Privacy-Preserving Modeling of Trajectory Data: Secure Sharing Solutions for Trajectory Data Based on Granular Computing

被引:0
作者
Chen, Yanjun [1 ]
Zhang, Ge [2 ]
Liu, Chengkun [1 ]
Lu, Chunjiang [3 ]
机构
[1] Macau Univ Sci & Technol, Inst Sustainable Dev, Macau 999078, Peoples R China
[2] Acad Mil Sci PLA China, Def Innovat Inst, Beijing 100071, Peoples R China
[3] Shenzhen Natl High Tech Ind Innovat Ctr, Shenzhen Dev & Reform Res Inst, Big Data Platform & Informat Dept, Shenzhen 518063, Peoples R China
关键词
trajectory data; fuzzy rule model; differential privacy; granular computing; 94-10;
D O I
10.3390/math12233681
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Trajectory data are embedded within driving paths, GPS positioning systems, and mobile signaling information. A vast amount of trajectory data play a crucial role in the development of smart cities. However, these trajectory data contain a significant amount of sensitive user information, which poses a substantial threat to personal privacy. In this work, we have constructed an internal secure information granule model based on differential privacy to ensure the secure sharing and analysis of trajectory data. This model deeply integrates granular computing with differential privacy, addressing the issue of privacy leakage during the sharing of trajectory data. We introduce the Laplace mechanism during the granulation of information granules to ensure data security, and the flexibility at the granularity level provides a solid foundation for subsequent data analysis. Meanwhile, this work demonstrates the practical applications of the solution for the secure sharing of trajectory data. It integrates trajectory data with economic data using the Takagi-Sugeno fuzzy rule model to fit and predict regional economies, thereby verifying the feasibility of the granular computing model based on differential privacy and ensuring the privacy and security of users' trajectory information. The experimental results show that the information granule model based on differential privacy can more effectively enable data analysis.
引用
收藏
页数:20
相关论文
共 42 条
[21]  
Ma CYT, 2010, MOBICOM 10 & MOBIHOC 10: PROCEEDINGS OF THE 16TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING AND THE 11TH ACM INTERNATIONAL SYMPOSIUM ON MOBILE AD HOC NETWORKING AND COMPUTING, P185
[22]   Mechanism design via differential privacy [J].
McSherry, Frank ;
Talwar, Kunal .
48TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2007, :94-103
[23]  
McSherry F, 2009, ACM SIGMOD/PODS 2009 CONFERENCE, P19
[24]  
Pedrycz W, 2007, FUZZY SYSTEMS ENGINEERING: TOWARD HUMAN-CENTRIC COMPUTING, P1, DOI 10.1002/9780470168967
[25]  
Pedrycz W., 2018, GRANULAR COMPUTING A
[27]  
Terrovitis M., 2008, 9 INT C MOBILE DATA, P65, DOI DOI 10.1109/MDM.2008.29
[28]   A Context-Aware Framework for Risky Driving Behavior Evaluation Based on Trajectory Data [J].
Xue, Qingwen ;
Xing, Ying Ying ;
Gao, Kun ;
Lu, Jian ;
Qu, Xiaobo .
IEEE INTELLIGENT TRANSPORTATION SYSTEMS MAGAZINE, 2023, 15 (01) :70-83
[29]   Privacy Preservation for Trajectory Publication Based on Differential Privacy [J].
Yao, Lin ;
Chen, Zhenyu ;
Hu, Haibo ;
Wu, Guowei ;
Wu, Bin .
ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, 2022, 13 (03)
[30]   Sensitive attribute privacy preservation of trajectory data publishing based on l-diversity [J].
Yao, Lin ;
Chen, Zhenyu ;
Hu, Haibo ;
Wu, Guowei ;
Wu, Bin .
DISTRIBUTED AND PARALLEL DATABASES, 2021, 39 (03) :785-811