计算机工程 ›› 2018, Vol. 44 ›› Issue (8): 142-150.doi: 10.19678/j.issn.1000-3428.0049930

• 安全技术 • 上一篇    下一篇

基于用户真实轨迹的虚假轨迹生成方法

林邓伟 1,王云峰 2   

  1. 1.焦作大学 信息工程学院,河南 焦作 454000; 2.北京邮电大学 网络空间安全学院,北京 100876
  • 收稿日期:2018-01-02 出版日期:2018-08-15 发布日期:2018-08-15
  • 作者简介:林邓伟(1972—),男,副教授、硕士,主研方向为网络安全、虚拟现实;王云峰,博士研究生。
  • 基金项目:

    教育部博士点基金(20124116120004)。

False Trajectory Generating Method Based on User’s True Trajectory

LIN Dengwei 1,WANG Yunfeng 2   

  1. 1.College of Information Engineering,Jiaozuo University,Jiaozuo,Henan 454000,China; 2.College of Cyber Space Security,Beijing University of Posts and Telecommunications,Beijing 100876,China
  • Received:2018-01-02 Online:2018-08-15 Published:2018-08-15

摘要:

现有的轨迹隐私保护方法在对用户进行K-匿名保护时,较难防御拥有背景信息的攻击。为此,提出一种利用用户的真实轨迹构建虚假轨迹的方法。采用真实轨迹构建(K-1)条虚假轨迹实现K匿名,解决敌对者通过随机性识别出虚假轨迹的问题,将敌对者的背景信息融入用户运 动轨迹的马尔科夫模型,防止敌对者通过背景信息识别出虚假轨迹。实验结果表明,与轨迹替换、轨迹旋转、随机行走等方法相比,该方法具有更高的虚假轨迹生成效率和较好的轨迹隐私保护效果。

关键词: 轨迹隐私保护, 虚假轨迹, 真实轨迹, 背景信息, K-匿名

Abstract:

Existing methods for trajectory privacy-preserve can’t protect K-anonymous protection from attacks with background knowledge.To this end,a method generating dummy trajectories with user’s true trajectories is proposed.By generating (K-1) dummy trajectories to achieve K-anonymous with true trajectories,adversaries can’t identify them through randomness.By modeling the Markov model of user’s trajectories with considering background information,dummy trajectories can’t be broken because of background information compared with methods of trajectory replacement,trajectory rotation and random walk,the experimental results show its efficiency of dummy trajectories generation and effectiveness of privacy-preserving.

Key words: trajectory privacy-protection, false trajectory, true trajectory, background information, K-anonymous

中图分类号: