Privacy Preservation for Trajectory Publication Based on Differential Privacy

被引:12
作者
Yao, Lin [1 ,2 ]
Chen, Zhenyu [3 ]
Hu, Haibo [4 ]
Wu, Guowei [3 ]
Wu, Bin [5 ]
机构
[1] Dalian Univ Technol, DUT RU Int Sch Informat Sci & Engn, Tuqiang St 321, Dalian 116621, Liaoning, Peoples R China
[2] Cyberspace Secur Res Ctr, Peng Cheng Lab, Xingke First St 2, Dalian 518057, Liaoning, Peoples R China
[3] Dalian Univ Technol, Sch Software, Tuqiang St 321, Dalian 116621, Liaoning, Peoples R China
[4] Long Kong Polytech Univ, Dept Elect & Informat Engn, Yucai Rd 11, Hong Kong 999077, Peoples R China
[5] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Minzhuang Rd 89, Beijing 100093, Peoples R China
基金
国家重点研发计划;
关键词
Trajectory publishing; privacy preservation; differential privacy;
D O I
10.1145/3474839
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the proliferation of location-aware devices, trajectory data have been used widely in real-life applications. However, trajectory data are often associated with sensitive labels, such as users' purchase transactions and planned activities. As such, inappropriate sharing or publishing of these data could threaten users' privacy, especially when an adversary has sufficient background knowledge about a trajectory through other data sources, such as social media (check-in tags). Though differential privacy has been used to address the privacy of trajectory data, no existing method can protect the privacy of both trajectory data and sensitive labels. In this article, we propose a comprehensive trajectory publishing algorithm with three effective procedures. First, we apply density-based clustering to determine hotspots and outliers and then blur their locations by generalization. Second, we propose a graph-based model to efficiently capture the relationship among sensitive labels and trajectory points in all records and leverage Laplace noise to achieve differential privacy. Finally, we generate and publish trajectories by traversing and updating this graph until we travel all vertexes. Our experiments on synthetic and real-life datasets demonstrate that our algorithm effectively protects the privacy of both sensitive labels and location data in trajectory publication. Compared with existing works on trajectory publishing, our algorithm can also achieve higher data utility.
引用
收藏
页数:21
相关论文
共 27 条
  • [11] Jingyu Hua, 2015, 2015 IEEE Conference on Computer Communications (INFOCOM). Proceedings, P549, DOI 10.1109/INFOCOM.2015.7218422
  • [12] MIMIC-III, a freely accessible critical care database
    Johnson, Alistair E. W.
    Pollard, Tom J.
    Shen, Lu
    Lehman, Li-wei H.
    Feng, Mengling
    Ghassemi, Mohammad
    Moody, Benjamin
    Szolovits, Peter
    Celi, Leo Anthony
    Mark, Roger G.
    [J]. SCIENTIFIC DATA, 2016, 3
  • [13] Khan K, 2014, 2014 FIFTH INTERNATIONAL CONFERENCE ON THE APPLICATIONS OF DIGITAL INFORMATION AND WEB TECHNOLOGIES (ICADIWT), P232, DOI 10.1109/ICADIWT.2014.6814687
  • [14] PPTD: Preserving personalized privacy in trajectory data publishing by sensitive attribute generalization and trajectory local suppression
    Komishani, Elahe Ghasemi
    Abadi, Mahdi
    Deldar, Fatemeh
    [J]. KNOWLEDGE-BASED SYSTEMS, 2016, 94 : 43 - 59
  • [15] How Much Is Enough? Choosing ε for Differential Privacy
    Lee, Jaewoo
    Clifton, Chris
    [J]. INFORMATION SECURITY, 2011, 7001 : 325 - 340
  • [16] Achieving differential privacy of trajectory data publishing in participatory sensing
    Li, Meng
    Zhu, Liehuang
    Zhang, Zijian
    Xu, Rixin
    [J]. INFORMATION SCIENCES, 2017, 400 : 1 - 13
  • [17] Outlier Trajectory Detection: A Trajectory Analytics Based Approach
    Lv, Zhongjian
    Xu, Jiajie
    Zhao, Pengpeng
    Liu, Guanfeng
    Zhao, Lei
    Zhou, Xiaofang
    [J]. DATABASE SYSTEMS FOR ADVANCED APPLICATIONS (DASFAA 2017), PT I, 2017, 10177 : 231 - 246
  • [18] An overview on trajectory outlier detection
    Meng, Fanrong
    Yuan, Guan
    Lv, Shaoqian
    Wang, Zhixiao
    Xia, Shixiong
    [J]. ARTIFICIAL INTELLIGENCE REVIEW, 2019, 52 (04) : 2437 - 2456
  • [19] Releasing Correlated Trajectories: Towards High Utility and Optimal Differential Privacy
    Ou, Lu
    Qin, Zheng
    Liao, Shaolin
    Hong, Yuan
    Jia, Xiaohua
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (05) : 1109 - 1123
  • [20] Real-Time and Spatio-Temporal Crowd-Sourced Social Network Data Publishing with Differential Privacy
    Wang, Qian
    Zhang, Yan
    Lu, Xiao
    Wang, Zhibo
    Qin, Zhan
    Ren, Kui
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (04) : 591 - 606