RNN-DP: A new differential privacy scheme base on Recurrent Neural Network for Dynamic trajectory privacy protection

被引:31
作者
Chen, Si [1 ,2 ,3 ]
Fu, Anmin [1 ,2 ]
Shen, Jian [4 ]
Yu, Shui [5 ]
Wang, Huaqun [2 ]
Sun, Huaijiang [1 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Comp Sci & Engn, Nanjing, Peoples R China
[2] Nanjing Univ Posts & Telecommun, Jiangsu Key Lab Big Data Secur & Intelligent Proc, Nanjing, Peoples R China
[3] Nanjing Univ Sci & Technol, Div Informat Construct & Management, Nanjing, Peoples R China
[4] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing, Peoples R China
[5] Univ Technol Sydney, Sch Software, Sydney, NSW, Australia
基金
中国国家自然科学基金;
关键词
Differential privacy; Dynamic trajectory; Neural network; Data publishing; CLOUD; ESTABLISHMENT; INTEGRATION;
D O I
10.1016/j.jnca.2020.102736
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile devices furnish users with various services while on the move, but also raise public concerns about trajectory privacy. Unfortunately, traditional privacy protection methods, such as anonymity and generalization, are not secure because they cannot resist attackers with background knowledge. The emergence of differential privacy provides an effective solution to this problem. Still, the existing schemes are almost designed based on the collected aggregate historical data (so-called static trajectory privacy protection), which are not suitable for real-time dynamic trajectory privacy protection of mobile users. Furthermore, due to the complexity and redundancy features of the full trajectory data, the efficiency and accuracy of the privacy protection model are significantly limited by the existing schemes. In this paper, we propose a new differential privacy scheme base on the Recurrent Neural Network for Dynamic trajectory privacy Protection (RNN-DP). We firstly introduce a recurrent neural network model to handle the real-time data effectively instead of the full data. Secondly, we novelty leverage the dynamic velocity attribute to form a quatemion to indicate the status of the users. Moreover, we design a prejudgment mechanism to increase the availability of differential privacy technology. Compared with the current state-of-the-art mechanisms, the experimental results demonstrate that RNN-DP displays excellent performance in privacy protection and data availability for dynamic trajectory data.
引用
收藏
页数:11
相关论文
共 39 条
  • [1] Synthesizing Plausible Privacy-Preserving Location Traces
    Bindschaedler, Vincent
    Shokri, Reza
    [J]. 2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2016, : 546 - 563
  • [2] Privacy-preserving trajectory data publishing by local suppression
    Chen, Rui
    Fung, Benjamin C. M.
    Mohammed, Noman
    Desai, Bipin C.
    Wang, Ke
    [J]. INFORMATION SCIENCES, 2013, 231 : 83 - 97
  • [3] Dwork C, 2006, LECT NOTES COMPUT SC, V4052, P1
  • [4] Calibrating noise to sensitivity in private data analysis
    Dwork, Cynthia
    McSherry, Frank
    Nissim, Kobbi
    Smith, Adam
    [J]. THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2006, 3876 : 265 - 284
  • [5] Dwork C, 2009, ACM S THEORY COMPUT, P371
  • [6] Cloud-Based Outsourcing for Enabling Privacy-Preserving Large-Scale Non-Negative Matrix Factorization
    Fu, Anmin
    Chen, Zhenzhu
    Mu, Yi
    Susilo, Willy
    Sun, Yinxia
    Wu, Jie
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (01) : 266 - 278
  • [7] Privacy-preserving composite modular exponentiation outsourcing with optimal checkability in single untrusted cloud server
    Fu, Anmin
    Li, Shuai
    Yu, Shui
    Zhang, Yuqing
    Sun, Yinxia
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 118 : 102 - 112
  • [8] DIPOR: An IDA-based dynamic proof of retrievability scheme for cloud storage systems
    Fu, Anmin
    Li, Yuhan
    Yu, Shui
    Yu, Yan
    Zhang, Gongxuan
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 104 : 97 - 106
  • [9] Utility-Aware Synthesis of Differentially Private and Attack-Resilient Location Traces
    Gursoy, Mehmet Emre
    Liu, Ling
    Truex, Stacey
    Yu, Lei
    Wei, Wenqi
    [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 196 - 211
  • [10] Hu YD, 2019, IEEE INFOCOM SER, P1594, DOI [10.1109/INFOCOM.2019.8737512, 10.1109/infocom.2019.8737512]