期刊文献+

轨迹隐私保护技术研究 被引量:111

A Survey of Trajectory Privacy-Preserving Techniques
在线阅读 下载PDF
导出
摘要 随着移动设备和定位技术的发展,产生了大量的移动对象轨迹数据.轨迹数据含有丰富的时空信息,对其分析和挖掘可以支持多种与移动对象相关的应用.然而,针对轨迹数据的攻击性推理可能导致个人的兴趣爱好、行为模式、社会习惯等隐私信息暴露.另一方面,在基于位置的服务中,由于现有位置隐私保护技术并不能解决轨迹隐私泄露的问题,移动对象的个人隐私很可能通过实时运行轨迹而暴露.针对上述两种场景,轨迹隐私保护的研究提出了明确的要求:在轨迹数据发布中,隐私保护技术既要保护轨迹数据的隐私,又要保证数据有较高的可用性;在基于位置的服务中,隐私保护技术既要保护移动对象的实时轨迹隐私,又要保证用户获得较高的服务质量.该文针对上述两个问题分析了轨迹隐私保护中存在的挑战性问题,针对不同的隐私保护方法分析了现有的研究工作,介绍了当前该领域的研究热点,指明了未来的研究方向. As the high up development of Location-Based Service (LBS) and location-aware devices, the amount of locations and trajectories of moving objects collected by service providers is continuously increasing. The collected trajectories with wealth spatio-temporal information will be published for novel applications. However, directly publishing trajectories may present serious threats to individuals' privacy, since trajectories enable intrusive inferences, which may reveal individual's habits, behavioral patterns, social customs, etc. On the other hand, individuals' real time trajectories may be exposed when they are requiring for location-based services even if their location privacy have been protected. Moreover, specific requirements for trajectory privacy-preserving methods are proposed based on different application scenarios: In trajectory data publishing scenario, privacy-preserving techniques must preserve data utility; in LBS scenario, privacypreserving techniques must guarantee high quality of services that users acquired. All these re quirements make trajectory privacy-preserving more challenging. According to the above problems, the key challenges in trajectory privacy-preserving are analyzed; recent research works on both trajectory data publishing and trajectory privacy in LBS are analyzed in this paper. At last, suggestions for future research works are put forward.
作者 霍峥 孟小峰
出处 《计算机学报》 EI CSCD 北大核心 2011年第10期1820-1830,共11页 Chinese Journal of Computers
基金 国家自然科学基金(60833005 61070055 91024032) 中国人民大学科学研究基金(10XNI018) 核高基重大专项(2010ZX01042-002-003) 高等学校博士学科点专项科研基金(200800020002)资助~~
关键词 数据库应用 隐私保护 轨迹数据 数据发布 基于位置的服务 database applications privacy-preserving trajectory data data publication location based service
  • 相关文献

参考文献34

  • 1Gruteser M, Grunwald D. Anonymous usage of locationbased services through spatial and temporal cloaking//Proceedings of the 1st International Conference on Mobile Sys tems, Applications, and Services (MobiSys 2003). San Fransisco, 2003: 31 -42.
  • 2Mokbel M F, Chow C Y, Aref W G. The newcasper: Query processing for location services withoutcompromising privacy//Proceedings of the 32nd Conference of Very Large Databases (VLDB 2006). Seoul, 2006: 763-774.
  • 3Bamba B, Liu L. Supporting anonymous location queries in mobile environments with privacy grid//Proceeding of the 17th International Conference on World Wide Web (WWW 2008). Beijing, 2008:237-246.
  • 4Pan X, Meng X, Xu J. Distortion-based anonymity for continuous queries in location-based mobile services//Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems (GIS 2009). Washington, 2009:256-265.
  • 5潘晓,肖珍,孟小峰.位置隐私研究综述[J].计算机科学与探索,2007,1(3):268-281. 被引量:65
  • 6Krumm J. A survey of computational location privacy. Personal and Ubiquitous Computing, 2009, 13(6): 391-399.
  • 7Bettini C, Wang S X, Jajodia S. Protecting privacy against location-based personal identification//Proceedings of the 2nd VLDB workshop on Secure Data Management (SDM2005). Trondheim, 2005:185-199.
  • 8Krumm J. Inference attacks on location tracks//Proceedings of the 5th International Conference on Pervasive Computing (PERVASIVE 2007). Toronto, 2007:127-143.
  • 9Luper D, Cameron D, Miller J A, Arabnia H R. Spatial and temporal target association through semantic analysis and GPS data mining//Proceedings of the 2007 International Conference on Information & Knowledge Engineering (IKE 2007). LasVegas, 2007:251-257.
  • 10Xu T, Cai Y. Exploring historical location data for anonymity preservation in location-based services//Proceedings of the 27th Conference on Computer Communications (INFOCOM 2008). Phoenix, 2008:547-555.

二级参考文献10

  • 1Atallah M J,Frikken K B.Privacy-preserving location-dependent query processing[].Proceeding of the IEEE/ACS International Conference on Pervasive Services(ICPS’).2004
  • 2Cheng R,Kalashnikov D V,Prabhakar S.Evaluating probabilistic queries over imprecise data[].Proceeding of ACM International Conference on Management of Data(SIGMOD’).2003
  • 3Machanavajjhala A,Gehrke J,et al.L-diversity:priva-cy beyond k-anonymity[].Proceedings ofnd Interna-tional Conference on Data Engineering(ICDE’).2006
  • 4Mokbel M F.Privacy in location-based services:start-of-the-art and research directions[].Proceeding ofth In-ternational Conference on Mobile Data Management(MDM’).2007
  • 5Man accused of stalking ex-girlfriend with GPS. http://www.foxnews.com/story/0,2933,131487,00.html . 2004
  • 6Authorities:GPS system used to stalk woman. http://www.usatoday.com/tech/news/2002-12-30-gps-stalker_x.htm . 2002
  • 7Sciannamea M.Companies increasingly use GPS-enable cell phones to track employees. http://wifi.weblogsinc.com/2004/09/24/companies-increasingly-use-gps-enabled-cell-phones-to-track/ . 2004
  • 8Gedik B,Liu L.Protecting location privacy with person-alized k-anonymity:architecture and algorithms[].IEEE Transactions on Mobile Computing.
  • 9Hong J I,Landay J A.An architecture for privacy-sen-sitive ubiquitous computing[].Proceedings of the Inter-national Conference on Mobile SystemsApplicationsand Services(MobiSys’).2004
  • 10Bettini C,Wang X S,Jajodia S.Protecting privacy a-gainst location-based personal identification[].Proceeding of the VLDB Workshop on Secure Data Management(SDM’).2005

共引文献64

同被引文献993

引证文献111

二级引证文献1211

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部