Unlock instant, AI-driven research and patent intelligence for your innovation.

Publishing track k-anonymity privacy protection method based on similarity

A privacy protection and similarity technology, which is applied in the field of identity privacy protection before the release of trajectory data, can solve problems such as sampling points and road network conflicts, and achieve the effects of excellent robustness, good scalability, and guaranteed authenticity

Active Publication Date: 2021-06-01
JILIN NORMAL UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The method based on area sampling will have conflicts between the generated sampling points and the road network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Publishing track k-anonymity privacy protection method based on similarity
  • Publishing track k-anonymity privacy protection method based on similarity
  • Publishing track k-anonymity privacy protection method based on similarity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The technical solutions of the present invention will be further explained and illustrated in the form of specific examples below.

[0046] A trajectory clustering-reconstruction framework under the trajectory k-anonymous privacy protection method, the steps are as follows:

[0047] Step 1, realizing the synchronization of the trajectory through an interpolation method;

[0048] Step 2, obtain the similarity between trajectories through a trajectory similarity measurement method based on negative distance correlation;

[0049] Step 3, project the trajectory and the similarity between trajectories into the trajectory similarity weighted network, and complete the clustering of similar trajectories through a network node clustering method;

[0050] Step 4, implement trajectory k-anonymity through a shift-based trajectory reconstruction method.

[0051] The steps to realize the synchronization of the trajectory by the interpolation method in step 1 are as follows:

[005...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a similarity-based release trajectory k-anonymity privacy protection method, and belongs to the crossing field of data mining and information security. The contradiction between noise resistance and sensitivity in trajectory similarity measurement is overcome, the effectiveness of trajectory clustering is improved, and the secondary attack problem and the road network conflict problem in trajectory reconstruction are solved. The method comprises the steps: obtaining the similarity between trajectories through a trajectory similarity measurement method based on distance negative correlation, wherein the robustness and sensitivity to noise are improved through the method; projecting the tracks and the similarity of the tracks into a track similarity weighting network, and completing the clustering of similar tracks through a network node clustering method; and finally, through a trajectory reconstruction method based on displacement, realizing the trajectory k-anonymity, thereby improving the availability of publishing the trajectory.

Description

technical field [0001] The invention belongs to the intersecting field of data mining and information security, and in particular relates to a method for protecting identity privacy before release of trajectory data. Background technique [0002] The combination of positioning technology and wireless communication technology has spawned a large number of location-based services. Trusted location service providers can obtain a large amount of user spatiotemporal location data. The knowledge obtained from mining trajectory data can be used in many fields, but such data release may lead to privacy leakage of trajectory subjects. Data owners should process trajectory data before releasing it to third parties for analysis to protect privacy. [0003] For the release of trajectory data, anonymity is the main indicator of the privacy protection of the identity of the trajectory subject. k-anonymity is a major privacy protection strategy, which can be understood as the probabilit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06K9/62
CPCG06F21/6254G06F2221/2111G06F18/22
Inventor 王帅张桂杰王宏仁孙浩赵丹红
Owner JILIN NORMAL UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More