东南大学学报(自然科学版)
東南大學學報(自然科學版)
동남대학학보(자연과학판)
JOURNAL OF SOUTHEAST UNIVERSITY
2014年
1期
51-57
,共7页
轨迹数据发布%隐私保护%数据扰动
軌跡數據髮佈%隱私保護%數據擾動
궤적수거발포%은사보호%수거우동
trajectory publication%privacy preservation%data perturbation
针对轨迹数据发布中的隐私保护和数据可用性问题,结合统计学的概念,提出一种基于扰动的轨迹数据隐藏发布方法。首先定义一种隐私泄露检测机制,当该检测机制发现攻击者依赖所掌握部分轨迹能以较大概率推测出某隐私节点时,基于统计方法,寻找出现频率最低的同类隐私节点,若存在且用其替换有隐私泄露风险的隐私节点后不会出现新的隐私泄露,则执行替换操作;否则在拥有该隐私节点的所有轨迹中,选择最佳的那条轨迹,将该隐私节点移除。这样,就能降低隐私节点的隐私泄露概率,保证发布后的轨迹数据满足用户的隐私需求。理论分析和实验结果表明,所提出的方法能有效避免基于部分轨迹推测剩余隐私节点的攻击,有效保持原有轨迹数据中不同种类节点间连接关系的可用性。
針對軌跡數據髮佈中的隱私保護和數據可用性問題,結閤統計學的概唸,提齣一種基于擾動的軌跡數據隱藏髮佈方法。首先定義一種隱私洩露檢測機製,噹該檢測機製髮現攻擊者依賴所掌握部分軌跡能以較大概率推測齣某隱私節點時,基于統計方法,尋找齣現頻率最低的同類隱私節點,若存在且用其替換有隱私洩露風險的隱私節點後不會齣現新的隱私洩露,則執行替換操作;否則在擁有該隱私節點的所有軌跡中,選擇最佳的那條軌跡,將該隱私節點移除。這樣,就能降低隱私節點的隱私洩露概率,保證髮佈後的軌跡數據滿足用戶的隱私需求。理論分析和實驗結果錶明,所提齣的方法能有效避免基于部分軌跡推測剩餘隱私節點的攻擊,有效保持原有軌跡數據中不同種類節點間連接關繫的可用性。
침대궤적수거발포중적은사보호화수거가용성문제,결합통계학적개념,제출일충기우우동적궤적수거은장발포방법。수선정의일충은사설로검측궤제,당해검측궤제발현공격자의뢰소장악부분궤적능이교대개솔추측출모은사절점시,기우통계방법,심조출현빈솔최저적동류은사절점,약존재차용기체환유은사설로풍험적은사절점후불회출현신적은사설로,칙집행체환조작;부칙재옹유해은사절점적소유궤적중,선택최가적나조궤적,장해은사절점이제。저양,취능강저은사절점적은사설로개솔,보증발포후적궤적수거만족용호적은사수구。이론분석화실험결과표명,소제출적방법능유효피면기우부분궤적추측잉여은사절점적공격,유효보지원유궤적수거중불동충류절점간련접관계적가용성。
Considering the problems of privacy preserving and data utility in trajectory publication,a perturbation-based privacy preserving trajectory publishing method is proposed from the view of sta-tistics.First,a mechanism of privacy leak detection is devised to identify whether an attacker can use partial trajectories as quasi-identifier to infer the rest privacy-aware trajectory nodes with high probability.When it detects privacy leak,a statistic-based approach is used to find homogeneous pri-vacy-aware nodes of the lowest occurrence frequency,and replace private leak nodes with them,on condition that there is no new privacy disclosure after replacement.Otherwise,the method suppres-ses the private leak node of appropriate trajectory.In this way,the breach probability could be de-creased effectively,and it can be assured that the published trajectory datasets meet the users'privacy demands.Theoretical analysis and experimental results testify that the proposed method can prevent the attack of inferring sensitive locations by partial trajectory,meanwhile keep the utility of linkage relation among different kinds of nodes in the original trajectory datasets well.