Your browser doesn't support javascript.
loading
Successive Trajectory Privacy Protection with Semantics Prediction Differential Privacy.
Zhang, Jing; Li, Yanzi; Ding, Qian; Lin, Liwei; Ye, Xiucai.
Afiliación
  • Zhang J; School of Computer Science and Mathematics, Fujian University of Technology, Fuzhou 350118, China.
  • Li Y; Fujian Provincial Key Laboratory of Big Data Mining and Applications, Fuzhou 350118, China.
  • Ding Q; School of Computer Science and Mathematics, Fujian University of Technology, Fuzhou 350118, China.
  • Lin L; Fujian Provincial Key Laboratory of Big Data Mining and Applications, Fuzhou 350118, China.
  • Ye X; School of Computer Science and Mathematics, Fujian University of Technology, Fuzhou 350118, China.
Entropy (Basel) ; 24(9)2022 Aug 23.
Article en En | MEDLINE | ID: mdl-36141058
ABSTRACT
The publication of trajectory data provides critical information for various location-based services, and it is critical to publish trajectory data safely while ensuring its availability. Differential privacy is a promising privacy protection technology for publishing trajectory data securely. Most of the existing trajectory privacy protection schemes do not take into account the user's preference for location and the influence of semantic location. Besides, differential privacy for trajectory protection still has the problem of balance between the privacy budget and service quality. In this paper, a semantics- and prediction-based differential privacy protection scheme for trajectory data is proposed. Firstly, trajectory data are transformed into a prefix tree structure to ensure that they satisfy differential privacy. Secondly, considering the influence of semantic location on trajectory, semantic sensitivity combined with location check-in frequency is used to calculate the sensitivity of each position in the trajectory. The privacy level of the position is classified by setting thresholds. Moreover, the corresponding privacy budget is allocated according to the location privacy level. Finally, a Markov chain is used to predict the attack probability of each position in the trajectory. On this basis, the allocation of the privacy budget is further adjusted and its utilization rate is improved. Thus, the problem of the balance between the privacy budget and service quality is solved. Experimental results show that the proposed scheme is able to ensure data availability while protecting data privacy.
Palabras clave

Texto completo: 1 Base de datos: MEDLINE Tipo de estudio: Prognostic_studies / Risk_factors_studies Idioma: En Revista: Entropy (Basel) Año: 2022 Tipo del documento: Article

Texto completo: 1 Base de datos: MEDLINE Tipo de estudio: Prognostic_studies / Risk_factors_studies Idioma: En Revista: Entropy (Basel) Año: 2022 Tipo del documento: Article