Novel trajectory privacy-preserving method based on clustering using differential privacy

被引:30
|
作者
Zhao, Xiaodong [1 ]
Pi, Dechang [1 ]
Chen, Junfu [1 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 211106, Peoples R China
基金
中国国家自然科学基金;
关键词
Trajectory data; Cluster analysis; Privacy protection; Differential privacy;
D O I
10.1016/j.eswa.2020.113241
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the development of location-aware technology, a large amount of location data of users is collected by the trajectory database. If these trajectory data are directly used for data mining without being processed, it will pose a threat to the user's personal privacy. At the moment, differential privacy is favored by experts and scholars because of its strict mathematical rigor, but how to apply differential privacy technology to trajectory clustering analysis is a difficult problem. To solve the problems in which existing trajectory privacy-preserving models have poor data availability or difficulty to resist complex privacy attacks, we devise novel trajectory privacy-preserving method based on clustering using differential privacy. More specifically, Laplacian noise is added to the count of trajectory location in the cluster to resist the continuous query attack. Then, radius-constrained Laplacian noise is added to the trajectory location data in the cluster to avoid too much noise affecting the clustering effect. According to the noise location data and the count of noise location, the noise clustering center in the cluster is obtained. Finally, it is considered that the attacker can associate the user trajectory with other information to form secret reasoning attack, and secret reasoning attack model is proposed. And we use the differential privacy technology to give corresponding resistance. Experimental results using the open data show that the proposed algorithm can not only effectively protect the private information of the trajectory data, but also ensure the data availability in cluster analysis. And compared with other algorithms, our algorithm has good effect on some evaluation indicators. (C) 2020 Elsevier Ltd. All rights reserved.
引用
收藏
页数:14
相关论文
共 50 条
  • [21] A Privacy-Preserving Pedestrian Dead Reckoning Framework Based on Differential Privacy
    Feng, Tianyi
    Zhang, Zhixiang
    Wong, Wai-Choong
    Sun, Sumei
    Sikdar, Biplab
    2021 IEEE 32ND ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2021,
  • [22] The density-based clustering method for privacy-preserving data mining
    Wu, Jimmy Ming-Tai
    Lin, Jerry Chun-Wei
    Fournier-Viger, Philippe
    Djenouri, Youcef
    Chen, Chun-Hao
    Li, Zhongcui
    MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2019, 16 (03) : 1718 - 1728
  • [23] A Privacy-Preserving Mechanism Based on Local Differential Privacy in Edge Computing
    Bi, Mengnan
    Wang, Yingjie
    Cai, Zhipeng
    Tong, Xiangrong
    CHINA COMMUNICATIONS, 2020, 17 (09) : 50 - 65
  • [24] Privacy-Preserving Spatial Trajectory Prediction
    Hu, Wen-Chen
    Kaabouch, Naima
    Mousavinezhad, S. Hossein
    Yang, Hung-Jen
    2014 NATIONAL WIRELESS RESEARCH COLLABORATION SYMPOSIUM (NWRCS 2014), 2014, : 69 - +
  • [25] MDP: Privacy-Preserving GNN Based on Matrix Decomposition and Differential Privacy
    Xu, Wanghan
    Shi, Bin
    Zhang, Jiqiang
    Feng, Zhiyuan
    Pan, Tianze
    Dong, Bo
    2023 IEEE INTERNATIONAL CONFERENCE ON JOINT CLOUD COMPUTING, JCC, 2023, : 38 - 45
  • [26] Privacy-Preserving Collaborative Filtering Algorithm Based on Local Differential Privacy
    Ting Bao
    Lei Xu
    Liehuang Zhu
    Lihong Wang
    Ruiguang Li
    Tielei Li
    ChinaCommunications, 2021, 18 (11) : 42 - 60
  • [27] Privacy-preserving collaborative filtering algorithm based on local differential privacy
    Bao, Ting
    Xu, Lei
    Zhu, Liehuang
    Wang, Lihong
    Li, Ruiguang
    Li, Tielei
    CHINA COMMUNICATIONS, 2021, 18 (11) : 42 - 60
  • [28] A Privacy-Preserving Mechanism Based on Local Differential Privacy in Edge Computing
    Mengnan Bi
    Yingjie Wang
    Zhipeng Cai
    Xiangrong Tong
    中国通信, 2020, 17 (09) : 50 - 65
  • [29] Trajectory Privacy Protection Method Based on Differential Privacy
    Yuan S.-L.
    Pi D.-C.
    Xu M.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2021, 49 (07): : 1266 - 1273
  • [30] Privacy-Preserving Bin-Packing With Differential Privacy
    Li, Tianyu
    Erkin, Zekeriya
    Lagendijk, Reginald L.
    IEEE OPEN JOURNAL OF SIGNAL PROCESSING, 2022, 3 : 94 - 106