A Privacy-Preserving Trajectory Publication Method Based on Secure Start-Points and End-Points
By judging whether the start-point and end-point of a trajectory conform to the user’s behavioral habits, an attacker who possesses background knowledge can breach the anonymous trajectory. Traditional trajectory privacy preservation schemes often generate an anonymous set of trajectories without co...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi Limited
2020-01-01
|
Series: | Mobile Information Systems |
Online Access: | http://dx.doi.org/10.1155/2020/3429256 |
id |
doaj-0cdcb77058ca4384b4d722ea01e5b913 |
---|---|
record_format |
Article |
spelling |
doaj-0cdcb77058ca4384b4d722ea01e5b9132021-07-02T11:52:43ZengHindawi LimitedMobile Information Systems1574-017X1875-905X2020-01-01202010.1155/2020/34292563429256A Privacy-Preserving Trajectory Publication Method Based on Secure Start-Points and End-PointsYannian Zhao0Yonglong Luo1Qingying Yu2Zhaoyan Hu3School of Computer and Information, Anhui Normal University, Wuhu, Anhui, ChinaSchool of Computer and Information, Anhui Normal University, Wuhu, Anhui, ChinaSchool of Computer and Information, Anhui Normal University, Wuhu, Anhui, ChinaSchool of Computer and Information, Anhui Normal University, Wuhu, Anhui, ChinaBy judging whether the start-point and end-point of a trajectory conform to the user’s behavioral habits, an attacker who possesses background knowledge can breach the anonymous trajectory. Traditional trajectory privacy preservation schemes often generate an anonymous set of trajectories without considering the security of the trajectory start- and end-points. To address this problem, this paper proposes a privacy-preserving trajectory publication method based on generating secure start- and end-points. First, a candidate set containing a secure start-point and end-point is generated according to the user’s habits. Second, k−1 anonymous trajectories are generated bidirectionally according to that secure candidate set. Finally, accessibility corrections are made for each anonymous trajectory. This method integrates features such as local geographic reachability and trajectory similarity when generating an anonymized set of trajectories. This provides users with privacy preservation at the k-anonymity level, without relying on the trusted third parties and with low algorithm complexity. Compared with existing methods such as trajectory rotation and unidirectional generation, theoretical analysis and experimental results on the datasets of real trajectories show that the anonymous trajectories generated by the proposed method can ensure the security of trajectory privacy while maintaining a higher trajectory similarity.http://dx.doi.org/10.1155/2020/3429256 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Yannian Zhao Yonglong Luo Qingying Yu Zhaoyan Hu |
spellingShingle |
Yannian Zhao Yonglong Luo Qingying Yu Zhaoyan Hu A Privacy-Preserving Trajectory Publication Method Based on Secure Start-Points and End-Points Mobile Information Systems |
author_facet |
Yannian Zhao Yonglong Luo Qingying Yu Zhaoyan Hu |
author_sort |
Yannian Zhao |
title |
A Privacy-Preserving Trajectory Publication Method Based on Secure Start-Points and End-Points |
title_short |
A Privacy-Preserving Trajectory Publication Method Based on Secure Start-Points and End-Points |
title_full |
A Privacy-Preserving Trajectory Publication Method Based on Secure Start-Points and End-Points |
title_fullStr |
A Privacy-Preserving Trajectory Publication Method Based on Secure Start-Points and End-Points |
title_full_unstemmed |
A Privacy-Preserving Trajectory Publication Method Based on Secure Start-Points and End-Points |
title_sort |
privacy-preserving trajectory publication method based on secure start-points and end-points |
publisher |
Hindawi Limited |
series |
Mobile Information Systems |
issn |
1574-017X 1875-905X |
publishDate |
2020-01-01 |
description |
By judging whether the start-point and end-point of a trajectory conform to the user’s behavioral habits, an attacker who possesses background knowledge can breach the anonymous trajectory. Traditional trajectory privacy preservation schemes often generate an anonymous set of trajectories without considering the security of the trajectory start- and end-points. To address this problem, this paper proposes a privacy-preserving trajectory publication method based on generating secure start- and end-points. First, a candidate set containing a secure start-point and end-point is generated according to the user’s habits. Second, k−1 anonymous trajectories are generated bidirectionally according to that secure candidate set. Finally, accessibility corrections are made for each anonymous trajectory. This method integrates features such as local geographic reachability and trajectory similarity when generating an anonymized set of trajectories. This provides users with privacy preservation at the k-anonymity level, without relying on the trusted third parties and with low algorithm complexity. Compared with existing methods such as trajectory rotation and unidirectional generation, theoretical analysis and experimental results on the datasets of real trajectories show that the anonymous trajectories generated by the proposed method can ensure the security of trajectory privacy while maintaining a higher trajectory similarity. |
url |
http://dx.doi.org/10.1155/2020/3429256 |
work_keys_str_mv |
AT yannianzhao aprivacypreservingtrajectorypublicationmethodbasedonsecurestartpointsandendpoints AT yonglongluo aprivacypreservingtrajectorypublicationmethodbasedonsecurestartpointsandendpoints AT qingyingyu aprivacypreservingtrajectorypublicationmethodbasedonsecurestartpointsandendpoints AT zhaoyanhu aprivacypreservingtrajectorypublicationmethodbasedonsecurestartpointsandendpoints AT yannianzhao privacypreservingtrajectorypublicationmethodbasedonsecurestartpointsandendpoints AT yonglongluo privacypreservingtrajectorypublicationmethodbasedonsecurestartpointsandendpoints AT qingyingyu privacypreservingtrajectorypublicationmethodbasedonsecurestartpointsandendpoints AT zhaoyanhu privacypreservingtrajectorypublicationmethodbasedonsecurestartpointsandendpoints |
_version_ |
1721330611709280256 |