Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Frequent location privacy-preserving algorithm based on geosocial network
NING Xueli, LUO Yonglong, XING Kai, ZHENG Xiaoyao
Journal of Computer Applications    2018, 38 (3): 688-692.   DOI: 10.11772/j.issn.1001-9081.2017071686
Abstract470)      PDF (762KB)(425)       Save
Focusing on the attack of frequent location as background knowledge causing user identity disclosure in geosocial network, a privacy-preserving algorithm based on frequent location was proposed. Firstly, The frequent location set was generated by the frequency of user check-in which was allocated for every user. Secondly,according to the background knowledge, hyperedges were composed by frequent location subset. Some hyperedges were remerged which did not meet anonymity parameter k, meanwhile the minimum bias of user and bias of location were chosen as hyperedges remerging metrics. Finally, in the comparison experiments with ( k,m)-anonymity algorithm, when the background knowledge was 3, the average bias of user and bias of location were decreased by about 19.1% and 8.3% on dataset Gowalla respectively, and about 22.2% and 10.7% on dataset Brightkite respectively. Therefore, the proposed algorithm can effectively preserve frequent location privacy, and reduces bias of user and location.
Reference | Related Articles | Metrics
Trajectory privacy-preserving method based on information entropy suppression
WANG Yifei, LUO Yonglong, YU Qingying, LIU Qingqing, CHEN Wen
Journal of Computer Applications    2018, 38 (11): 3252-3257.   DOI: 10.11772/j.issn.1001-9081.2018040861
Abstract647)      PDF (1005KB)(458)       Save
Aiming at the problem of poor data anonymity and large data loss caused by excessive suppression of traditional high-dimensional trajectory privacy protection model, a new trajectory-privacy method based on information entropy suppression was proposed. A flowgraph based on entropy was generated for the trajectory dataset, a reasonable cost function according to the information entropy of spatio-temproal points was designed, and the privacy was preserved by local suppression of spatio-temproal points. Meanwhile, an improved algorithm for comparing the similarity of flowgraphs before and after suppression was proposed, and a function for evaluating the privacy gains was introduced.Finally, the proposed method was compared with the LK-Local (Length K-anonymity based on Local suppression) approach in trajectory privacy and data practicability. The experimental results on a synthetic subway transportation system dataset show that, with the same anonymous parameter value the proposed method increases the similarity measure by about 27%, reduces the data loss by about 25%, and increases the privacy gain by about 21%.
Reference | Related Articles | Metrics
Privacy-preserving trajectory data publishing based on non-sensitive information analysis
DENG Jingsong, LUO Yonglong, YU Qingying, CHEN Fulong
Journal of Computer Applications    2017, 37 (2): 488-493.   DOI: 10.11772/j.issn.1001-9081.2017.02.0488
Abstract583)      PDF (1003KB)(618)       Save
Focusing on the issue of privacy disclosure between trajectory and non-sensitive information, a trajectory privacy preserving algorithm based on non-sensitive information analysis was proposed. Firstly, the correlation between trajectory and non-sensitive information was analyzed to build trajectory privacy disclosure decision model, and the Minimal Violating Sequence tuple (MVS) was gotten. Secondly, using common subsequences, the doublets with the minimal loss of trajectory data in MVS were selected as the suppression objects when removing the privacy risks caused by MVS, then the anonymized trajectory dataset with privacy and low data loss was obtained. In the comparison experiments with LKC-Local algorithm and Trad-Local algorithm, when the sequence length is 3, the average instance loss of the proposed algorithm is decreased by about 6% and 30% respectively, and the average MFS (Maximal Frequent Sequence) loss is decreased by about 7% and 60% respectively. The experimental results verify that the proposed algorithm can effectively improve the quality of recommend service.
Reference | Related Articles | Metrics
Privacy protection algorithm based on trajectory shape diversity
SUN Dandan, LUO Yonglong, FAN Guoting, GUO Liangmin, ZHENG Xiaoyao
Journal of Computer Applications    2016, 36 (6): 1544-1551.   DOI: 10.11772/j.issn.1001-9081.2016.06.1544
Abstract517)      PDF (1156KB)(384)       Save
The high similarity between trajectories in anonymity set may lead to the trajectory privacy leak. In order to solve the problem, a trajectory privacy preserving algorithm based on trajectory shape diversity was proposed. The exiting pre-processing method was improved to reduce the loss of information through trajectory synchronization processing. And by l-diversity, the trajectories with shape diversity were chosen as the members of the anonymity set when greedy clustering. Too high shape similarity between member trajectories of the set was prevented to avoid the attack of trajectory shape similarity. The theoretical analysis and experimental results show that, the proposed algorithm can realize k-anonymity of trajectory and l-diversity concurrently, reduce the running time and trajectory information loss, increase the trajectory data availability and realize better privacy protection. The proposed algorithm can be effectively applied to the privacy-preserving trajectory data publishing.
