计算机应用 ›› 2016, Vol. 36 ›› Issue (6): 1544-1551.DOI: 10.11772/j.issn.1001-9081.2016.06.1544

• 网络空间安全 • 上一篇    下一篇

基于轨迹形状多样性的隐私保护算法

孙丹丹1,2, 罗永龙1,2, 范国婷1,2, 郭良敏1,2, 郑孝遥1,2   

  1. 1. 安徽师范大学 计算机科学与技术系, 安徽 芜湖 241003;
    2. 安徽师范大学 网络与信息安全工程技术研究中心, 安徽 芜湖 241003
  • 收稿日期:2015-11-16 修回日期:2016-01-13 出版日期:2016-06-10 发布日期:2016-06-08
  • 通讯作者: 罗永龙
  • 作者简介:孙丹丹(1990-),女,安徽淮南人,硕士研究生,主要研究方向:信息安全、隐私保护;罗永龙(1972-),男,安徽太湖人,教授,博士生导师,博士,CCF会员,主要研究方向:信息安全、隐私保护;范国婷(1989-),女,安徽阜阳人,硕士研究生,主要研究方向:信息安全、隐私保护;郭良敏(1980-),女,安徽肥东人,副教授,博士,CCF会员,主要研究方向:信息安全、分布式计算;郑孝遥(1981-),男,安徽芜湖人,讲师,博士研究生,CCF会员,主要研究方向:个性化推荐、信息安全。
  • 基金资助:
    国家自然科学基金资助项目(61370050);安徽省自然科学基金资助项目(1508085QF133);安徽省高校省级自然科学研究重点项目(KJ2014A084)。

Privacy protection algorithm based on trajectory shape diversity

SUN Dandan1,2, LUO Yonglong1,2, FAN Guoting1,2, GUO Liangmin1,2, ZHENG Xiaoyao1,2   

  1. 1. Department of Computer Science and Technology, Anhui Normal University, Wuhu Anhui 241003, China;
    2. Engineering Technology Research Center of Network and Information Security, Anhui Normal University, Wuhu Anhui 241003, China
  • Received:2015-11-16 Revised:2016-01-13 Online:2016-06-10 Published:2016-06-08
  • Supported by:
    This work is partially supported by the National Natural Science Foundation of China (61370050), the Natural Science Foundation of Anhui Province (1508085QF133), the Research Program of Anhui Province Education Department (KJ2014A084).

摘要: 针对匿名集内轨迹间的高度相似性而导致的轨迹隐私泄露问题,提出基于轨迹形状多样性的隐私保护算法。该算法通过轨迹同步化处理的方式改进轨迹数据的预处理过程,以减少信息损失;并借鉴l-多样性思想,在贪婪聚类时选择l条具有形状多样性的轨迹作为匿名集成员,以防止集合内成员轨迹的形状相似性过高而导致轨迹形状相似性攻击。理论分析及实验结果均表明,该算法能够在保证轨迹k-匿名的同时满足l-多样性,算法运行时间较小,且减少了轨迹信息损失,增强了轨迹数据的可用性,更好地实现了轨迹隐私保护,可有效应用到隐私保护轨迹数据发布中。

关键词: 轨迹数据发布, 隐私保护, 轨迹匿名, k-匿名, l-多样性

Abstract: The high similarity between trajectories in anonymity set may lead to the trajectory privacy leak. In order to solve the problem, a trajectory privacy preserving algorithm based on trajectory shape diversity was proposed. The exiting pre-processing method was improved to reduce the loss of information through trajectory synchronization processing. And by l-diversity, the trajectories with shape diversity were chosen as the members of the anonymity set when greedy clustering. Too high shape similarity between member trajectories of the set was prevented to avoid the attack of trajectory shape similarity. The theoretical analysis and experimental results show that, the proposed algorithm can realize k-anonymity of trajectory and l-diversity concurrently, reduce the running time and trajectory information loss, increase the trajectory data availability and realize better privacy protection. The proposed algorithm can be effectively applied to the privacy-preserving trajectory data publishing.

Key words: trajectory data publishing, privacy protection, trajectory anonymity, k-anonymity, l-diversity

中图分类号: