Novel trajectory privacy-preserving method based on clustering using differential privacy

被引:30
|
作者
Zhao, Xiaodong [1 ]
Pi, Dechang [1 ]
Chen, Junfu [1 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 211106, Peoples R China
基金
中国国家自然科学基金;
关键词
Trajectory data; Cluster analysis; Privacy protection; Differential privacy;
D O I
10.1016/j.eswa.2020.113241
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the development of location-aware technology, a large amount of location data of users is collected by the trajectory database. If these trajectory data are directly used for data mining without being processed, it will pose a threat to the user's personal privacy. At the moment, differential privacy is favored by experts and scholars because of its strict mathematical rigor, but how to apply differential privacy technology to trajectory clustering analysis is a difficult problem. To solve the problems in which existing trajectory privacy-preserving models have poor data availability or difficulty to resist complex privacy attacks, we devise novel trajectory privacy-preserving method based on clustering using differential privacy. More specifically, Laplacian noise is added to the count of trajectory location in the cluster to resist the continuous query attack. Then, radius-constrained Laplacian noise is added to the trajectory location data in the cluster to avoid too much noise affecting the clustering effect. According to the noise location data and the count of noise location, the noise clustering center in the cluster is obtained. Finally, it is considered that the attacker can associate the user trajectory with other information to form secret reasoning attack, and secret reasoning attack model is proposed. And we use the differential privacy technology to give corresponding resistance. Experimental results using the open data show that the proposed algorithm can not only effectively protect the private information of the trajectory data, but also ensure the data availability in cluster analysis. And compared with other algorithms, our algorithm has good effect on some evaluation indicators. (C) 2020 Elsevier Ltd. All rights reserved.
引用
收藏
页数:14
相关论文
共 50 条
  • [31] Trajectory Privacy Protection Method Based on Differential Privacy in Crowdsensing
    Zhang, Qiong
    Wang, Taochun
    Tao, Yuan
    Chen, Fulong
    Xie, Dong
    Zhao, Chuanxin
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2024, 17 (06) : 4423 - 4435
  • [32] Differential Privacy-Preserving Density Peaks Clustering Based on Shared Near Neighbors Similarity
    Sun, Liping
    Bao, Shuting
    Ci, Shang
    Zheng, Xiaoyao
    Guo, Liangmin
    Luo, Yonglong
    IEEE ACCESS, 2019, 7 (89427-89440) : 89427 - 89440
  • [33] Privacy-Preserving DBSCAN Clustering Algorithm Based on Negative Database
    Zhang, Mingkun
    Liao, Hucheng
    2020 5TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA ANALYTICS (IEEE ICBDA 2020), 2020, : 209 - 213
  • [34] Deep learning-based privacy-preserving framework for synthetic trajectory generation
    Kim, Jong Wook
    Jang, Beakcheol
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2022, 206
  • [35] Privacy-preserving Deep-learning Models for Fingerprint Data Using Differential Privacy
    Mohammadi, Maryam
    Sabry, Farida
    Labda, Wadha
    Malluhi, Qutaibah
    PROCEEDINGS OF THE 9TH ACM INTERNATIONAL WORKSHOP ON SECURITY AND PRIVACY ANALYTICS, IWSPA 2023, 2023, : 45 - 53
  • [36] Differential Privacy-Based Double Energy Auction Privacy-Preserving on Consortium Blockchain
    Jiang, Shun-Rong
    Shi, Kun
    Zhou, Yong
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2024, 52 (09): : 3023 - 3037
  • [37] Privacy-Preserving Personalized Recommendation: An Instance-based Approach via Differential Privacy
    Shen, Yilin
    Jin, Hongxia
    2014 IEEE INTERNATIONAL CONFERENCE ON DATA MINING (ICDM), 2014, : 540 - 549
  • [38] Protecting sensitive place visits in privacy-preserving trajectory publishing
    Wang, Nana
    Kankanhalli, Mohan S.
    COMPUTERS & SECURITY, 2020, 97
  • [39] Design of a privacy-preserving algorithm for peer-to-peer network based on differential privacy
    Yu J.
    Ingenierie des Systemes d'Information, 2019, 24 (04): : 433 - 437
  • [40] A Novel Location Privacy-Preserving Approach Based on Blockchain
    Qiu, Ying
    Liu, Yi
    Li, Xuan
    Chen, Jiahui
    SENSORS, 2020, 20 (12) : 1 - 12