Journal on Communications ›› 2021, Vol. 42 ›› Issue (2): 113-123.doi: 10.11959/j.issn.1000-436x.2021008
• Papers • Previous Articles Next Articles
Suxia ZHU, Shulun LIU, Guanglu SUN
Revised:
2020-10-07
Online:
2021-02-25
Published:
2021-02-01
Supported by:
CLC Number:
Suxia ZHU, Shulun LIU, Guanglu SUN. Shape similarity differential privacy trajectory protection mechanism based on relative entropy and K-means[J]. Journal on Communications, 2021, 42(2): 113-123.
[1] | JUNGLAS I A , WATSON R T . Location-based services[J]. IEEE Pervasive Computing, 2017,9(3): 11-12. |
[2] | DEY A , HIGHTOWER J , LARA E D ,et al. Location-based services[J]. IEEE Pervasive Computing, 2009,9(1): 11-12. |
[3] | BERESFORD A R , STAJANO F . Location privacy in pervasive computing[J]. IEEE Pervasive Computing, 2003,2(1): 46-55. |
[4] | ZHAO P , LI J , ZENG F ,et al. ILLIA:enabling k-anonymity-based privacy preserving against location injection attacks in continuous LBS queries[J]. IEEE Internet of Things Journal, 2018,5(2): 1033-1042. |
[5] | ENCK W , GILBERT P , HAN S ,et al. TaintDroid:an information-flow tracking system for realtime privacy monitoring on smartphones[J]. ACM Transactions on Computer Systems (TOCS), 2014,32(2): 1-2. |
[6] | PEREZ S . Recently confirmed Myspace hack could be the largest yet[R]. Tech Crunch,(2016-05-31)[2020-07-07]. |
[7] | LI L , GOODCHILD M F . Is privacy still an issue in the era of big data? Location disclosure in spatial footprints[C]// International Conference on Geoinformatics. Piscataway:IEEE Press, 2013: 1-4. |
[8] | BHASKARA A , DADUSH D , KRISHNASWAMY R ,et al. Unconditional differentially private mechanisms for linear queries[C]// Proceedings of the Forty-Fourth Annual ACM Symposium on Theory of Computing. New York:ACM Press, 2012: 1269-1284. |
[9] | CHATZIKOKOLAKIS K , ANDRéS M E , BORDENABE N E ,et al. Broadening the scope of differential privacy using metrics[C]// International Symposium on Privacy Enhancing Technologies Symposium. Berlin:Springer, 2013: 82-102. |
[10] | 王超, 杨静, 张健沛 . 基于轨迹位置形状相似性的隐私保护算法[J]. 通信学报, 2015,36(2): 1-14. |
WANG C , YANG J , ZHANG J P . Privacy preserving algorithm based on trajectory location and shape similarity[J]. Journal on Communications, 2015,36(2): 1-14. | |
[11] | 霍峥, 孟小峰 . 轨迹隐私保护技术研究[J]. 计算机学报, 2011,34(10): 1820-1830. |
HUO Z , MENG X F . A survey of trajectory privacy preserving techniques[J]. Chinese Journal of Computers, 2011,34(10): 1820-1830. | |
[12] | ZHANG S B , MAO X J , CHOO R K ,et al. A trajectory privacy-preserving scheme based on a dual-k mechanism for continuous location-based services[J]. Information Sciences, 2020,527: 406-419. |
[13] | SHAHAM S , DING M , LIU B ,et al. Privacy preserving location data publishing:a machine learning approach[J]. IEEE Transactions on Knowledge and Data Engineering, 2020,PP(99): 1-14. |
[14] | LAN J , GOU S , GU J ,et al. IoT trajectory data privacy protection based on enhanced mix-zone[C]// 2019 IEEE 3rd Advanced Information Management,Communicates,Electronic and Automation Control Conference. Piscataway:IEEE Press, 2019: 942-946. |
[15] | 赵婧, 张渊, 李兴华 ,等. 基于轨迹频率抑制的轨迹隐私保护方法[J]. 计算机学报, 2014,37(10): 2096-2106. |
ZHAO J , ZHANG Y , LI X H ,et al. A Trajectory privacy protection approach via trajectory frequency suppression[J]. Chinese Journal of Computers, 2014,37(10): 2096-2106. | |
[16] | MANO K , MINAMI K , MARUYAMA H . Privacy-preserving publishing of pseudonym-based trajectory location data set[C]// Eighth International Conference on Availability. Piscataway:IEEE Press, 2013: 615-624. |
