Generalization-based location privacy protection method

A privacy protection and generalization technology, applied in the field of location privacy protection based on generalization, can solve problems such as user privacy leakage, achieve the effect of protecting privacy security, ensuring quality, and balancing contradictions

Active Publication Date: 2018-06-01
HOHAI UNIV
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Service providers need to analyze and mine the collected historical data to obtai

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Generalization-based location privacy protection method
  • Generalization-based location privacy protection method
  • Generalization-based location privacy protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The present invention will be further described below in conjunction with the accompanying drawings. The following examples are only used to illustrate the technical solution of the present invention more clearly, but not to limit the protection scope of the present invention.

[0038] Such as figure 2 As shown, the location privacy protection method based on generalization of the present invention includes the following steps:

[0039] 1) Trajectory dataset preprocessing:

[0040] The coordinate set formed by the user location data collected by the location service provider in chronological order is called a trajectory, which can be expressed as: tr p ={p 1 ,p 2 ,...p n}, where each node contains a set of time and coordinate information, namely p i =(t i ,x i ,y i ), the subscript n represents the number of nodes.

[0041] Collect the respective trajectories generated by different users within the sampling time of the location server to form the original tra...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a generalization-based location privacy protection method, and the method comprises the steps: carrying out the normalization of the start and end time of track data, and carrying out the equivalence partitioning based on the above; searching the inclusion relation of equivalence classes, and carrying out the grouping according to an order; and constructing a k-anonymity set in each group according to a time interval. According to the invention, an effective anonymous grouping mode is designed, and the method balances the conflict between the privacy protection and dataavailability while improving the anonymity success rate, and guarantees the quality of a mining-type location service.

Description

technical field [0001] The invention relates to a location privacy protection method based on generalization, and belongs to the technical field of location privacy protection. Background technique [0002] With the rapid development of wireless technology and the popularization of terminal devices such as smart phones, the application of location-based service (LBS) is becoming more and more extensive. Service providers need to analyze and mine the collected historical data to obtain the user's interest characteristics. In the process, user privacy may be leaked. Terrovitis M et al. proposed a privacy protection algorithm based on sensitive data suppression, which not only considered the possible background knowledge of the attacker, but also analyzed the impact of time factors on privacy protection, which improved and reduced data loss while protecting user privacy. . Chen et al. used a local sensitive data suppression strategy to protect the privacy information in user ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W4/02H04W12/02
CPCH04W4/023H04W12/02
Inventor 吕鑫施海涛曾涛马佳仕
Owner HOHAI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products