首页> 外文会议>International conference on information systems security >Efficient Enforcement of Privacy for Moving Object Trajectories
【24h】

Efficient Enforcement of Privacy for Moving Object Trajectories

机译:有效地保护移动物体轨迹的隐私

获取原文

摘要

Information services based on identity and current location is already very popular among Internet and Mobile users, and a recent trend that is gaining acceptance is those based on annotated routes of travel, which we call as trajectories. We are motivated by the need of some users to reveal neither their identity nor location. This is not impossible since exact location can be substituted by an enclosing region, and the identity can be anonymised by relaying all queries through a proxy. However, when users are continuously making queries throughout a session, their queries can contain sufficient correlation which can identify them and/or their queries. Furthermore, a large region will fetch unnecessary search results degrading search quality. This problem of guaranteeing privacy, using smallest possible enclosing regions is NP-hard in general. We propose an efficient greedy algorithm which guarantees a user specified level of location and query privacy, namely k-anonymity and l-diversity, throughout a session and all the while trying to not significantly compromise service quality. Our algorithm, running on the proxy, makes use of trajectories to find similar users whose trajectories are also close by (using appropriate notions of similarity and closeness) for privacy enforcement. We give an indexing structure for efficiently storing and retrieving past trajectories, and present extensive experimental results comparing our approach with other similar approaches.
机译:基于身份和当前位置的信息服务已经在Internet和移动用户中非常流行,最近一种流行的趋势是基于带注释的旅行路线的路线,我们称之为轨迹。某些用户需要不透露其身份或位置,因此我们受到了激励。这不是不可能的,因为确切的位置可以由一个封闭的区域代替,并且可以通过通过代理中继所有查询来匿名化身份。但是,当用户在整个会话中不断进行查询时,他们的查询可以包含足够的关联性,从而可以识别他们和/或他们的查询。此外,较大的区域将获取不必要的搜索结果,从而降低搜索质量。使用最小可能的封闭区域来保证隐私的问题通常是NP难题。我们提出了一种有效的贪心算法,该算法可确保在整个会话期间用户指定级别的位置和查询隐私,即k-匿名性和l-多样性,同时始终尝试不显着损害服务质量。我们的算法在代理上运行,利用轨迹来查找相似的用户,这些用户的轨迹也接近(通过使用适当的相似性和接近性概念)以执行隐私保护。我们提供了一种索引结构,可以有效地存储和检索过去的轨迹,并提供了广泛的实验结果,将我们的方法与其他类似方法进行了比较。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号