[17] | PINGLEY A , ZHANG N , FU X ,et al. Protection of query privacy for continuous location based services[C]// INFOCOM IEEE International Conference on Computer Communications. Piscataway:IEEE Press, 2011: 1710-1718. |
[18] | DWORK C , KENTHAPADI K , MCSHERRY F ,et al. Our data,ourselves:privacy via distributed noise generation[C]// International Conference on Advances in Cryptology-EUROCRYPT. Saarland:DBLP, 2006: 486-503. |
[19] | DWORK C , MCSHERRY F , NISSIM K ,et al. Calibrating noise to sensitivity in private data analysis[C]// Theory of Cryptography Conference. Berlin:Springer, 2006: 265-284. |
[20] | 高志强, 王宇涛 . 差分隐私技术研究进展[J]. 通信学报, 2017,38(Z1): 155-159. |
GAO Z Q , WANG Y T . Survey on differential privacy and its progress[J]. Journal on Communications, 2017,38(Z1): 155-159. | |
[21] | 李效光, 李晖, 李凤华 ,等. 差分隐私综述[J]. 信息安全学报, 2018,39(5): 96-108. |
LI X G , LI H , LI F H ,et al. A survey on differential privacy[J]. Journal of Cyber Security, 2018,39(5): 96-108. | |
[22] | 叶青青, 孟小峰, 朱敏杰 ,等. 本地化差分隐私研究综述[J]. 软件学报, 2018,29(7): 1981-2005. |
YE Q Q , MENG X F , ZHU M J ,et al. Survey on local differential privacy[J]. Journal of Software, 2018,29(7): 1981-2005. | |
[23] | CHEN R , FUNG B , DESAI B C ,et al. Differentially private transit data publication:a case study on the Montreal transportation system[C]// Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. New York:ACM Press, 2012: 213-221. |
[24] | HUA J , GAO Y , ZHONG S . Differentially private publication of general time-serial trajectory data[C]// Computer Communications. Piscataway:IEEE Press, 2015: 549-557. |
[25] | CHEN R , ACS G , CASTELLUCCIA C . Differentially private sequential data publication via variable-length n-grams[C]// Proceedings of the 2012 ACM Conference on Computer and Communications Security. New York:ACM Press, 2012: 638-649. |
[26] | SHAO D , JIANG K , KISTER T ,et al. Publishing trajectory with differential privacy:a posteriori vs.a posteriori sampling mechanisms[C]// International Conference on Database and Expert Systems Applications. Berlin:Springer, 2013: 357-365. |
[27] | JIANG K , SHAO D , STéPHANE B ,et al. Publishing trajectories with differential privacy guarantees[C]// Proceedings of the 25th International Conference on Scientific and Statistical Database Management. New York:ACM Press, 2013: 1-12. |
[28] | HE X , CORMODE G , MACHANAVAJJHALA A ,et al. DPT:differentially private trajectory synthesis using hierarchical reference systems[J]. Proceedings of the VLDB Endowment, 2015,8(11): 1154-1165. |
[29] | CHATZIKOKOLAKIS K , PALAMIDESSI C , STRONATI M . Location privacy via geo-indistinguishability[C]// International Colloquium on Theoretical Aspects of Computing. Berlin:Springer, 2015: 28-38. |
[30] | XIAO Y , LI X . Protecting Locations with differential privacy under temporal correlations[C]// The 22nd ACM SIGSAC Conference. New York:ACM Press, 2015: 1298-1309. |
[31] | BORDENABE N E , CHATZIKOKOLAKIS K , PALAMIDESSI C . Optimal geo-indistinguishable mechanisms for location privacy[C]// Proceedings of the 2014 ACM SIGSAC conference on computer and communications security. New York:ACM Press, 2014: 251-262. |
[32] | 吴云乘, 陈红, 赵素云 ,等. 一种基于时空相关性的差分隐私轨迹保护机制[J]. 计算机学报, 2018,41(2): 309-321. |
WU Y C , CHEN H , ZHAO S Y ,et al. Differentially private trajectory protection based on spatial and temporal correlation[J]. Chinese Journal of Computers, 2018,41(2): 309-321. | |
[33] | HU Z , YANG J . Differential privacy protection method based on published trajectory cross-correlation constraint[J]. PLOS ONE, 2020,15(8): 1-25. |
