Trajectories anonymous algorithm for association attack
During the location based service of continuous query,the trajectories which were produced by different movement types may reveal the privacy of user’s location.To solve this problem,a mechanism was proposed to put forward the real-time similar trajectories.With this mechanism,the subsequent positio...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2017-06-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2017.00130 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841530236750004224 |
---|---|
author | Lei ZHANG Chun-guang MA Song-tao YANG Zeng-peng LI |
author_facet | Lei ZHANG Chun-guang MA Song-tao YANG Zeng-peng LI |
author_sort | Lei ZHANG |
collection | DOAJ |
description | During the location based service of continuous query,the trajectories which were produced by different movement types may reveal the privacy of user’s location.To solve this problem,a mechanism was proposed to put forward the real-time similar trajectories.With this mechanism,the subsequent position was calculated and which the dummy one was generated to establish an anonymous group,the demands of real-time trajectory anonymity were met,compensating the shortage of real-time trajectories of anonymity in other similar kinds of algorithm.Under this mechanism,a method for calculating subsequent anonymous position was proposed,which used the user's movement patterns,such as mobile direction,speed.The dummy trajectories were made very similar with the trajectory produced by the continuous query user.At the same time,the position of reachable difference in real areas was put forward,and on the basis of position reachable,this mechanism also filtrates out the unreachable candidate locations which had been calculated in the phase of dummy position generates,then decrease the probability of adversary identifies the real trajectory from the location of unreachable.Experimental results show that this method is effective for protecting the location privacy of continuous query user,and provides a good working efficiency. |
format | Article |
id | doaj-art-acd5cd35ae7a4d36b31ce634a2776c06 |
institution | Kabale University |
issn | 2096-109X |
language | English |
publishDate | 2017-06-01 |
publisher | POSTS&TELECOM PRESS Co., LTD |
record_format | Article |
series | 网络与信息安全学报 |
spelling | doaj-art-acd5cd35ae7a4d36b31ce634a2776c062025-01-15T03:05:48ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2017-06-01382059550701Trajectories anonymous algorithm for association attackLei ZHANGChun-guang MASong-tao YANGZeng-peng LIDuring the location based service of continuous query,the trajectories which were produced by different movement types may reveal the privacy of user’s location.To solve this problem,a mechanism was proposed to put forward the real-time similar trajectories.With this mechanism,the subsequent position was calculated and which the dummy one was generated to establish an anonymous group,the demands of real-time trajectory anonymity were met,compensating the shortage of real-time trajectories of anonymity in other similar kinds of algorithm.Under this mechanism,a method for calculating subsequent anonymous position was proposed,which used the user's movement patterns,such as mobile direction,speed.The dummy trajectories were made very similar with the trajectory produced by the continuous query user.At the same time,the position of reachable difference in real areas was put forward,and on the basis of position reachable,this mechanism also filtrates out the unreachable candidate locations which had been calculated in the phase of dummy position generates,then decrease the probability of adversary identifies the real trajectory from the location of unreachable.Experimental results show that this method is effective for protecting the location privacy of continuous query user,and provides a good working efficiency.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2017.00130privacy protectioncontinuous querytrajectory anonymoussimilar trajectories |
spellingShingle | Lei ZHANG Chun-guang MA Song-tao YANG Zeng-peng LI Trajectories anonymous algorithm for association attack 网络与信息安全学报 privacy protection continuous query trajectory anonymous similar trajectories |
title | Trajectories anonymous algorithm for association attack |
title_full | Trajectories anonymous algorithm for association attack |
title_fullStr | Trajectories anonymous algorithm for association attack |
title_full_unstemmed | Trajectories anonymous algorithm for association attack |
title_short | Trajectories anonymous algorithm for association attack |
title_sort | trajectories anonymous algorithm for association attack |
topic | privacy protection continuous query trajectory anonymous similar trajectories |
url | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2017.00130 |
work_keys_str_mv | AT leizhang trajectoriesanonymousalgorithmforassociationattack AT chunguangma trajectoriesanonymousalgorithmforassociationattack AT songtaoyang trajectoriesanonymousalgorithmforassociationattack AT zengpengli trajectoriesanonymousalgorithmforassociationattack |