J., Et al., Discovering Regions of Different Functions in a City Using Human Mobility and POIs, ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 186-194, (2012)
[4]  
Huo Z., Meng X. F, A Survey of Trajectory Privacy-Preserving Techniques, Chinese Journal of Computers, 34, 10, pp. 1820-1830, (2011)
[5]  
Gruteser M., Grunwald D., Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking, Proceedings of the 1st ACM International Conference on Mobile Systems, Applications, and Services, pp. 31-42, (2003)
[6]  
Gao Q., Et al., Trajectory Big Data: A Review of Key Technologies in Data Processing, Chinese Journal of Software, 28, 4, pp. 959-992, (2017)
[7]  
Hu Z. W., Yang J., Survey of Trajectory Privacy Preserving Techniques, Computer Science, 43, 4, pp. 16-23, (2016)
[8]  
Komishani E. G., Abadi M., A Generalization-Based Approach for Personalized Privacy Preservation in Trajectory Data Publishing, Proceedings of the 6th International Symposium on Telecommunications, pp. 1129-1135, (2012)
[9]  
Wang S., Et al., Uncertain Trajectory Privacy-Preserving Method of Moving Object, Chinese Journal on Communications, 36, Z1, pp. 94-102, (2015)
[10]  
Lei P R., Et al., Dummy-Based Schemes for Protecting Movement Trajectories, Journal of Information Science and Engineering, 28, 2, pp. 335-350, (2012)