计算机应用 ›› 2015, Vol. 35 ›› Issue (12): 3437-3441.DOI: 10.11772/j.issn.1001-9081.2015.12.3437

• 信息安全 • 上一篇    下一篇

不确定环境下轨迹k-匿名隐私保护

朱麟, 黄胜波   

  1. 公安海警学院电子技术系, 浙江宁波 315801
  • 收稿日期:2015-06-11 修回日期:2015-08-29 出版日期:2015-12-10 发布日期:2015-12-10
  • 通讯作者: 朱麟(1984-),男,浙江宁波人,讲师,硕士研究生,主要研究方向:人工智能、数据挖掘
  • 作者简介:黄胜波(1963-),男,浙江宁波人,教授,主要研究方向:通信工程、信息指挥。
  • 基金资助:
    公安部重点研究计划项目(201201ZDYJ013);第四批宁波市高校重点建设学科军事通信学资助项目(甬教高[2013]169号)。

K-anonymity privacy-preserving for trajectory in uncertain environment

ZHU Lin, HUANG Shengbo   

  1. Department of Electronics, China Maritime Police Academy, Ningbo Zhejiang 315801, China
  • Received:2015-06-11 Revised:2015-08-29 Online:2015-12-10 Published:2015-12-10

摘要: 综合考虑不确定环境下移动对象的影响因素,提出了对船舶自动导航系统所记录的轨迹进行k-匿名的隐私保护方法。该方法首先建立一个不确定空间索引,并将不确定空间用四叉树结构存储,然后通过使用连续近邻查询方法找出与当前轨迹相似区域的轨迹,并将这些轨迹加入匿名候选集。由于考虑到路网规模影响匿名信息的有效性以及攻击者对轨迹的攻击概率,采用启发式算法生成匿名轨迹最佳利用链,从而加大对轨迹隐私保护的力度。最后实验结果表明,所提出的方法比传统方法信息丢失率降低了20%~50%,信息扭曲度随着查询范围的增大能保持在50%以下,代价损失相比传统方法降低了10%~30%。该方法可以有效防止恶意者对轨迹进行攻击获取信息,应用于公务船艇海上执勤执法。

关键词: 轨迹隐私, k-匿名, 最佳利用链, 不确定空间, 隐私保护

Abstract: To comprehensively consider the factors influencing the moving objects in uncertain environment, a k-anonymity privacy-preserving method for the trajectory recorded by automatic identification system was presented. Firstly, an uncertain spatial index model was established which was stored in grid quadtree. Then the continuous k-Nearest Neighbor (KNN) query method was used to find the trajectory which had the similar area to the current trajectory, and the trajectory was added to the anonymous candidate set. By considering the network scale influence on the effectiveness of the anonymous information and the probability of attacker's attack on trajectory, the optimal exploit chain of trajectory was generated by using the heuristic algorithm to strengthen the trajectory privacy-preserving. Finally, the experimental results show that, compared with the traditional method, the proposed method can decrease the information loss by 20% to 50%,while the information distortion can maintain below 50% with the enlarge of query range and the cost loss is cut down by 10% to 30%.The proposed method can effectively prevent malicious attackers from the information access of trajectory,and can be applied for the official boat to law enforcement at sea.

Key words: trajectory privacy, k-anonymity, optimal exploit chain, uncertain space, privacy-preserving

中图分类号: