Novel trajectory privacy-preserving method based on clustering using differential privacy

被引:30
|
作者
Zhao, Xiaodong [1 ]
Pi, Dechang [1 ]
Chen, Junfu [1 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 211106, Peoples R China
基金
中国国家自然科学基金;
关键词
Trajectory data; Cluster analysis; Privacy protection; Differential privacy;
D O I
10.1016/j.eswa.2020.113241
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the development of location-aware technology, a large amount of location data of users is collected by the trajectory database. If these trajectory data are directly used for data mining without being processed, it will pose a threat to the user's personal privacy. At the moment, differential privacy is favored by experts and scholars because of its strict mathematical rigor, but how to apply differential privacy technology to trajectory clustering analysis is a difficult problem. To solve the problems in which existing trajectory privacy-preserving models have poor data availability or difficulty to resist complex privacy attacks, we devise novel trajectory privacy-preserving method based on clustering using differential privacy. More specifically, Laplacian noise is added to the count of trajectory location in the cluster to resist the continuous query attack. Then, radius-constrained Laplacian noise is added to the trajectory location data in the cluster to avoid too much noise affecting the clustering effect. According to the noise location data and the count of noise location, the noise clustering center in the cluster is obtained. Finally, it is considered that the attacker can associate the user trajectory with other information to form secret reasoning attack, and secret reasoning attack model is proposed. And we use the differential privacy technology to give corresponding resistance. Experimental results using the open data show that the proposed algorithm can not only effectively protect the private information of the trajectory data, but also ensure the data availability in cluster analysis. And compared with other algorithms, our algorithm has good effect on some evaluation indicators. (C) 2020 Elsevier Ltd. All rights reserved.
引用
收藏
页数:14
相关论文
共 50 条
  • [31] Privacy-preserving distributed clustering using generative models
    Merugu, S
    Ghosh, J
    THIRD IEEE INTERNATIONAL CONFERENCE ON DATA MINING, PROCEEDINGS, 2003, : 211 - 218
  • [32] Privacy-preserving clustering of data streams
    Chao, Ching-Ming
    Chen, Po-Zung
    Sun, Chu-Hao
    Tamkang Journal of Science and Engineering, 2010, 13 (03): : 349 - 358
  • [33] Privacy-Preserving Clustering Using C-Means
    Vashkevich, Alexey V.
    Zhukov, Vagim G.
    2015 INTERNATIONAL SIBERIAN CONFERENCE ON CONTROL AND COMMUNICATIONS (SIBCON), 2015,
  • [34] A Novel Matrix Representation for Privacy-Preserving Spatial Trajectory Prediction
    Hu, Wen-Chen
    Kaabouch, Naima
    Yang, Hung-Jen
    Chen, Lei
    2013 IEEE INTERNATIONAL CONFERENCE ON ELECTRO-INFORMATION TECHNOLOGY (EIT 2013), 2013,
  • [35] Protocols for Privacy-Preserving DBSCAN Clustering
    Xu Wei-jiang
    Huang Liu-sheng
    Luo Yong-long
    Yao Yi-fei
    Jing Wei-wei
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2007, 1 (01): : 45 - 56
  • [36] The Research of Privacy-preserving Clustering Algorithm
    Shen, Yanguang
    Han, Junrui
    Shan, Huifang
    2010 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY AND SECURITY INFORMATICS (IITSI 2010), 2010, : 324 - 327
  • [37] Privacy-preserving collaborative fuzzy clustering
    Lyu, Lingjuan
    Bezdek, James C.
    Law, Yee Wei
    He, Xuanli
    Palaniswami, Marimuthu
    DATA & KNOWLEDGE ENGINEERING, 2018, 116 : 21 - 41
  • [38] A Novel Approach for Differential Privacy-Preserving Federated Learning
    Elgabli, Anis
    Mesbah, Wessam
    IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2025, 6 : 466 - 476
  • [39] Privacy-Preserving Clustering of Data Streams
    Chao, Ching-Ming
    Chen, Po-Zung
    Sun, Chu-Hao
    JOURNAL OF APPLIED SCIENCE AND ENGINEERING, 2010, 13 (03): : 349 - 358
  • [40] Novel Privacy-preserving algorithm based on frequent path for trajectory data publishing
    Dong, Yulan
    Pi, Dechang
    KNOWLEDGE-BASED SYSTEMS, 2018, 148 : 55 - 65