Differential privacy trajectory data protection method based on clustering

A technology of trajectory data and differential privacy, which is applied in the intersection of engineering applications and information science, can solve the problems of poor data availability, less research, and immaturity, and achieve good clustering performance, size reduction, and enhanced protection.

Pending Publication Date: 2020-01-24
NANJING UNIV OF AERONAUTICS & ASTRONAUTICS
View PDF3 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, the research on combining differential privacy based on clustering is not mature enough, and there are few studies
For existing differential privacy clustering analysis methods, the availability of

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Differential privacy trajectory data protection method based on clustering
  • Differential privacy trajectory data protection method based on clustering
  • Differential privacy trajectory data protection method based on clustering

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] Below in conjunction with accompanying drawing, the present invention will be further described.

[0023] The invention proposes a clustering-based differential privacy trajectory data protection method. This method applies differential privacy technology to trajectory clustering, and resists attacks by adding Laplacian noise to trajectory positions, cluster centers and position counts in each cluster. Since it is impossible to determine whether there is a correlation between different dimensions of trajectory data, we express the final noise result through the linear combination of the results of adding noise in each dimension and the result of adding noise in two-dimensional space, and limit the size of the noise. At the same time, considering that the trajectory may contain other information that may lead to the leakage of user privacy, in order to protect the privacy of user trajectory, this paper also adds noise to these data. The specific implementation steps are...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a differential privacy trajectory data protection method based on clustering. The method comprises: adding Laplace noise to count trajectory positions in a class cluster to resist continuous query attacks; secondly, adding radius-limited Laplace noise to the trajectory position data in the class cluster, so that the clustering effect is prevented from being affected by excessive noise; obtaining a noise clustering center of the class cluster according to the noise position data and the noise position count; and finally, defending a non-track position sensitive information attack in the class cluster by utilizing a differential privacy technology. The method has the advantages that the differential privacy technology is applied to trajectory clustering analysis. Forthe position data in each class cluster, Laplace noise is added to the clustering center, and it is avoided that an attacker inquires the specific position data of the user through the adjacent clustering areas. The size of the noise added to the track position is limited, so that the data availability is improved. Laplace noise is added to other information data possibly causing privacy disclosure, and corresponding reasoning association attacks are resisted.

Description

technical field [0001] The invention relates to a clustering-based differential privacy trajectory data protection method, which aims at the privacy leakage problem of trajectory data in cluster analysis, and belongs to the cross field of engineering application and information science. Background technique [0002] With the popularity of location-aware devices, people enjoy convenient location services, and at the same time, more and more trajectory location data are collected by mobile object databases every day without the user's knowledge. Due to the increasingly powerful database system and the continuous reduction of data storage costs, the collection of personal data is not only the work of government departments and statistical departments, such as the financial sector, Internet companies, medical institutions, etc. all hold a large amount of personal data. With the rapid development of big data technology, data mining has made great progress in some researches and a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62G06K9/62
CPCG06F21/6245G06F21/6227G06F2221/2111G06F18/2321
Inventor 皮德常赵晓东袁水莲
Owner NANJING UNIV OF AERONAUTICS & ASTRONAUTICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products