Novel trajectory privacy-preserving method based on clustering using differential privacy

被引:30
|
作者
Zhao, Xiaodong [1 ]
Pi, Dechang [1 ]
Chen, Junfu [1 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 211106, Peoples R China
基金
中国国家自然科学基金;
关键词
Trajectory data; Cluster analysis; Privacy protection; Differential privacy;
D O I
10.1016/j.eswa.2020.113241
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the development of location-aware technology, a large amount of location data of users is collected by the trajectory database. If these trajectory data are directly used for data mining without being processed, it will pose a threat to the user's personal privacy. At the moment, differential privacy is favored by experts and scholars because of its strict mathematical rigor, but how to apply differential privacy technology to trajectory clustering analysis is a difficult problem. To solve the problems in which existing trajectory privacy-preserving models have poor data availability or difficulty to resist complex privacy attacks, we devise novel trajectory privacy-preserving method based on clustering using differential privacy. More specifically, Laplacian noise is added to the count of trajectory location in the cluster to resist the continuous query attack. Then, radius-constrained Laplacian noise is added to the trajectory location data in the cluster to avoid too much noise affecting the clustering effect. According to the noise location data and the count of noise location, the noise clustering center in the cluster is obtained. Finally, it is considered that the attacker can associate the user trajectory with other information to form secret reasoning attack, and secret reasoning attack model is proposed. And we use the differential privacy technology to give corresponding resistance. Experimental results using the open data show that the proposed algorithm can not only effectively protect the private information of the trajectory data, but also ensure the data availability in cluster analysis. And compared with other algorithms, our algorithm has good effect on some evaluation indicators. (C) 2020 Elsevier Ltd. All rights reserved.
引用
收藏
页数:14
相关论文
共 50 条
  • [11] Privacy-preserving quantum machine learning using differential privacy
    Senekane, Makhamisa
    Mafu, Mhlambululi
    Taele, Benedict Molibeli
    2017 IEEE AFRICON, 2017, : 1432 - 1435
  • [12] Privacy-preserving distributed clustering
    Erkin, Zekeriya
    Veugen, Thijs
    Toft, Tomas
    Lagendijk, Reginald L.
    EURASIP JOURNAL ON INFORMATION SECURITY, 2013, (01):
  • [13] Privacy-preserving Searchable Encryption Based on Anonymization and Differential privacy
    Ma, Caixia
    Jia, Chunfu
    Du, Ruizhong
    Ha, Guanxiong
    Li, Mingyue
    2024 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, ICWS 2024, 2024, : 371 - 382
  • [14] Differential Privacy-Preserving Recommendation Algorithm Based on Bhattacharyya Coefficient Clustering
    Wang Y.
    Yin E.-M.
    Ran X.
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2021, 44 (02): : 81 - 88
  • [15] Privacy-Preserving Monotonicity of Differential Privacy Mechanisms
    Liu, Hai
    Wu, Zhenqiang
    Zhou, Yihui
    Peng, Changgen
    Tian, Feng
    Lu, Laifeng
    APPLIED SCIENCES-BASEL, 2018, 8 (11):
  • [16] Privacy-preserving Density-based Clustering
    Bozdemir, Beyza
    Canard, Sebastien
    Ermis, Orhan
    Moellering, Helen
    Onen, Melek
    Schneider, Thomas
    ASIA CCS'21: PROCEEDINGS OF THE 2021 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 658 - 671
  • [17] Uncertain trajectory privacy-preserving method of moving object
    Wang, Shuang
    Zhou, Fu-Cai
    Wu, Li-Na
    Tongxin Xuebao/Journal on Communications, 2015, 36
  • [18] The privacy preserving method for dynamic trajectory releasing based on adaptive clustering
    Xin, Yu
    Xie, Zhi-Qiang
    Yang, Jing
    INFORMATION SCIENCES, 2017, 378 : 131 - 143
  • [19] A Framework for Privacy-Preserving in IoV Using Federated Learning With Differential Privacy
    Adnan, Muhammad
    Syed, Madiha Haider
    Anjum, Adeel
    Rehman, Semeen
    IEEE ACCESS, 2025, 13 : 13507 - 13521
  • [20] Privacy-preserving trajectory stream publishing
    Al-Hussaeni, Khalil
    Fung, Benjamin C. M.
    Cheung, William K.
    DATA & KNOWLEDGE ENGINEERING, 2014, 94 : 89 - 109