Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Time sequence position publishing method and system

A time series and location point technology, applied in the time series location release method and system field, can solve problems such as difficulty in resisting attacker's background knowledge attack, inflexibility, generalization failure, etc., achieve flexible privacy policy selection, avoid privacy leakage, and improve security sexual effect

Active Publication Date: 2021-05-28
BEIJING INFORMATION SCI & TECH UNIV
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The generalization and suppression technology represented by the K-anonymity scheme is difficult to resist the background knowledge attack of the attacker. For example, the attacker can infer the anonymized position based on the historical information, making the generalization invalid
In addition, the K-anonymity scheme is not flexible enough for specific LBS services (location-based information services, Location Based Services), and users cannot adjust the specific degree of privacy protection according to their needs.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Time sequence position publishing method and system
  • Time sequence position publishing method and system
  • Time sequence position publishing method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0038] Such as figure 1 As shown, this embodiment provides a time series location release method, including:

[0039] Step S1: Determine the LBS service location domain, and divide the LBS service location domain into grids, each grid includes a location point, and obtain the location point in the grid coordinate system;

[0040]Before grid division, it is necessary to express the LBS service location domain with two-dimensional latitude and longitude coordinates, and then divide the LBS service location domain into grids based on the two-dimensional latitude and longitude coordinates. Each grid size can be 50 The standard of *50m is divided, and the LBS service location domain is divided into multiple small grids, and the number of grids (location points obtained by division) is recorded as n. Here, the location domain is divided into multiple location points, and these location points are the location points that the user moves within the range of the location domain. midd...

Embodiment 2

[0087] Such as Figure 5 As shown, this embodiment provides a time series location release system, including:

[0088] The location domain grid division module T1 is used to determine the LBS service location domain, each grid includes a location point, divides the LBS service location domain into a plurality of location points, and obtains the location points under the grid coordinate system;

[0089] An initial undirected graph construction module T2, configured to construct an initial undirected graph according to all position points in the grid coordinate system;

[0090] The probabilistic state transition matrix acquisition module T3 is used to obtain the probabilistic state transition matrix of the hidden Markov model according to the user's historical location data;

[0091] The disturbance location acquisition and release module T4 is used to disturb the real location of the user according to the probability state transition matrix and the initial undirected graph com...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a differential privacy time sequence position publishing method and system based on a personalized privacy policy, and the method comprises the steps: determining an LBS service position domain, carrying out the grid division, dividing the LBS service position domain into a plurality of position points, and obtaining the position points under a grid coordinate system, wherein each grid comprises a position point; constructing an initial undirected graph according to all position points under the grid coordinate system; obtaining a probability state transition matrix of the hidden Markov model according to the historical position data of the user; and disturbing the real position of the user based on the probability state transition matrix and the initial undirected graph in combination with a Laplacian mechanism, and obtaining and publishing a disturbed position. The user is allowed to customize the connection relation between the nodes in the undirected graph in a personalized manner, so that the user can adjust the privacy protection degree according to the privacy requirement of the user. Meanwhile, Laplace noise is introduced, and the time sequence position is published by using the hidden Markov model, so that the security of user position publishing is improved, and the privacy leakage of the real position of a user is avoided.

Description

technical field [0001] The present invention relates to the technical field of time-series position release, in particular to a time-series position release method and system. Background technique [0002] When the attacker has a large amount of background knowledge, the K-anonymous location privacy scheme is usually used to anonymize the user's location. The K-anonymous location privacy scheme samples the trajectory Ti at any time, so that at the sampling time, there are at least k- One trajectory can achieve the effect of privacy protection in the same area as Ti generalization at the corresponding position. The generalization and suppression technology represented by the K-anonymity scheme is difficult to resist the attacker's background knowledge attack. For example, the attacker can infer the anonymized position based on historical information, making the generalization invalid. In addition, the K-anonymity scheme is not flexible enough for specific LBS services (locat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/02
CPCH04W12/02
Inventor 康海燕冀源蕊
Owner BEIJING INFORMATION SCI & TECH UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products