A Privacy-Preserving Trajectory Publication Method Based on Secure Start-Points and End-Points

By judging whether the start-point and end-point of a trajectory conform to the user’s behavioral habits, an attacker who possesses background knowledge can breach the anonymous trajectory. Traditional trajectory privacy preservation schemes often generate an anonymous set of trajectories without co...

Full description

Bibliographic Details
Main Authors: Yannian Zhao, Yonglong Luo, Qingying Yu, Zhaoyan Hu
Format: Article
Language:English
Published: Hindawi Limited 2020-01-01
Series:Mobile Information Systems
Online Access:http://dx.doi.org/10.1155/2020/3429256
id doaj-0cdcb77058ca4384b4d722ea01e5b913
record_format Article
spelling doaj-0cdcb77058ca4384b4d722ea01e5b9132021-07-02T11:52:43ZengHindawi LimitedMobile Information Systems1574-017X1875-905X2020-01-01202010.1155/2020/34292563429256A Privacy-Preserving Trajectory Publication Method Based on Secure Start-Points and End-PointsYannian Zhao0Yonglong Luo1Qingying Yu2Zhaoyan Hu3School of Computer and Information, Anhui Normal University, Wuhu, Anhui, ChinaSchool of Computer and Information, Anhui Normal University, Wuhu, Anhui, ChinaSchool of Computer and Information, Anhui Normal University, Wuhu, Anhui, ChinaSchool of Computer and Information, Anhui Normal University, Wuhu, Anhui, ChinaBy judging whether the start-point and end-point of a trajectory conform to the user’s behavioral habits, an attacker who possesses background knowledge can breach the anonymous trajectory. Traditional trajectory privacy preservation schemes often generate an anonymous set of trajectories without considering the security of the trajectory start- and end-points. To address this problem, this paper proposes a privacy-preserving trajectory publication method based on generating secure start- and end-points. First, a candidate set containing a secure start-point and end-point is generated according to the user’s habits. Second, k−1 anonymous trajectories are generated bidirectionally according to that secure candidate set. Finally, accessibility corrections are made for each anonymous trajectory. This method integrates features such as local geographic reachability and trajectory similarity when generating an anonymized set of trajectories. This provides users with privacy preservation at the k-anonymity level, without relying on the trusted third parties and with low algorithm complexity. Compared with existing methods such as trajectory rotation and unidirectional generation, theoretical analysis and experimental results on the datasets of real trajectories show that the anonymous trajectories generated by the proposed method can ensure the security of trajectory privacy while maintaining a higher trajectory similarity.http://dx.doi.org/10.1155/2020/3429256
collection DOAJ
language English
format Article
sources DOAJ
author Yannian Zhao
Yonglong Luo
Qingying Yu
Zhaoyan Hu
spellingShingle Yannian Zhao
Yonglong Luo
Qingying Yu
Zhaoyan Hu
A Privacy-Preserving Trajectory Publication Method Based on Secure Start-Points and End-Points
Mobile Information Systems
author_facet Yannian Zhao
Yonglong Luo
Qingying Yu
Zhaoyan Hu
author_sort Yannian Zhao
title A Privacy-Preserving Trajectory Publication Method Based on Secure Start-Points and End-Points
title_short A Privacy-Preserving Trajectory Publication Method Based on Secure Start-Points and End-Points
title_full A Privacy-Preserving Trajectory Publication Method Based on Secure Start-Points and End-Points
title_fullStr A Privacy-Preserving Trajectory Publication Method Based on Secure Start-Points and End-Points
title_full_unstemmed A Privacy-Preserving Trajectory Publication Method Based on Secure Start-Points and End-Points
title_sort privacy-preserving trajectory publication method based on secure start-points and end-points
publisher Hindawi Limited
series Mobile Information Systems
issn 1574-017X
1875-905X
publishDate 2020-01-01
description By judging whether the start-point and end-point of a trajectory conform to the user’s behavioral habits, an attacker who possesses background knowledge can breach the anonymous trajectory. Traditional trajectory privacy preservation schemes often generate an anonymous set of trajectories without considering the security of the trajectory start- and end-points. To address this problem, this paper proposes a privacy-preserving trajectory publication method based on generating secure start- and end-points. First, a candidate set containing a secure start-point and end-point is generated according to the user’s habits. Second, k−1 anonymous trajectories are generated bidirectionally according to that secure candidate set. Finally, accessibility corrections are made for each anonymous trajectory. This method integrates features such as local geographic reachability and trajectory similarity when generating an anonymized set of trajectories. This provides users with privacy preservation at the k-anonymity level, without relying on the trusted third parties and with low algorithm complexity. Compared with existing methods such as trajectory rotation and unidirectional generation, theoretical analysis and experimental results on the datasets of real trajectories show that the anonymous trajectories generated by the proposed method can ensure the security of trajectory privacy while maintaining a higher trajectory similarity.
url http://dx.doi.org/10.1155/2020/3429256
work_keys_str_mv AT yannianzhao aprivacypreservingtrajectorypublicationmethodbasedonsecurestartpointsandendpoints
AT yonglongluo aprivacypreservingtrajectorypublicationmethodbasedonsecurestartpointsandendpoints
AT qingyingyu aprivacypreservingtrajectorypublicationmethodbasedonsecurestartpointsandendpoints
AT zhaoyanhu aprivacypreservingtrajectorypublicationmethodbasedonsecurestartpointsandendpoints
AT yannianzhao privacypreservingtrajectorypublicationmethodbasedonsecurestartpointsandendpoints
AT yonglongluo privacypreservingtrajectorypublicationmethodbasedonsecurestartpointsandendpoints
AT qingyingyu privacypreservingtrajectorypublicationmethodbasedonsecurestartpointsandendpoints
AT zhaoyanhu privacypreservingtrajectorypublicationmethodbasedonsecurestartpointsandendpoints
_version_ 1721330611709280256