[34] | ZHOU K , WANG J . Trajectory protection scheme based on fog computing and K-anonymity in IoT[C]// 2019 20th Asia-Pacific Network Operations and Management Symposium (APNOMS). Piscataway IEEE Press, 2019: 1-6. |
[35] | ALT H , GODAU M . Computing the Fréchet distance between two polygonal curves[J]. International Journal of Computational Geometry& Applications, 1995,5(1-2): 75-91. |
[36] | TUNHAO Y W P , . Protecting moving trajectories with dummies[C]// 2007 International Conference on Mobile Data Management. Piscataway:IEEE Press, 2007: 278-282. |
[1] | Tao FENG, Liqiu CHEN, Junli FANG, Jianming SHI. Blockchain data sharing scheme based on localized difference privacy and attribute-based searchable encryption [J]. Journal on Communications, 2023, 44(5): 224-233. |
[2] | Shengxing YU, Zekai CHEN, Zhong CHEN, Ximeng LIU. DAGUARD: distributed backdoor attack defense scheme under federated learning [J]. Journal on Communications, 2023, 44(5): 110-122. |
[3] | Shufen ZHANG, Yanling DONG, Jingcheng XU, Haoshi WANG. AdaBoost algorithm based on target perturbation [J]. Journal on Communications, 2023, 44(2): 198-209. |
[4] | Lingtao TANG, Di WANG, Shengyun LIU. Data augmentation scheme for federated learning with non-IID data [J]. Journal on Communications, 2023, 44(1): 164-176. |
[5] | Chengsheng YUAN, Qiang GUO, Zhangjie FU. Copyright protection algorithm based on differential privacy deep fake fingerprint detection model [J]. Journal on Communications, 2022, 43(9): 181-193. |
[6] | Hanyi WANG, Xiaoguang LI, Wenqing BI, Yahong CHEN, Fenghua LI, Ben NIU. Multi-level local differential privacy algorithm recommendation framework [J]. Journal on Communications, 2022, 43(8): 52-64. |
[7] | Yong ZHANG, Dandan LI, Lu HAN, Xiaohong HUANG. Privacy-protected crowd-sensed data trading algorithm [J]. Journal on Communications, 2022, 43(5): 1-13. |
[8] | Haiyan KANG, Yuanrui JI. Research on federated learning approach based on local differential privacy [J]. Journal on Communications, 2022, 43(10): 94-105. |
[9] | Huiqin WANG, Wenbin HOU, Qingbin PENG, Minghua CAO, Rui HUANG, Ling LIU. Step-by-step classification detection algorithm of SPPM based on K-means clustering [J]. Journal on Communications, 2022, 43(1): 161-171. |
[10] | Yan YAN, Yiming CONG, Mahmood Adnan, Quanzheng SHENG. Statistics release and privacy protection method of location big data based on deep learning [J]. Journal on Communications, 2022, 43(1): 203-216. |
[11] | Si CHEN, Anmin FU, Mang SU, Huaijiang SUN. Trajectory privacy protection scheme based on differential privacy [J]. Journal on Communications, 2021, 42(9): 54-64. |
[12] | Hongtao LI, Xiaoyu REN, Jie WANG, Jianfeng MA. Continuous location privacy protection mechanism based on differential privacy [J]. Journal on Communications, 2021, 42(8): 164-175. |
[13] | Jianping CAI, Ximeng LIU, Jinbo XIONG, Zuobin YING, Yingjie WU. Approximation method of multiple consistency constraint under differential privacy [J]. Journal on Communications, 2021, 42(6): 107-117. |
[14] | Yang LIU, Jun LI, Wenyun CHEN, Mugen PENG. Research on endogenous security data sharing mechanism of F-RAN for 6G [J]. Journal on Communications, 2021, 42(1): 67-78. |
[15] | Feiyue QIU,Bowen CHEN,Tieming CHEN,Guodao ZHANG. Sparsity induced convex nonnegative matrix factorization algorithm with manifold regularization [J]. Journal on Communications, 2020, 41(5): 84-95. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|