Journal on Communications ›› 2021, Vol. 42 ›› Issue (9): 54-64.doi: 10.11959/j.issn.1000-436x.2021168

• Papers • Previous Articles     Next Articles

Trajectory privacy protection scheme based on differential privacy

Si CHEN1,2, Anmin FU1,3, Mang SU1, Huaijiang SUN1   

  1. 1 School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing 210094, China
    2 Logistics Service Center, Nanjing University of Science and Technology, Nanjing 210094, China
    3 Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China
  • Revised:2021-03-21 Online:2021-09-25 Published:2021-09-01
  • Supported by:
    The National Natural Science Foundation of China(62072239);Open Foundation of the State Key Laboratory of Information Security of China(2021-MS-07);The Fundamental Research Funds for the Central Universities(30920021129);Special Project of “Higher Education Informatization Research” of China Higher Education Association(2020XXHD06)

Abstract:

To solve the problem that the current sampling mechanism and data obfuscation method may raise insufficient data availability and privacy protection, a trajectory privacy protection scheme based on differential privacy was proposed.A new efficient sampling model based on time generalization and spatial segmentation was presented, and a k-means clustering algorithm was designed to process sampling data.By employing the differential privacy mechanism, the trajectory data was disturbed to solve the user privacy leaking problem caused by the attacker with powerful background knowledge.Simultaneously, to respond to the error boundary of the query range of pandemic, an effective prediction mechanism was designed to ensure the availability of released public track data.Simulation results demonstrate that compared with the existing trajectory differential privacy protection methods, the proposed scheme has obvious advantages in terms of processing efficiency, privacy protection intensity, and data availability.

Key words: differential privacy, trajectory privacy, data sampling, exponential mechanism, data publishing

CLC Number: 

No Suggested Reading articles found!