Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A privacy protection method for user demand trajectory

A privacy protection and user demand technology, applied in the field of privacy protection, can solve the problem that attackers cannot distinguish target users and infer user location, life impact, demand privacy leakage, etc., to protect query content trajectory privacy, service quality assurance, protection The effect of requiring privacy

Active Publication Date: 2021-08-17
HARBIN INST OF TECH SHENZHEN GRADUATE SCHOOL
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In 2003, Gruteser et al. first applied the K-anonymity method to protect the real location of users. In a certain time and space, each user needs to be indistinguishable from other K-1 users, so the attacker cannot distinguish the target user and infer the user's location
[0003] However, there is currently no special demand trajectory privacy method to protect people's demand trajectory privacy issues, which makes people's demand privacy seriously leaked and has a serious impact on people's lives

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A privacy protection method for user demand trajectory
  • A privacy protection method for user demand trajectory
  • A privacy protection method for user demand trajectory

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The present invention will be further described below in conjunction with the description of the drawings and specific embodiments.

[0037] Such as figure 1 As shown, a user demand trajectory privacy protection method specifically includes the following content:

[0038] Suppose the user has M demands: S={s 1 ,s 2 ,...,s M}, the user's demand at time T={1,2,...} is represented as a discrete-time trajectory. An event is denoted as demand S at time t. The user's mobility is probabilistic. In the model of the present invention, the modeled user's mobility is a first-order Markov chain (or other mobility models).

[0039] The protection mechanism is the same as the single requirement protection mechanism, which is still replacement. The replacement set O is consistent with the user's real demand set S. The target event is S tar , for example, the user wants to protect the demand at time t-1 and t, that is, S tar =(s t-1 ,s t ). o pre Represents a subset of th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a privacy protection method for user demand track, assuming that the user has M demands: S={s 1 ,s 2 ,...,s M}, the user’s demand is represented as a discrete-time trajectory at time T={1,2,...}; event <s,t>Denoted as the demand S at time t; the replacement set O is consistent with the user’s real demand set S; the target event is S tar ;O pre Represents the subset of replacement things of the query thing before the current demand query; O cur A replacement transaction that represents the user's desired transaction at the current time, known to both the attacker and the user. The beneficial effects of the present invention are: it can effectively protect the user's query content track privacy in social networks, and add Laplace noise (differential privacy) to the confidence between required things, so that the user's track privacy is further protected ; By using the privacy protection method of the game, not only the user's demand privacy is protected, but the user's service quality can also be well guaranteed.

Description

technical field [0001] The invention relates to a privacy protection method, in particular to a user demand track privacy protection method. Background technique [0002] At present, the existing technologies basically protect the privacy of the user's location trajectory. There are three broad categories of location privacy protection technologies, K-anonymous generalization technology, noise technology and dynamic pseudonym method. In 2003, Gruteser et al. first applied the K-anonymity method to protect the real location of users. In a certain time and space, each user needs to be indistinguishable from other K-1 users, so the attacker cannot distinguish the target user and infer the user's location. Later, some researchers applied K-anonymity generalization to protect trajectory privacy. In 2009, Ghintta et al. proposed to construct an anonymous area based on the user's moving speed, but this method is vulnerable to attacks and cannot guarantee the user's location privacy...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62
CPCG06F21/6245G06F21/6281
Inventor 曹斌闫春柳吕劭鹏徐烨张钦宇
Owner HARBIN INST OF TECH SHENZHEN GRADUATE SCHOOL
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products