Journal on Communications ›› 2021, Vol. 42 ›› Issue (9): 54-64.doi: 10.11959/j.issn.1000-436x.2021168
• Papers • Previous Articles Next Articles
Si CHEN1,2, Anmin FU1,3, Mang SU1, Huaijiang SUN1
Revised:
2021-03-21
Online:
2021-09-25
Published:
2021-09-01
Supported by:
CLC Number:
Si CHEN, Anmin FU, Mang SU, Huaijiang SUN. Trajectory privacy protection scheme based on differential privacy[J]. Journal on Communications, 2021, 42(9): 54-64.
[1] | 李家印, 郭文忠, 李小燕 ,等. 基于智能交通的隐私保护道路状态实时监测方案[J]. 通信学报, 2020,41(7): 73-83. |
LI J Y , GUO W Z , LI X Y ,et al. Privacy-preserving real-time road conditions monitoring scheme based on intelligent traffic[J]. Journal on Communications, 2020,41(7): 73-83. | |
[2] | 陈思, 付安民, 柯海峰 ,等. MCDP:基于神经网络的多集群分布式差分隐私数据发布方法[J]. 电子学报, 2020,48(12): 2297-2303. |
CHEN S , FU A M , KE H F ,et al. MCDP:multi-cluster differential privacy data publishing method based on neural network[J]. Acta Electronica Sinica, 2020,48(12): 2297-2303. | |
[3] | ZHOU C Y , FU A M , YU S ,et al. Privacy-preserving federated learning in fog computing[J]. IEEE Internet of Things Journal, 2020,7(11): 10782-10793. |
[4] | 叶阿勇, 孟玲玉, 赵子文 ,等. 基于预测和滑动窗口的轨迹差分隐私保护机制[J]. 通信学报, 2020,41(4): 123-133. |
YE A Y , MENG L Y , ZHAO Z W ,et al. Trajectory differential privacy protection mechanism based on prediction and sliding window[J]. Journal on Communications, 2020,41(4): 123-133. | |
[5] | CHEN S , FU A M , SHEN J ,et al. RNN-DP:a new differential privacy scheme base on recurrent neural network for dynamic trajectory privacy protection[J]. Journal of Network and Computer Applications, 2020,168: 102736. |
[6] | WU S , WANG X L , WANG S ,et al. K-anonymity for crowdsourcing database[J]. IEEE Transactions on Knowledge and Data Engineering, 2014,26(9): 2207-2221. |
[7] | HE X F , JIN R C , DAI H Y . Leveraging spatial diversity for privacy-aware location-based services in mobile networks[J]. IEEE Transactions on Information Forensics and Security, 2018,13(6): 1524-1534. |
[8] | 王洁, 王春茹, 马建峰 ,等. 基于位置语义和查询概率的假位置选择算法[J]. 通信学报, 2020,41(3): 53-61. |
WANG J , WANG C R , MA J F ,et al. Dummy location selection algorithm based on location semantics and query probability[J]. Journal on Communications, 2020,41(3): 53-61. | |
[9] | DWORK C , LEI J . Differential privacy and robust statistics[C]// Proceedings of the 41st Annual ACM Symposium on Theory of Computing. New York:ACM Press, 2009: 371-380. |
[10] | DWORK C , MCSHERRY F , NISSIM K ,et al. Calibrating noise to sensitivity in private data analysis[C]// Conference on Theory of Cryptography. Berlin:Springer, 2006: 265-284. |
[11] | KE H F , FU A M , YU S ,et al. AQ-DP:a new differential privacy scheme based on quasi-identifier classifying in big data[C]// 2018 IEEE Global Communications Conference. Piscataway:IEEE Press, 2018: 1-6. |
[12] | WANG Y , YANG L , CHEN X Y ,et al. Enhancing social network privacy with accumulated non-zero prior knowledge[J]. Information Sciences, 2018,445/446: 6-21. |
[13] | 丁红发, 彭长根, 田有亮 ,等. 基于演化博弈的隐私风险自适应访问控制模型[J]. 通信学报, 2019,40(12): 9-20. |
DING H F , PENG C G , TIAN Y L ,et al. Privacy risk adaptive access control model via evolutionary game[J]. Journal on Communications, 2019,40(12): 9-20. | |
[14] | CHEN R , FUNG B C M , DESAI B C . Differentially private trajectory data publication[J]. arXiv Preprint,arXiv:1112.2020, 2011. |
[15] | HE X , CORMODE G , MACHANAVAJJHALA A ,et al. DPT:differentially private trajectory synthesis using hierarchical reference systems[C]// Proceedings of the VLDB Endowment. New York:ACM Press, 2015: 1154-1165. |
[16] | CAO Y , YOSHIKAWA M . Differentially private real-time data release over infinite trajectory streams[C]// 2015 16th IEEE International Conference on Mobile Data Management. Piscataway:IEEE Press, 2015: 68-73. |
[17] | GURSOY M E , LIU L , TRUEX S ,et al. Utility-aware synthesis of differentially private and attack-resilient location traces[C]// Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. New York:ACM Press, 2018: 196-211. |
[18] | DRAKONAKIS K , ILIA P , IOANNIDIS S ,et al. Please forget where I was last summer:the privacy risks of public location (meta)data[C]// Proceedings 2019 Network and Distributed System Security Symposium. VA:Internet Society, 2019: 1-17. |
