Trajectory Privacy-Preserving Approach for Consecutive Queries Based on K-Anonymity

被引:0
作者
Zhu, Lin [1 ]
机构
[1] China Maritime Police Acad, Dept Training, Ningbo 315801, Zhejiang, Peoples R China
来源
FUZZY SYSTEMS AND DATA MINING III (FSDM 2017) | 2017年 / 299卷
关键词
trajectory privacy; k-anonymity; consecutive queries; KNN; ANONYMIZATION; MODEL;
D O I
10.3233/978-1-61499-828-0-416
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Existing approaches to protecting the privacy of trajectories using k-anonymity when requesting LBSs. However, the problem of anonymization is even harder due to dependencies between consecutive queries. In order to solve problem, a novel trajectory privacy-preserving approach based on k-anonymity is used in this paper. By formulating a query region, a spatial index model of trajectory data is established that can be further used by continuous KNN (K Nearest Neighbor) method to compute a candidate set of trajectory that have the similar area with current trajectory. In order to find the optimal anonymity path from k trajectories, a heuristic based approach is proposed. Empirical results show that the proposed method significantly decreases information losses for the same privacy levels and that information distortion strongly depends on value of parameter k. The k-anonymity based approach can effectively solve the problem arose from dependencies between consecutive queries and strengthen the privacy of trajectory data.
引用
收藏
页码:416 / 421
页数:6
相关论文
共 12 条
  • [1] Anonymization of moving objects databases by clustering and perturbation
    Abul, Osman
    Bonchi, Francesco
    Nanni, Mirco
    [J]. INFORMATION SYSTEMS, 2010, 35 (08) : 884 - 910
  • [2] Privacy-preserving trajectory stream publishing
    Al-Hussaeni, Khalil
    Fung, Benjamin C. M.
    Cheung, William K.
    [J]. DATA & KNOWLEDGE ENGINEERING, 2014, 94 : 89 - 109
  • [3] Ali M. E., 2002, DATA KHOWL ENG, V75, P1
  • [4] Quicker range- and k-NN joins in metric spaces
    Fredriksson, Kimmo
    Braithwaite, Billy
    [J]. INFORMATION SYSTEMS, 2015, 52 : 189 - 204
  • [5] Balancing trajectory privacy and data utility using a personalized anonymization model
    Gao, Sheng
    Ma, Jianfeng
    Sun, Cong
    Li, Xinghua
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 38 : 125 - 134
  • [6] Hao Z. X., 2013, THORETICAL BASIS SPA
  • [7] Jeh G., 2002, P 8 ACM SIGKDD INT C, P538
  • [8] Nergiz ME, 2009, TRANS DATA PRIV, V2, P47
  • [9] Rolando T. R., 2014, INFORM SYST, V38, P491
  • [10] Rolando T. R., 2015, ADV RES DATA PRIVACY, V567, P197