Reference | Related Articles | Metrics
Hierarchical co-location pattern mining approach of unevenly distributed fuzzy spatial objects
YU Qingying, LUO Yonglong, WU Qian, CHEN Chuanming
Journal of Computer Applications    2016, 36 (11): 3113-3117.   DOI: 10.11772/j.issn.1001-9081.2016.11.3113
Abstract576)      PDF (904KB)(417)       Save
Focusing on the issue that the existing co-location pattern mining algorithms fail to effectively address the problem of unevenly distributed spatial objects, a hierarchical co-location pattern mining approach of unevenly distributed fuzzy spatial objects was proposed. Firstly, an unevenly distributed dataset generation method was put forward. Secondly, the unevenly distributed dataset was partitioned by a hierarchical mining method in order to provide each region with an even spatial distribution. Finally, the spatial data mining of the separated fuzzy objects was conducted by means of the improved PO_RI_PC algorithm. Based on the distance variation coefficient, the neighborhood relationship graph for each sub-region was constructed to complete the regional fusion, and then the co-location pattern mining was realized. The experimental results show that, compared to the traditional method, the proposed method has higher execution efficiency. With the change of the number of instances and uneven degree, more co-location sets are mined, and the average increase reaches about 25% under the same condition, more accurate mining results are obtained through this method.
Reference | Related Articles | Metrics
Edge partitioning approach for protecting sensitive relationships in social network
FAN Guoting, LUO Yonglong, SUN Dandan, WANG Taochun, ZHENG Xiaoyao
Journal of Computer Applications    2016, 36 (1): 207-211.   DOI: 10.11772/j.issn.1001-9081.2016.01.0207
Abstract472)      PDF (949KB)(324)       Save
The sensitive relationships between users are important privacy information in social networks. Focusing on the issue of sensitive relationships leakage between users, an edge partitioning algorithm was proposed. Firstly, every non-sensitive edge was partitioned into some sub-edges after the sensitive edge was deleted in social networks. Secondly, every sub-edge was assigned information which belongs to the original non-sensitive edge. So every sub-edge contained part information of the original non-sensitive edge. The anonymized social network that preserves privacy was generated finally. In the comparison experiments with cluster-edge algorithm and cluster-based with constraints algorithm, the edge partitioning algorithm had a greater decrease of the probability of sensitive relationships leakage with maintaining high availability of data. The probability was decreased by about 30% and 20% respectively. As a result, the edge partitioning algorithm can effectively protect sensitive relationships in social networks.
Reference | Related Articles | Metrics
Trust model based on user types and privacy protection for personalized cloud services
LIU Fei LUO Yonglong GUO Liangmin MA Yuan
Journal of Computer Applications    2014, 34 (4): 994-998.   DOI: 10.11772/j.issn.1001-9081.2014.04.0994
Abstract411)      PDF (800KB)(429)       Save

Concerning the problem that it is difficult for the users in cloud computing to obtain the high-quality and personalized cloud services provided by a large number of cloud providers, a trust model based on user types and privacy protection for the personalized cloud services was proposed. Firstly, the users were divided into familiar users, strange users and normal users according to the transaction history. Secondly, a fair and reasonable trust evaluation Agent was introduced to protect users' privacy, which could evaluate the trust relationship between requesters and providers based on the user types. Lastly, in view of the dynamics of trust, a new updating mechanism combined with the transaction time and transaction amount was provided based on Quality of Service (QoS). The simulation results show that the proposed model has higher transaction success rate than AARep and PeerTrust. The transaction success rate can be increased by 10% and 16% in the harsh environment where the malicious user ratio reaches 70%. This method can improve transaction success rate, and has a strong ability to withstand harsh environments.

Reference | Related Articles | Metrics
Fined-grained access control protocol for privacy preservation in wireless sensor network
HU Peng ZUO Kaizhong GUO Liangmin LUO Yonglong
Journal of Computer Applications    2014, 34 (2): 461-463.  
Abstract522)      PDF (462KB)(527)       Save
In order to protect user's identity privacy and data security for access control in wireless sensor networks, a privacy-preserving access control protocol in multi-user wireless sensor networks was proposed. The protocol employed attribute-based encryption algorithms and distributed access control mode, using the attribute certificates, digital signatures and threshold mechanism to achieve the pay access, fine-grained access control and anonymous access. And it also ensured the confidentiality of data transmission and data integrity of query command. Analysis and protocol comparison shows that the proposed protocol has several advantages over the current access control methods: lower cost in computation, communication and storage, better scalability and better adaptation to access control requirement of payment wireless sensor network.
Related Articles | Metrics