A Privacy-Preserving Trajectory Publication Method Based on Secure Start-Points and End-Points

المؤلفون المشاركون

Zhao, Yannian
Yu, Qingying
Hu, Zhaoyan
Luo, Yonglong

المصدر

Mobile Information Systems

العدد

المجلد 2020، العدد 2020 (31 ديسمبر/كانون الأول 2020)، ص ص. 1-12، 12ص.

الناشر

Hindawi Publishing Corporation

تاريخ النشر

2020-04-21

دولة النشر

مصر

عدد الصفحات

12

التخصصات الرئيسية

هندسة الاتصالات

الملخص EN

By judging whether the start-point and end-point of a trajectory conform to the user’s behavioral habits, an attacker who possesses background knowledge can breach the anonymous trajectory.

Traditional trajectory privacy preservation schemes often generate an anonymous set of trajectories without considering the security of the trajectory start- and end-points.

To address this problem, this paper proposes a privacy-preserving trajectory publication method based on generating secure start- and end-points.

First, a candidate set containing a secure start-point and end-point is generated according to the user’s habits.

Second, k−1 anonymous trajectories are generated bidirectionally according to that secure candidate set.

Finally, accessibility corrections are made for each anonymous trajectory.

This method integrates features such as local geographic reachability and trajectory similarity when generating an anonymized set of trajectories.

This provides users with privacy preservation at the k-anonymity level, without relying on the trusted third parties and with low algorithm complexity.

Compared with existing methods such as trajectory rotation and unidirectional generation, theoretical analysis and experimental results on the datasets of real trajectories show that the anonymous trajectories generated by the proposed method can ensure the security of trajectory privacy while maintaining a higher trajectory similarity.

نمط استشهاد جمعية علماء النفس الأمريكية (APA)

Zhao, Yannian& Luo, Yonglong& Yu, Qingying& Hu, Zhaoyan. 2020. A Privacy-Preserving Trajectory Publication Method Based on Secure Start-Points and End-Points. Mobile Information Systems،Vol. 2020, no. 2020, pp.1-12.
https://search.emarefa.net/detail/BIM-1192356

نمط استشهاد الجمعية الأمريكية للغات الحديثة (MLA)

Zhao, Yannian…[et al.]. A Privacy-Preserving Trajectory Publication Method Based on Secure Start-Points and End-Points. Mobile Information Systems No. 2020 (2020), pp.1-12.
https://search.emarefa.net/detail/BIM-1192356

نمط استشهاد الجمعية الطبية الأمريكية (AMA)

Zhao, Yannian& Luo, Yonglong& Yu, Qingying& Hu, Zhaoyan. A Privacy-Preserving Trajectory Publication Method Based on Secure Start-Points and End-Points. Mobile Information Systems. 2020. Vol. 2020, no. 2020, pp.1-12.
https://search.emarefa.net/detail/BIM-1192356

نوع البيانات

مقالات

لغة النص

الإنجليزية

الملاحظات

Includes bibliographical references

رقم السجل

BIM-1192356