Interchange-Based Privacy Protection for Publishing Trajectories
Information extracted from trajectory data is very useful in many practical application scenarios. Before trajectories for data mining are published, they need to be processed to protect the privacy of the trajectories' bodies. In this paper, a method for such privacy protection is proposed. Ou...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2019-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8845638/ |
id |
doaj-6beaab25420f4993b0ed32a3f71acd6d |
---|---|
record_format |
Article |
spelling |
doaj-6beaab25420f4993b0ed32a3f71acd6d2021-03-29T23:10:26ZengIEEEIEEE Access2169-35362019-01-01713829913831410.1109/ACCESS.2019.29427208845638Interchange-Based Privacy Protection for Publishing TrajectoriesShuai Wang0https://orcid.org/0000-0003-4046-6123Chunyi Chen1https://orcid.org/0000-0003-2228-3083Guijie Zhang2https://orcid.org/0000-0003-2056-5810Yu Xin3https://orcid.org/0000-0001-5307-2882School of Computer Science and Technology, Changchun University of Science and Technology, Changchun, ChinaSchool of Computer Science and Technology, Changchun University of Science and Technology, Changchun, ChinaTeacher Training Center of Colleges and Universities of Jilin Province, Jilin Normal University, Siping, ChinaCollege of Computer Science and Technology, Ningbo University, Ningbo, ChinaInformation extracted from trajectory data is very useful in many practical application scenarios. Before trajectories for data mining are published, they need to be processed to protect the privacy of the trajectories' bodies. In this paper, a method for such privacy protection is proposed. Our method guarantees that the generated trajectory points satisfy the k-anonymity by interchanging the positions of the trajectory points on the k-core subnet of the relation network. The method treats the trajectory points as the privacy protection object. It overcomes the curse of dimensionality resulting from the K-anonymity of trajectories, and reduces the distortion of the generated trajectories significantly. Moreover, our proposed strategy can preserve the original positions of the trajectory points. Experiments on both real-life and synthetic data sets are carried out with different methods for comparison. The results show that our method has greater efficiency and lower distortion of the processed trajectories.https://ieeexplore.ieee.org/document/8845638/Privacy protectionpublishing trajectories<italic xmlns:ali="http://www.niso.org/schemas/ali/1.0/" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">K</italic>-anonymity<italic xmlns:ali="http://www.niso.org/schemas/ali/1.0/" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">K</italic>-core subnetinterchange |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Shuai Wang Chunyi Chen Guijie Zhang Yu Xin |
spellingShingle |
Shuai Wang Chunyi Chen Guijie Zhang Yu Xin Interchange-Based Privacy Protection for Publishing Trajectories IEEE Access Privacy protection publishing trajectories <italic xmlns:ali="http://www.niso.org/schemas/ali/1.0/" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">K</italic>-anonymity <italic xmlns:ali="http://www.niso.org/schemas/ali/1.0/" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">K</italic>-core subnet interchange |
author_facet |
Shuai Wang Chunyi Chen Guijie Zhang Yu Xin |
author_sort |
Shuai Wang |
title |
Interchange-Based Privacy Protection for Publishing Trajectories |
title_short |
Interchange-Based Privacy Protection for Publishing Trajectories |
title_full |
Interchange-Based Privacy Protection for Publishing Trajectories |
title_fullStr |
Interchange-Based Privacy Protection for Publishing Trajectories |
title_full_unstemmed |
Interchange-Based Privacy Protection for Publishing Trajectories |
title_sort |
interchange-based privacy protection for publishing trajectories |
publisher |
IEEE |
series |
IEEE Access |
issn |
2169-3536 |
publishDate |
2019-01-01 |
description |
Information extracted from trajectory data is very useful in many practical application scenarios. Before trajectories for data mining are published, they need to be processed to protect the privacy of the trajectories' bodies. In this paper, a method for such privacy protection is proposed. Our method guarantees that the generated trajectory points satisfy the k-anonymity by interchanging the positions of the trajectory points on the k-core subnet of the relation network. The method treats the trajectory points as the privacy protection object. It overcomes the curse of dimensionality resulting from the K-anonymity of trajectories, and reduces the distortion of the generated trajectories significantly. Moreover, our proposed strategy can preserve the original positions of the trajectory points. Experiments on both real-life and synthetic data sets are carried out with different methods for comparison. The results show that our method has greater efficiency and lower distortion of the processed trajectories. |
topic |
Privacy protection publishing trajectories <italic xmlns:ali="http://www.niso.org/schemas/ali/1.0/" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">K</italic>-anonymity <italic xmlns:ali="http://www.niso.org/schemas/ali/1.0/" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">K</italic>-core subnet interchange |
url |
https://ieeexplore.ieee.org/document/8845638/ |
work_keys_str_mv |
AT shuaiwang interchangebasedprivacyprotectionforpublishingtrajectories AT chunyichen interchangebasedprivacyprotectionforpublishingtrajectories AT guijiezhang interchangebasedprivacyprotectionforpublishingtrajectories AT yuxin interchangebasedprivacyprotectionforpublishingtrajectories |
_version_ |
1724189988758749184 |