The De-anonymization Method Based on User Spatio-Temporal Mobility Trace

被引:3
作者
Chen, Zhenyu [1 ,2 ]
Fu, Yanyan [1 ]
Zhang, Min [1 ]
Zhang, Zhenfeng [1 ]
Li, Hao [1 ]
机构
[1] Chinese Acad Sci, Inst Software, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Beijing, Peoples R China
来源
INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017 | 2018年 / 10631卷
基金
中国国家自然科学基金;
关键词
De-anonymization; Density-based HMM; Frequent spatio-temporal cube; Mobility trace;
D O I
10.1007/978-3-319-89500-0_40
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Nowadays user mobility traces are more and more likely to de-anonymize users in addition to other types of data. Among them, model-based approaches usually provide more accurate de-anonymize than that of feature-locations-based approaches. More recently, Hidden Markov Model (HMM) based approaches are proposed to find out the mobility pattern of user mobility traces. However, in the key step of the hidden state definition, existing models rely on the fixed classification of time, space or number, which can hardly suit for all various users. In this paper, we propose a user de-anonymization method based on HMM. Different from current approaches, the method utilizes a novel density-based HMM, which uses the density-based clustering to obtain hidden states of HMM from three-dimensional (time, latitude and longitude) spatio-temporal data, and provide much better performance. Furthermore, we also propose a frequent spatio-temporal cube filter (FSTC-Filter) which significantly reduces the number of candidate models and thus improves the efficiency.
引用
收藏
页码:459 / 471
页数:13
相关论文
共 20 条
[1]  
Ayhan S., 2016, P 22 INT C KNOWL DIS
[2]   Unique in the Crowd: The privacy bounds of human mobility [J].
de Montjoye, Yves-Alexandre ;
Hidalgo, Cesar A. ;
Verleysen, Michel ;
Blondel, Vincent D. .
SCIENTIFIC REPORTS, 2013, 3
[3]  
Freudiger J, 2012, LECT NOTES COMPUT SC, V7035, P31
[4]   De-anonymization attack on geolocated data [J].
Gambs, Sebastien ;
Killijian, Marc-Olivier ;
Cortez, Miguel Niunez del Prado .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2014, 80 (08) :1597-1614
[5]   Understanding individual human mobility patterns [J].
Gonzalez, Marta C. ;
Hidalgo, Cesar A. ;
Barabasi, Albert-Laszlo .
NATURE, 2008, 453 (7196) :779-782
[6]  
Lin M., 2015, 24 INT JOINT C ART I
[7]  
Lin M, 2015, INT CONF BIG DATA, P15, DOI 10.1109/35021BIGCOMP.2015.7072841
[8]   Where You Are Is Who You Are: User Identification by Matching Statistics [J].
Naini, Farid M. ;
Unnikrishnan, Jayakrishnan ;
Thiran, Patrick ;
Vetterli, Martin .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (02) :358-372
[9]   Robust de-anonymization of large sparse datasets [J].
Narayanan, Arvind ;
Shmatikov, Vitaly .
PROCEEDINGS OF THE 2008 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2008, :111-125
[10]  
Narayanan A, 2011, 2011 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), P1825, DOI 10.1109/IJCNN.2011.6033446