首页> 外文会议>2015 IEEE 16th International Conference on Mobile Data Management >SST: Privacy Preserving for Semantic Trajectories
【24h】

SST: Privacy Preserving for Semantic Trajectories

机译:SST:语义轨迹的隐私保护

获取原文
获取原文并翻译 | 示例

摘要

To preserve privacy in trajectory data, most existing approaches adapt cloaking techniques to protect individual location points or clustering and perturbation techniques to protect entire trajectories. To confirm to the k-anonymity model, they first group locations/trajectories and then modify location points to ensure a cluster of k location points/trajectories are close to each other. However, when k is large or the time span of trajectories is long, the cluster based k-anonymity approaches will suffer from great distortion and lead to misleading analysis results. Observing that it is unnecessary to brutally provide the same level of privacy protection to all locations, we analyze the visiting status of a semantic place at which a point is situated as well as the distribution of neighboring semantic places and infer four privacy risk levels gbased on the risk of privacy breach. Then, we propose the Semantic Space Translation (SST) algorithm that adapts different strategies accordingly to modify locations so that it can strike a good balance between privacy preserving and data utility. To verify the performance of our approach, we conduct several experiments and the experimental results show that our idea is feasible and the SST is effective.
机译:为了保护轨迹数据的私密性,大多数现有方法都采用了隐身技术来保护单个位置点,或者采用聚类和微扰技术来保护整个轨迹。为了确认k-匿名模型,他们首先将位置/轨迹分组,然后修改位置点以确保k个位置点/轨迹的群集彼此接近。然而,当k大或轨迹的时间跨度较长时,基于聚类的k匿名方法将遭受很大的失真,并导致误导分析结果。观察到没有必要向所有位置残酷地提供相同级别的隐私保护,我们分析了一个点所在的语义位置的访问状态以及相邻语义位置的分布,并根据g推断了四个隐私风险级别侵犯隐私的风险。然后,我们提出了语义空间转换(SST)算法,该算法相应地采用了不同的策略来修改位置,从而可以在隐私保护和数据实用性之间取得良好的平衡。为了验证该方法的性能,我们进行了几次实验,实验结果表明我们的想法是可行的,SST是有效的。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号