Novel trajectory privacy-preserving method based on clustering using differential privacy

被引:30
|
作者
Zhao, Xiaodong [1 ]
Pi, Dechang [1 ]
Chen, Junfu [1 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 211106, Peoples R China
基金
中国国家自然科学基金;
关键词
Trajectory data; Cluster analysis; Privacy protection; Differential privacy;
D O I
10.1016/j.eswa.2020.113241
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the development of location-aware technology, a large amount of location data of users is collected by the trajectory database. If these trajectory data are directly used for data mining without being processed, it will pose a threat to the user's personal privacy. At the moment, differential privacy is favored by experts and scholars because of its strict mathematical rigor, but how to apply differential privacy technology to trajectory clustering analysis is a difficult problem. To solve the problems in which existing trajectory privacy-preserving models have poor data availability or difficulty to resist complex privacy attacks, we devise novel trajectory privacy-preserving method based on clustering using differential privacy. More specifically, Laplacian noise is added to the count of trajectory location in the cluster to resist the continuous query attack. Then, radius-constrained Laplacian noise is added to the trajectory location data in the cluster to avoid too much noise affecting the clustering effect. According to the noise location data and the count of noise location, the noise clustering center in the cluster is obtained. Finally, it is considered that the attacker can associate the user trajectory with other information to form secret reasoning attack, and secret reasoning attack model is proposed. And we use the differential privacy technology to give corresponding resistance. Experimental results using the open data show that the proposed algorithm can not only effectively protect the private information of the trajectory data, but also ensure the data availability in cluster analysis. And compared with other algorithms, our algorithm has good effect on some evaluation indicators. (C) 2020 Elsevier Ltd. All rights reserved.
引用
收藏
页数:14
相关论文
共 50 条
  • [21] Personalized Privacy-Preserving Trajectory Data Publishing
    Lu Qiwei
    Wang Caimei
    Xiong Yan
    Xia Huihua
    Huang Wenchao
    Gong Xudong
    CHINESE JOURNAL OF ELECTRONICS, 2017, 26 (02) : 285 - 291
  • [22] SecDM: privacy-preserving data outsourcing framework with differential privacy
    Dagher, Gaby G.
    Fung, Benjamin C. M.
    Mohammed, Noman
    Clark, Jeremy
    KNOWLEDGE AND INFORMATION SYSTEMS, 2020, 62 (05) : 1923 - 1960
  • [23] Perturbation Paradigms of Maintaining Privacy-Preserving Monotonicity for Differential Privacy
    Liu, Hai
    Wu, Zhenqiang
    Peng, Changgen
    Zhang, Shuangyue
    Tian, Feng
    Lu, Laifeng
    INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 10631 : 446 - 458
  • [24] Privacy-Preserving Streaming Truth Discovery in Crowdsourcing With Differential Privacy
    Wang, Dan
    Ren, Ju
    Wang, Zhibo
    Pang, Xiaoyi
    Zhang, Yaoxue
    Shen, Xuemin
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2022, 21 (10) : 3757 - 3772
  • [25] Privacy-Preserving Approach PBCN in Social Network With Differential Privacy
    Huang, Haiping
    Zhang, Dongjun
    Xiao, Fu
    Wang, Kai
    Gu, Jiateng
    Wang, Ruchuan
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2020, 17 (02): : 931 - 945
  • [26] GuardianAI: Privacy-preserving federated anomaly detection with differential privacy
    Alabdulatif, Abdulatif
    ARRAY, 2025, 26
  • [27] DP-AP: Differential Privacy-Preserving Affinity Propagation Clustering
    Cai, Hanbo
    Wang, Jinyan
    Liu, Xiaohong
    Li, Xianxian
    2020 IEEE 14TH INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (BIGDATASE 2020), 2020, : 73 - 79
  • [28] Privacy-Preserving Process Mining Differential Privacy for Event Logs
    Mannhardt, Felix
    Koschmider, Agnes
    Baracaldo, Nathalie
    Weidlich, Matthias
    Michael, Judith
    BUSINESS & INFORMATION SYSTEMS ENGINEERING, 2019, 61 (05) : 595 - 614
  • [29] Privacy-preserving federated discovery of DNA motifs with differential privacy
    Chen, Yao
    Gan, Wensheng
    Huang, Gengsen
    Wu, Yongdong
    Yu, Philip S.
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 249
  • [30] Personalized Privacy-Preserving Trajectory Data Publishing
    LU Qiwei
    WANG Caimei
    XIONG Yan
    XIA Huihua
    HUANG Wenchao
    GONG Xudong
    Chinese Journal of Electronics, 2017, 26 (02) : 285 - 291