A trajectory sensitive data protection method supporting personalized privacy

A sensitive data and trajectory technology, applied in digital data protection, electrical digital data processing, instruments, etc., can solve problems such as sensitive location leakage

Active Publication Date: 2019-01-08
NORTHEASTERN UNIV
View PDF2 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Aiming at the problems existing in the prior art, the present invention provides a track-sensitive data protection method that supports personalized privacy, considers different privacy requirements of different users, and solves the leakage of sensitive positions in user tracks during data publishing. Visit probability, number of user visits and average stay time of users in different time periods, consider the spatial d

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A trajectory sensitive data protection method supporting personalized privacy
  • A trajectory sensitive data protection method supporting personalized privacy
  • A trajectory sensitive data protection method supporting personalized privacy

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] In order to make the purpose, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. The specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0044] A trajectory-sensitive data protection method that supports personalized privacy, the process is as follows figure 1 As shown, the specific method is as follows:

[0045] Step 1: Extract the sensitive location list SP set by the user to be protected in the original data set D list .

[0046] In this example, 182 volunteers collected by GeoLife of Microsoft Asia Research Institute from April 2007 to August 2012 have a total of 17,621 trajectories, and the total length of trajectories is 1,292,951 kilometers. The trajectories in the original data set are screened, and only BJ is selected. Trajectory data with...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a trajectory sensitive data protection method supporting personalized privacy, which relates to the technical field of data analysis and processing. The method comprises the following steps of: extracting a sensitive position list SList which is set by a user in an original data set D and needs to be protected; using the Google Map API to reverse address parse any sensitiveposition SPb in the user-set sensitive position list SList, and obtaining the sensitive sequence SSb; constructing false trajectory fragments according to the cluster set Clus; replacing a trajectorysegment T in that original data set D with a false trajectory segment T*, and outputting a privacy preserved data set D*. The trajectory sensitive data protection method supporting personalized privacy considers the moving speed of the moving object, the number of sampling points and the similarity of the road sections, the sensitive positions are divided into semantic clusters, and the substitution of the sensitive positions is random. The probability of the attacker to determine the true sensitive positions is much lower, which ensures the security of the sensitive positions.

Description

technical field [0001] The invention relates to the technical field of data analysis and processing, in particular to a track-sensitive data protection method supporting personalized privacy. Background technique [0002] In recent years, with the rapid development of positioning technology, mobile devices with GPS receivers have become more and more popular, and location-based services (LBS) have become more and more widely used, so service providers will obtain a large amount of trajectory data every day . Data mining and analysis of collected trajectory data are widely used in many fields, such as urban planning, business decision-making, travel route recommendation, etc. However, trajectory data contains personal sensitive information. By analyzing the released trajectory data, attackers may cause privacy leaks such as personal hobbies and behavior patterns. At present, for the trajectory privacy protection problem in data release, most of them are based on the traditi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62G06K9/62
CPCG06F21/6245G06F18/23213
Inventor 杨晓春王斌刘旺媛
Owner NORTHEASTERN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products