Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

K-anonymity privacy protection method for track data in uncertain environment

A trajectory data and privacy protection technology, which is applied in digital data protection, electronic digital data processing, instruments, etc., can solve the problems that affect the effectiveness of privacy protection, data deviation, actual effect and efficiency are difficult to meet the requirements, and achieve effective trajectory anonymity Effects of privacy protection and semantic enhancement

Inactive Publication Date: 2017-09-08
CHINA MARITIME POLICE ACADEMY
View PDF0 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] However, in the actual anonymity process, the above methods do not take into account that when the data is updated by the mobile object database server, due to the time delay or the limitation of technical conditions, there is a certain deviation in the collected data, which affects the effectiveness of privacy protection.
In addition, the uncertainty of information leads to the instability of the dominance relationship of the trajectory anonymous generalization area, and the success of the k-anonymity method largely depends on the density of the road network
To sum up, in the face of actual application scenarios, existing methods are difficult to meet the requirements of uncertain environments in terms of actual effect and efficiency.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • K-anonymity privacy protection method for track data in uncertain environment
  • K-anonymity privacy protection method for track data in uncertain environment
  • K-anonymity privacy protection method for track data in uncertain environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] In order to understand the technical scheme of the present invention more intuitively and completely, the non-limiting feature descriptions are as follows in conjunction with the accompanying drawings of the present invention:

[0044] Such as figure 1 As shown, a trajectory data k-anonymous privacy protection method in an uncertain environment, including the following steps:

[0045] A: Trajectory data collection, the object of data collection is a large amount of mobile trajectory data generated by mobile police equipment, including location data, attribute data, time data and spatial relationship data stored in the spatial database, and the original trajectory in the data space database Decompose data into meaningful sequences and parse data in multivariate formats collected over different time periods;

[0046] B: Trajectory data preprocessing, dynamic data flow analysis is performed on the multi-format trajectory data obtained in different time periods, forming tr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a k-anonymity privacy protection method for track data in an uncertain environment. The privacy protection method comprises the following steps: dividing a space into same table cells by virtue of a quadtree, representing concepts, attributes, examples and mutual relations of track data through a body formalization description language based on a field background, reasoning and calculating track data of current attack query by virtue of a Jena inference engine and rules, digging tacit knowledge, and constructing a semanteme-space mixed index model in the uncertain environment; and finding out a track with relatively high similarity with the current attack query through a continuous nearest-neighbor query method by combining track behavior characteristics with a space index model so as to acquire an anonymous data set, and generating an optimal track utilization chain by virtue of a heuristic method, so as to obtain an optimal k-anonymity protection route. By virtue of the privacy protection method, the most possible attacking route adopted by an attacker can be found out, a bug with the greatest threat can be located, and therefore, and the effective track anonymity privacy protection can be implemented.

Description

technical field [0001] The invention relates to the field of research and application of mobile object data mining, in particular to an anonymous privacy protection method for track data in an uncertain environment. Background technique [0002] With the development of mobile police terminal equipment and positioning technology, a large amount of mobile trajectory data has been generated. These data are used in law enforcement, intelligence reconnaissance, information management, emergency rescue, command and dispatch and other fields, forming a mobile complex with graph structure. The internet. Mobile police data is sensitive data, and its transmission and internal sharing within the system require necessary data security and privacy protection mechanisms to avoid unauthorized access and use, thereby ensuring data security and legality. However, these terminal devices have to access the public security internal network through an open wireless public network and the inform...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62
CPCG06F21/6227G06F21/6254
Inventor 朱麟
Owner CHINA MARITIME POLICE ACADEMY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products