[19] | YANG M M , ZHU T Q , LIANG K T ,et al. A blockchain-based location privacy-preserving crowdsensing system[J]. Future Generation Computer Systems, 2019,94: 408-418. |
[20] | HUA J Y , GAO Y , ZHONG S . Differentially private publication of general time-serial trajectory data[C]// 2015 IEEE Conference on Computer Communications. Piscataway:IEEE Press, 2015: 549-557. |
[21] | LI M , ZHU L H , ZHANG Z J ,et al. Achieving differential privacy of trajectory data publishing in participatory sensing[J]. Information Sciences, 2017,400/401: 1-13. |
[22] | SHAN H M , ZHANG J P , KRUGER U . Learning linear representation of space partitioning trees based on unsupervised kernel dimension reduction[J]. IEEE Transactions on Cybernetics, 2016,46(12): 3427-3438. |
[23] | YUAN J , ZHENG Y , XIE X ,et al. Driving with knowledge from the physical world[C]// Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. New York:ACM Press, 2011: 316-324. |
[24] | YUAN J , ZHENG Y , ZHANG C Y ,et al. T-drive:driving directions based on taxi trajectories[C]// Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems. New York:ACM Press, 2010: 99-108. |
[25] | 彭长根, 丁红发, 朱义杰 ,等. 隐私保护的信息熵模型及其度量方法[J]. 软件学报, 2016,27(8): 1891-1903. |
PENG C G , DING H F , ZHU Y J ,et al. Information entropy models and privacy metrics methods for privacy protection[J]. Journal of Software, 2016,27(8): 1891-1903. |
[1] | Tao FENG, Liqiu CHEN, Junli FANG, Jianming SHI. Blockchain data sharing scheme based on localized difference privacy and attribute-based searchable encryption [J]. Journal on Communications, 2023, 44(5): 224-233. |
[2] | Shengxing YU, Zekai CHEN, Zhong CHEN, Ximeng LIU. DAGUARD: distributed backdoor attack defense scheme under federated learning [J]. Journal on Communications, 2023, 44(5): 110-122. |
[3] | Shufen ZHANG, Yanling DONG, Jingcheng XU, Haoshi WANG. AdaBoost algorithm based on target perturbation [J]. Journal on Communications, 2023, 44(2): 198-209. |
[4] | Lingtao TANG, Di WANG, Shengyun LIU. Data augmentation scheme for federated learning with non-IID data [J]. Journal on Communications, 2023, 44(1): 164-176. |
[5] | Chengsheng YUAN, Qiang GUO, Zhangjie FU. Copyright protection algorithm based on differential privacy deep fake fingerprint detection model [J]. Journal on Communications, 2022, 43(9): 181-193. |
[6] | Hanyi WANG, Xiaoguang LI, Wenqing BI, Yahong CHEN, Fenghua LI, Ben NIU. Multi-level local differential privacy algorithm recommendation framework [J]. Journal on Communications, 2022, 43(8): 52-64. |
[7] | Yong ZHANG, Dandan LI, Lu HAN, Xiaohong HUANG. Privacy-protected crowd-sensed data trading algorithm [J]. Journal on Communications, 2022, 43(5): 1-13. |
[8] | Haiyan KANG, Yuanrui JI. Research on federated learning approach based on local differential privacy [J]. Journal on Communications, 2022, 43(10): 94-105. |
[9] | Yan YAN, Yiming CONG, Mahmood Adnan, Quanzheng SHENG. Statistics release and privacy protection method of location big data based on deep learning [J]. Journal on Communications, 2022, 43(1): 203-216. |
[10] | Hongtao LI, Xiaoyu REN, Jie WANG, Jianfeng MA. Continuous location privacy protection mechanism based on differential privacy [J]. Journal on Communications, 2021, 42(8): 164-175. |
[11] | Jianping CAI, Ximeng LIU, Jinbo XIONG, Zuobin YING, Yingjie WU. Approximation method of multiple consistency constraint under differential privacy [J]. Journal on Communications, 2021, 42(6): 107-117. |
[12] | Suxia ZHU, Shulun LIU, Guanglu SUN. Shape similarity differential privacy trajectory protection mechanism based on relative entropy and K-means [J]. Journal on Communications, 2021, 42(2): 113-123. |
[13] | Yang LIU, Jun LI, Wenyun CHEN, Mugen PENG. Research on endogenous security data sharing mechanism of F-RAN for 6G [J]. Journal on Communications, 2021, 42(1): 67-78. |
[14] | Ayong YE,Lingyu MENG,Ziwen ZHAO,Yiqing DIAO,Jiaomei ZHANG. Trajectory differential privacy protection mechanism based on prediction and sliding window [J]. Journal on Communications, 2020, 41(4): 123-133. |
[15] | ZHOU Yihui,LU Laifeng,WU Zhenqiang. Study on utility optimization for randomized response mechanism [J]. Journal on Communications, 2019, 40(6): 74-81. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|