A Privacy-Preserving Trajectory Publishing Method Based on Multi-Dimensional Sub-Trajectory Similarities

被引:2
作者
Shen, Hua [1 ]
Wang, Yu [1 ]
Zhang, Mingwu [1 ]
机构
[1] Hubei Univ Technol, Sch Comp Sci, Wuhan 430068, Hubei, Peoples R China
基金
中国国家自然科学基金;
关键词
trajectory publishing; privacy preservation; trajectory privacy; k-anonymity; K-ANONYMITY; LOCATION; PROTECTION; FRAMEWORK; USERS;
D O I
10.3390/s23249652
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
With the popularity of location services and the widespread use of trajectory data, trajectory privacy protection has become a popular research area. k-anonymity technology is a common method for achieving privacy-preserved trajectory publishing. When constructing virtual trajectories, most existing trajectory k-anonymity methods just consider point similarity, which results in a large dummy trajectory space. Suppose there are n similar point sets, each consisting of m points. The size of the space is then mn. Furthermore, to choose suitable k- 1 dummy trajectories for a given real trajectory, these methods need to evaluate the similarity between each trajectory in the space and the real trajectory, leading to a large performance overhead. To address these challenges, this paper proposes a k-anonymity trajectory privacy protection method based on the similarity of sub-trajectories. This method not only considers the multidimensional similarity of points, but also synthetically considers the area between the historic sub-trajectories and the real sub-trajectories to more fully describe the similarity between sub-trajectories. By quantifying the area enclosed by sub-trajectories, we can more accurately capture the spatial relationship between trajectories. Finally, our approach generates k-1 dummy trajectories that are indistinguishable from real trajectories, effectively achieving k-anonymity for a given trajectory. Furthermore, our proposed method utilizes real historic sub-trajectories to generate dummy trajectories, making them more authentic and providing better privacy protection for real trajectories. In comparison to other frequently employed trajectory privacy protection methods, our method has a better privacy protection effect, higher data quality, and better performance.
引用
收藏
页数:22
相关论文
共 51 条
[1]   SHFL: K-Anonymity-Based Secure Hierarchical Federated Learning Framework for Smart Healthcare Systems [J].
Asad, Muhammad ;
Aslam, Muhammad ;
Jilani, Syeda Fizzah ;
Shaukat, Saima ;
Tsukada, Manabu .
FUTURE INTERNET, 2022, 14 (11)
[2]   Optimization of Privacy Budget Allocation In Differential Privacy-Based Public Transit Trajectory Data Publishing for Smart Mobility Applications [J].
Chen, Chenxi ;
Hu, Xianbiao ;
Li, Yang ;
Tang, Qing .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2023, 24 (12) :15158-15168
[3]  
Chen S, 2016, IEEE TRUST BIG, P752, DOI [10.1109/TrustCom.2016.134, 10.1109/TrustCom.2016.0135]
[4]  
Chen Yang, 2020, IOP Conference Series: Materials Science and Engineering, V768, DOI 10.1088/1757-899X/768/7/072025
[5]   An Efficient Dummy-Based Location Privacy-Preserving Scheme for Internet of Things Services [J].
Du, Yongwen ;
Cai, Gang ;
Zhang, Xuejun ;
Liu, Ting ;
Jiang, Jinghua .
INFORMATION, 2019, 10 (09)
[6]  
Du YT, 2023, Arxiv, DOI arXiv:2302.06180
[7]   Multidimensional Similarity Measuring for Semantic Trajectories [J].
Furtado, Andre Salvaro ;
Kopanaki, Despina ;
Alvares, Luis Otavio ;
Bogorny, Vania .
TRANSACTIONS IN GIS, 2016, 20 (02) :280-298
[8]   Balancing trajectory privacy and data utility using a personalized anonymization model [J].
Gao, Sheng ;
Ma, Jianfeng ;
Sun, Cong ;
Li, Xinghua .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 38 :125-134
[9]   TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing [J].
Gao, Sheng ;
Ma, Jianfeng ;
Shi, Weisong ;
Zhan, Guoxing ;
Sun, Cong .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (06) :874-887
[10]   Anonymous usage of location-based services through spatial and temporal cloaking [J].
Gruteser, M ;
Grunwald, D .
PROCEEDINGS OF MOBISYS 2003, 2003, :31-42