通信学报 ›› 2015, Vol. 36 ›› Issue (3): 1-11.doi: 10.11959/j.issn.1000-436x.2015053

• 学术论文 •    下一篇

基于图划分的个性化轨迹隐私保护方法

杨静,张冰(),张健沛,谢静   

  1. 哈尔滨工程大学 计算机科学与技术学院,黑龙江 哈尔滨 150001
  • 出版日期:2015-03-25 发布日期:2017-06-21
  • 基金资助:
    国家自然科学基金资助项目;国家自然科学基金资助项目;国家自然科学基金资助项目;高等学校博士学科点专项科研基金资助项目;高等学校博士学科点专项科研基金资助项目;哈尔滨市科技创新人才研究专项基金资助项目

Personalized trajectory privacy preserving method based on graph partition

Jing YANG,Bing ZHANG(),Jian-pei ZHANG,Jing XIE   

  1. College of Computer Science and Technology, Harbin Engineering University, Harbin 150001, China
  • Online:2015-03-25 Published:2017-06-21
  • Supported by:
    The National Natural Science Foundation of China;The National Natural Science Foundation of China;The National Natural Science Foundation of China;The National Research Foundation for the Doctoral Program of Higher Education of China;The National Research Foundation for the Doctoral Program of Higher Education of China;The Harbin Outstanding Academic Leader Foundation of Heilongjiang Province of China

摘要:

针对用户对轨迹匿名数据的个性化需求,提出一种基于轨迹间夹角和位置重合的(s,λ)-覆盖个性化轨迹间关联构建方法,并根据轨迹间距离和方向度量轨迹间边权,以构造规模可变的个性化轨迹图模型。同时,将轨迹k-匿名集的构建转化为轨迹图划分问题,提出了一种基于贪心策略寻找近似最优的k条轨迹构建轨迹k-匿名集的方法。通过对比实验,在合成轨迹数据集上验证了所提算法的有效性和合理性。

关键词: 隐私安全, 个性化, 图划分, (s,λ)-覆盖, 轨迹间夹角

Abstract:

A (s,λ)-overlap was proposed which based on the angle and location between two trajectories to construct the relationship between them, and also measure the weight between two trajectories by trajectory angle and distance, to-gether to construct the personal trajectory graph model. Then a greedy partition method to was proposed construct trajec-tory k-anonymization sets by finding the approximate optimal k trajectories. Experiment results on synthetic dataset show the effectiveness and reasonableness of proposed method.

Key words: privacy security, personalized; graph partition, (s,λ)-overlap, trajectory angel

No Suggested Reading articles found!