Chinese Journal of Network and Information Security ›› 2017, Vol. 3 ›› Issue (6): 8-20.doi: 10.11959/j.issn.2096-109x.2017.00130

• Papers • Previous Articles     Next Articles

Trajectories anonymous algorithm for association attack

Lei ZHANG1,2,Chun-guang MA1,Song-tao YANG1,2,Zeng-peng LI1   

  1. 1 College of Computer Science and Technology,Harbin Engineering University,Harbin 150001,China
    2 College of Information and Electronic Technology,Jiamusi University,Jiamusi 154007,China
  • Revised:2017-03-01 Online:2017-06-01 Published:2017-06-21
  • Supported by:
    The National Natural Science Foundation of China(61472097);Specialized Research Fund for the Doctoral Program of Higher Education(20132304110017);The Natural Science Foundation of Heilongjiang Province(F2015022)

Abstract:

During the location based service of continuous query,the trajectories which were produced by different movement types may reveal the privacy of user’s location.To solve this problem,a mechanism was proposed to put forward the real-time similar trajectories.With this mechanism,the subsequent position was calculated and which the dummy one was generated to establish an anonymous group,the demands of real-time trajectory anonymity were met,compensating the shortage of real-time trajectories of anonymity in other similar kinds of algorithm.Under this mechanism,a method for calculating subsequent anonymous position was proposed,which used the user's movement patterns,such as mobile direction,speed.The dummy trajectories were made very similar with the trajectory produced by the continuous query user.At the same time,the position of reachable difference in real areas was put forward,and on the basis of position reachable,this mechanism also filtrates out the unreachable candidate locations which had been calculated in the phase of dummy position generates,then decrease the probability of adversary identifies the real trajectory from the location of unreachable.Experimental results show that this method is effective for protecting the location privacy of continuous query user,and provides a good working efficiency.

Key words: privacy protection, continuous query, trajectory anonymous, similar trajectories

CLC Number: 

No Suggested Reading articles found!