Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Crowdsourcing location data collection for local differential privacy
HUO Zheng, ZHANG Kun, HE Ping, WU Yanbin
Journal of Computer Applications    2019, 39 (3): 763-768.   DOI: 10.11772/j.issn.1001-9081.2018071541
Abstract604)      PDF (922KB)(373)       Save
To solve the problem of privacy leakage in crowdsourced location data collection, a locally differentially private location data collection method with crowdsourcing was proposed. Firstly, a Voronoi diagram constructed by point-by-point insertion method was used to partition the road network space. Secondly, a random disturbance satisfying local differential privacy was used to disturb the original location data in each Voronoi grid. Thirdly, a designed spatial range query method was applied to noisy datasets to get the unbiased estimation of the actual result. Finally, experiments were carried out on spatial range queries to compare the proposed algorithm with PTDC (Privacy-preserving Trajectory Data Collection) algorithm. The results show that the query error rate is no more than 40%, and less than 20%in the best situation, and the running time is less than 8 seconds, which are better than those of PTDC algorithm while the proposed method has a higher degree of privacy preserving.
Reference | Related Articles | Metrics
k-CS algorithm: trajectory data privacy-preserving based on semantic location protection
HUO Zheng, CUI Honglei, HE Ping
Journal of Computer Applications    2018, 38 (1): 182-187.   DOI: 10.11772/j.issn.1001-9081.2017071676
Abstract455)      PDF (986KB)(315)       Save
Since the data utility would be sharply reduced after privacy-preserving process and several attack models could not be resisted by traditional algorithms, such as, semantic location attacks and maximum moving speed attacks, a trajectory privacy-preserving algorithm based on semantic location preservation under road network constraints, called k-CS ( k-Connected Sub-graph) algorithm, was proposed. Firstly, two attack models in road network space were proposed. Secondly, the privacy problem of semantic trajectory was defined as the k-CS anonymity problem, which was then proven NP-hard. Finally, an approximation algorithm was proposed to cluster nodes in the road network to construct anonymity zones, and semantic locations were replaced with the corresponding anonymity zones. Experiments were implemented to compare the proposed algorithm with the classical algorithm, called ( k,δ)-anonymity. The experimental results show that, the k-CS algorithm performs better than ( k,δ)-anonymity algorithm in data utility, query error and runtime. Specifically, k-CS algorithm reduces about 20% in information loss than ( k,δ)-anonymity, and k-CS algorithm deceased about 10% in runtime than ( k,δ)-anonymity algorithm.
Reference | Related Articles | Metrics
PTDC:privacy-aware trajectory data collection technology under road network constraint
HUO Zheng, WANG Weihong, CAO Yuhui
Journal of Computer Applications    2017, 37 (9): 2567-2571.   DOI: 10.11772/j.issn.1001-9081.2017.09.2567
Abstract597)      PDF (1006KB)(381)       Save
Since the problem of trajectory privacy violation and homogeneous semantic location attack of moving objects in road network environment is very serious, a Privacy-aware Trajectory Data Collection (PTDC) algorithm was proposed. Firstly, through visits' entropy of Points Of Interests (POI), the sensitivity of each POI was computed; secondly, based on the mixture distance of sensitivity and Euclidean distance, θ-weight was defined and a weighted model of vertices and edges in the network environment was established to reach a k-θ-D anonymity, which can resist the semantic location homogeneity attack; finally, based on the bread-first traversal algorithm of undirected graph, an anonymous algorithm was proposed to satisfy the semantic difference of POIs, so that user's sensitive sampling location was replaced by an anonymous region. Data utility caused by PTDC algorithm was theoretically evaluated. A set of experiments were implemented to test PTDC algorithm, and compare it with the privacy-preserving algorithm named YCWA (You Can Walk Alone) in free space. In theory, the privacy level of YCWA algorithm was lower than PTDC algorithm. The experimental results show that the PTDC algorithm has an average information loss of about 15%, and average range count query error rate of about 12%, which performs slightly worse than YCWA algorithm, while the running time of PTDC algorithm is less than 5 seconds, which is much better than YCWA algorithm. PTDC algorithm meets the needs of real-time online data collection.
Reference | Related Articles | Metrics