Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Trajectory privacy protection method in road network environment

A privacy protection and trajectory technology, applied in digital data protection, instruments, electronic digital data processing, etc., can solve the problems of inability to divide, not achieve trajectory privacy protection, and tantamount to location privacy protection, and achieve high anonymity. The effect of high success rate and data availability

Inactive Publication Date: 2017-05-10
HEBEI UNIVERSITY OF ECONOMICS AND BUSINESS
View PDF4 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The key problem of the sharding method is: how to determine the length of the trajectory segment - if the trajectory segment is too short, it is tantamount to position privacy protection and cannot achieve the effect of trajectory privacy protection; if the trajectory segment is too long, it will not achieve the effect of division
[0015] Most of the above studies are aimed at trajectory privacy protection technology in free space, but in road network space, trajectory data is limited by the road network model, and the previous privacy protection algorithms are no longer applicable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trajectory privacy protection method in road network environment
  • Trajectory privacy protection method in road network environment
  • Trajectory privacy protection method in road network environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The technical solutions in the embodiments of the present invention are clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only part of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0041] In the following description, a lot of specific details are set forth in order to fully understand the present invention, but the present invention can also be implemented in other ways different from those described here, and those skilled in the art can do it without departing from the meaning of the present invention. By analogy, the present invention is therefore not limited to the specific examples disclosed below.

[0042] The invention di...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a trajectory privacy protection method in a road network environment, and relates to the technical field of trajectory privacy protection methods. The method includes the following steps of trajectory data preprocessing, wherein original trajectory data is divided into equivalence class trajectories with the same trajectory cross-domain time quantum; trajectory graph construction, wherein the equivalence class trajectories are constructed into a trajectory graph according to the s-space overlapping concept; trajectory graph division, wherein the trajectory graph is divided into multiple subgraphs with the greedy algorithm, each subgraph contains at least k trajectory graph vertexes, and thus a trajectory k-anonymity set is just formed. According to the method, the trajectory data is simulated into an undirected graph, trajectory k-anonymity is achieved through k-node division of the graph, and the anonymity success rate is high; besides, the availability of data obtained after privacy protection is high.

Description

technical field [0001] The invention relates to the technical field of track privacy protection methods, in particular to a track privacy protection method in a road network environment. Background technique [0002] With the rapid development of mobile positioning technology, a large number of devices with mobile positioning functions have appeared, and a large amount of location data has also been generated. The location data is sorted by sampling time to form trajectory data. Analysis and mining of trajectory data can support a variety of mobile-related applications. However, trajectory data contains rich spatiotemporal information, and the analysis and mining of trajectory data may lead to the leakage of personal private information contained in trajectory data. [0003] With the increasing demand for trajectory data applications in all walks of life, trajectory privacy protection technology has become one of the research hotspots at home and abroad. Researchers have s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62G06K9/62
CPCG06F21/6254G06F18/23213
Inventor 霍峥
Owner HEBEI UNIVERSITY OF ECONOMICS AND BUSINESS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products