Trajectory Privacy-Preserving Approach for Consecutive Queries Based on K-Anonymity

被引:0
|
作者
Zhu, Lin [1 ]
机构
[1] China Maritime Police Acad, Dept Training, Ningbo 315801, Zhejiang, Peoples R China
关键词
trajectory privacy; k-anonymity; consecutive queries; KNN; ANONYMIZATION; MODEL;
D O I
10.3233/978-1-61499-828-0-416
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Existing approaches to protecting the privacy of trajectories using k-anonymity when requesting LBSs. However, the problem of anonymization is even harder due to dependencies between consecutive queries. In order to solve problem, a novel trajectory privacy-preserving approach based on k-anonymity is used in this paper. By formulating a query region, a spatial index model of trajectory data is established that can be further used by continuous KNN (K Nearest Neighbor) method to compute a candidate set of trajectory that have the similar area with current trajectory. In order to find the optimal anonymity path from k trajectories, a heuristic based approach is proposed. Empirical results show that the proposed method significantly decreases information losses for the same privacy levels and that information distortion strongly depends on value of parameter k. The k-anonymity based approach can effectively solve the problem arose from dependencies between consecutive queries and strengthen the privacy of trajectory data.
引用
收藏
页码:416 / 421
页数:6
相关论文
共 50 条
  • [1] Privacy-preserving distributed k-anonymity
    Jiang, W
    Clifton, C
    DATA AND APPLICATIONS SECURITY XIX, PROCEEDINGS, 2005, 3654 : 166 - 177
  • [2] K-Anonymity Based Approach For Privacy-Preserving Web Service Selection
    Ammar, Nariman
    Malik, Zaki
    Medjahed, Brahim
    Alodib, Mohammed
    2015 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES (ICWS), 2015, : 281 - 288
  • [3] A Privacy-preserving Computation Offloading Method Based on k-Anonymity
    Zhao Xing
    Peng Jianhua
    You Wei
    Chen Lu
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2021, 43 (04) : 892 - 899
  • [4] A k-anonymity privacy-preserving approach in wireless medical monitoring environments
    Belsis, Petros
    Pantziou, Grammati
    PERSONAL AND UBIQUITOUS COMPUTING, 2014, 18 (01) : 61 - 74
  • [5] A k-anonymity privacy-preserving approach in wireless medical monitoring environments
    Petros Belsis
    Grammati Pantziou
    Personal and Ubiquitous Computing, 2014, 18 : 61 - 74
  • [6] (k, ε, δ)-Anonymization: privacy-preserving data release based on k-anonymity and differential privacy
    Tsou, Yao-Tung
    Alraja, Mansour Naser
    Chen, Li-Sheng
    Chang, Yu-Hsiang
    Hu, Yung-Li
    Huang, Yennun
    Yu, Chia-Mu
    Tsai, Pei-Yuan
    SERVICE ORIENTED COMPUTING AND APPLICATIONS, 2021, 15 (03) : 175 - 185
  • [7] Adaptive k-Anonymity Approach for Privacy Preserving in Cloud
    Arava, Karuna
    Lingamgunta, Sumalatha
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2020, 45 (04) : 2425 - 2432
  • [8] Efficient Location Privacy-Preserving k-Anonymity Method Based on the Credible Chain
    Wang, Hui
    Huang, Haiping
    Qin, Yuxiang
    Wang, Yunqi
    Wu, Min
    ISPRS INTERNATIONAL JOURNAL OF GEO-INFORMATION, 2017, 6 (06)
  • [9] Adaptive k-Anonymity Approach for Privacy Preserving in Cloud
    Karuna Arava
    Sumalatha Lingamgunta
    Arabian Journal for Science and Engineering, 2020, 45 : 2425 - 2432
  • [10] Partial k-Anonymity for Privacy-Preserving Social Network Data Publishing
    Liu, Peng
    Bai, Yan
    Wang, Lie
    Li, Xianxian
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2017, 27 (01) : 71 - 90