通信学报 ›› 2016, Vol. 37 ›› Issue (12): 156-164.doi: 10.11959/j.issn.1000-436x.2016281

• 学术通信 • 上一篇    下一篇

轨迹发布中基于时空关联性的假轨迹隐私保护方案

雷凯跃,李兴华(),刘海,裴卓雄,马建峰,李晖   

  1. 西安电子科技大学网络与信息安全学院,陕西 西安 710071
  • 出版日期:2016-12-25 发布日期:2017-05-15
  • 基金资助:
    国家自然科学基金资助项目;国家自然科学基金资助项目;国家自然科学基金资助项目;国家自然科学基金资助项目

Dummy trajectory privacy protection scheme for trajectory publishing based on the spatiotemporal correlation

Kai-yue LEI,Xing-hua LI(),Hai LIU,Zhuo-xiong PEI,Jian-feng MA,Hui LI   

  1. School of Cyber Engineering, Xidian University, Xi'an 710071, China
  • Online:2016-12-25 Published:2017-05-15
  • Supported by:
    The National Natural Science Foundation of China;The National Natural Science Foundation of China;The National Natural Science Foundation of China;The National Natural Science Foundation of China

摘要:

从轨迹的整体方向、轨迹中相邻位置的时间可达及移动距离对单条轨迹中相邻位置间的时空关联性和轨迹间的相似性进行分析,提出了一种基于时空关联性的假轨迹隐私保护方案。安全性分析表明所提方案能有效混淆假轨迹与真实轨迹,避免攻击者识别出假轨迹。大量实验表明,所提方案在仅需较少计算时间的同时,能确保生成的假轨迹与真实轨迹具有相似性,从而有效保护轨迹发布中用户的轨迹隐私。

关键词: 轨迹发布, 隐私保护, 假轨迹, 时空关联性, 轨迹泄露

Abstract:

The spatiotemporal correlation was analyzed between neighboring locations and the trajectories similarity from the movement direction, the reachable time between neighboring locations and the movement distance, and a dummy trajectory privacy protection scheme based on the spatiotemporal correlation was proposed. Security analysis shows that the presented scheme successfully confuses the user's real trajectory with dummy trajectories, thereby pro-tecting the user's trajectory privacy. Furthermore, extensive experiments indicate that the presented scheme not only has the limited computation cost, but also ensures that the generated dummy trajectories are similar to the user's real trajectory.

Key words: trajectory publishing, privacy protection, dummy trajectory, spatiotemporal correlation, trajectory leakage

No Suggested Reading articles found!