作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程

• 安全技术 • 上一篇    下一篇

实现轨迹km-匿名的最小变形度算法

郭会,韩建民,鲁剑锋,彭浩,郑路倩   

  1. (浙江师范大学数理与信息工程学院,浙江 金华 321004)
  • 收稿日期:2014-10-13 出版日期:2015-11-15 发布日期:2015-11-13
  • 作者简介:郭会(1990-),女,硕士研究生,主研方向:信息安全,隐私保护;韩建民,教授、博士;鲁剑锋、彭浩,副教授、博士;郑路倩,硕士研究生。
  • 基金资助:

    国家自然科学基金资助项目(61170108,61402418);教育部人文社科研究基金资助项目(12YJCZH142);浙江省自然科学基金资助项目(LQ13F020007);上海市信息安全综合管理技术研究重点实验室开放基金资助项目(AGK2013003)。

Minimum Distortion Degree Algorithm of Trajectory km-anonymity Implementation

GUO Hui,HAN Jianmin,LU Jianfeng,PENG Hao,ZHENG Luqian   

  1. (College of Mathematics Physics and Information Engineering,Zhejiang Normal University,Jinhua 321004,China)
  • Received:2014-10-13 Online:2015-11-15 Published:2015-11-13

摘要:

km-匿名可以抵制长度为m的背景知识攻击,然而现有的匿名化算法在泛化处理时,优先选择支持度最小的位置点进行处理,未考虑泛化造成的变形度。随着m值的增大,轨迹变形度会变大。针对该问题,提出2种匿名化算法:最小变形度贪心算法和基于先验原则的最小变形度贪心算法,2种算法优先选择变形度最小的位置点进行泛化,使得泛化所造成的变形度更小,并给出匿名轨迹可用性度量方法,对数据可用性和算法效率进行分析。实验结果表明,与现有的匿名化算法相比,2种算法均可生成可用性更高的匿名轨迹。

关键词: 隐私保护, km-匿名, 轨迹, 背景知识攻击, 点泛化变形度

Abstract:

km-anonymity can resist background knowledge attacks of m-length subjectory.However,the existing anonymized algorithms select the minimum support point,not the minimum distortion point to generalize.Therefore,with increasing of m,the distortion of the trajectory tends to be larger.To address the problem,this paper proposes two kinds of anonymized algorithms:one is the minimum distortion greedy anonymized algorithm,the other is the minimum distortion greedy anonymized algorithm with apriori principles.These two algorithms both take consideration of the effect of the generalizing distortion,and choose the minimum distortion point to generalize,which can cause less distortion.It also proposes a method to measure the anonymous trajectory utility.It analyses the data availability and algorithm efficiency.Experimental results show that the proposed algorithms can generate anonymous trajectory with higher trajectory utility than existing anonymized algorithms.

Key words: privacy preservation, km-anonymity, trajectory, background knowledge attack, point generalized distortion degree

中图分类号: