A Location Trajectory Privacy Protection Method Based on Generative Adversarial Network and Attention Mechanism

被引:0
作者
Yang, Xirui [1 ]
Zhang, Chen [1 ]
机构
[1] Gansu Univ Polit Sci & Law, Sch Cyber Secur, Lanzhou 730070, Peoples R China
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2024年 / 81卷 / 03期
关键词
Privacy protection; trajectory generation; generative adversarial networks; attention mechanism; location trajectory;
D O I
10.32604/cmc.2024.057131
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
User location trajectory refers to the sequence of geographic location information that records the user's movement or stay within a period of time and is usually used in mobile crowd sensing networks, in which the user participates in the sensing task, the process of sensing data collection faces the problem of privacy leakage. To address the privacy leakage issue of trajectory data during uploading, publishing, and sharing when users use location services on mobile smart group sensing terminal devices, this paper proposes a privacy protection method based on generative adversarial networks and attention mechanisms (BiLS-A-GAN). The method designs a generator attention model, GAttention, and a discriminator attention model, DAttention. In the generator, GAttention, combined with a bidirectional long short-term memory network, more effectively senses contextual information and captures dependencies within sequences. The discriminator uses DAttention and the long short-term memory network to distinguish the authenticity of data. Through continuous interaction between these two models, trajectory data with the statistical characteristics of the original data is generated. This non-original trajectory data can effectively reduce the probability of an attacker's identification, thereby enhancing the privacy protection of user information. Reliability assessment of the Trajectory-User Linking (TUL) task performed on the real-world semantic trajectory dataset Foursquare NYC, compared with traditional privacy-preserving algorithms that focus only on the privacy enhancement of the data, this approach, while achieving a high level of privacy protection, retains more temporal, spatial, and thematic features from the original trajectory data, to not only guarantee the user's personal privacy, but also retain the reliability of the information itself in the direction of geographic analysis and other directions, and to achieve the win-win purpose of both data utilization and privacy preservation.
引用
收藏
页码:3781 / 3804
页数:24
相关论文
共 33 条
[1]   Modelling perceived risks to personal privacy from location disclosure on online social networks [J].
Alrayes, Fatma S. ;
Abdelmoty, A. I. ;
El-Geresy, W. B. ;
Theodorakopoulos, G. .
INTERNATIONAL JOURNAL OF GEOGRAPHICAL INFORMATION SCIENCE, 2020, 34 (01) :150-176
[2]   A First Look at Privacy Analysis of COVID-19 Contact-Tracing Mobile Applications [J].
Azad, Muhammad Ajmal ;
Arshad, Junaid ;
Akmal, Syed Muhammad Ali ;
Riaz, Farhan ;
Abdullah, Sidrah ;
Imran, Muhammad ;
Ahmad, Farhan .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (21) :15796-15806
[3]   The need for privacy with public digital contact tracing during the COVID-19 pandemic [J].
Bengio, Yoshua ;
Janda, Richard ;
Yu, Yun William ;
Ippolito, Daphne ;
Jarvie, Max ;
Pilat, Dan ;
Struck, Brooke ;
Krastev, Sekoul ;
Sharma, Abhinav .
LANCET DIGITAL HEALTH, 2020, 2 (07) :E342-E344
[4]   joint obfuscation of location and its semantic information for privacy protection [J].
Bostanipour, Behnaz ;
Theodorakopoulos, George .
COMPUTERS & SECURITY, 2021, 107
[5]   Privacy protection for Wi-Fi location positioning systems [J].
Boutet, Antoine ;
Cunche, Mathieu .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 58 (58)
[6]   Real-location Reporting Based Differential Privacy Trajectory Protection for Mobile Crowdsensing [J].
Chen, Xin ;
Wu, Xuangou ;
Wang, Xiujun ;
Zhao, Wei ;
Xue, Wei .
5TH INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING AND COMMUNICATIONS (BIGCOM 2019), 2019, :142-150
[7]   Maximizing the Utility in Location-Based Mobile Advertising [J].
Cheng, Peng ;
Lian, Xiang ;
Chen, Lei ;
Liu, Siyuan .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2022, 34 (02) :776-788
[8]  
Cranshaw J., 2021, P INT AAAI C WEB SOC, V6, P58, DOI 10.1609/icwsm.v6i1.14278
[9]  
Dobson J.E., 2021, Urban Informatics, P567, DOI [10.1007/978-981-15-8983-632, 10.1007/978-981-15-8983-6_32, DOI 10.1007/978-981-15-8983-6_32]
[10]   On the privacy protection of indoor location dataset using anonymization [J].
Fathalizadeh, Amir ;
Moghtadaiee, Vahideh ;
Alishahi, Mina .
COMPUTERS & SECURITY, 2022, 117