Interchange-Based Privacy Protection for Publishing Trajectories

Information extracted from trajectory data is very useful in many practical application scenarios. Before trajectories for data mining are published, they need to be processed to protect the privacy of the trajectories' bodies. In this paper, a method for such privacy protection is proposed. Ou...

Full description

Bibliographic Details
Main Authors: Shuai Wang, Chunyi Chen, Guijie Zhang, Yu Xin
Format: Article
Language:English
Published: IEEE 2019-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8845638/
id doaj-6beaab25420f4993b0ed32a3f71acd6d
record_format Article
spelling doaj-6beaab25420f4993b0ed32a3f71acd6d2021-03-29T23:10:26ZengIEEEIEEE Access2169-35362019-01-01713829913831410.1109/ACCESS.2019.29427208845638Interchange-Based Privacy Protection for Publishing TrajectoriesShuai Wang0https://orcid.org/0000-0003-4046-6123Chunyi Chen1https://orcid.org/0000-0003-2228-3083Guijie Zhang2https://orcid.org/0000-0003-2056-5810Yu Xin3https://orcid.org/0000-0001-5307-2882School of Computer Science and Technology, Changchun University of Science and Technology, Changchun, ChinaSchool of Computer Science and Technology, Changchun University of Science and Technology, Changchun, ChinaTeacher Training Center of Colleges and Universities of Jilin Province, Jilin Normal University, Siping, ChinaCollege of Computer Science and Technology, Ningbo University, Ningbo, ChinaInformation extracted from trajectory data is very useful in many practical application scenarios. Before trajectories for data mining are published, they need to be processed to protect the privacy of the trajectories' bodies. In this paper, a method for such privacy protection is proposed. Our method guarantees that the generated trajectory points satisfy the k-anonymity by interchanging the positions of the trajectory points on the k-core subnet of the relation network. The method treats the trajectory points as the privacy protection object. It overcomes the curse of dimensionality resulting from the K-anonymity of trajectories, and reduces the distortion of the generated trajectories significantly. Moreover, our proposed strategy can preserve the original positions of the trajectory points. Experiments on both real-life and synthetic data sets are carried out with different methods for comparison. The results show that our method has greater efficiency and lower distortion of the processed trajectories.https://ieeexplore.ieee.org/document/8845638/Privacy protectionpublishing trajectories<italic xmlns:ali="http://www.niso.org/schemas/ali/1.0/" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">K</italic>-anonymity<italic xmlns:ali="http://www.niso.org/schemas/ali/1.0/" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">K</italic>-core subnetinterchange
collection DOAJ
language English
format Article
sources DOAJ
author Shuai Wang
Chunyi Chen
Guijie Zhang
Yu Xin
spellingShingle Shuai Wang
Chunyi Chen
Guijie Zhang
Yu Xin
Interchange-Based Privacy Protection for Publishing Trajectories
IEEE Access
Privacy protection
publishing trajectories
<italic xmlns:ali="http://www.niso.org/schemas/ali/1.0/" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">K</italic>-anonymity
<italic xmlns:ali="http://www.niso.org/schemas/ali/1.0/" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">K</italic>-core subnet
interchange
author_facet Shuai Wang
Chunyi Chen
Guijie Zhang
Yu Xin
author_sort Shuai Wang
title Interchange-Based Privacy Protection for Publishing Trajectories
title_short Interchange-Based Privacy Protection for Publishing Trajectories
title_full Interchange-Based Privacy Protection for Publishing Trajectories
title_fullStr Interchange-Based Privacy Protection for Publishing Trajectories
title_full_unstemmed Interchange-Based Privacy Protection for Publishing Trajectories
title_sort interchange-based privacy protection for publishing trajectories
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2019-01-01
description Information extracted from trajectory data is very useful in many practical application scenarios. Before trajectories for data mining are published, they need to be processed to protect the privacy of the trajectories' bodies. In this paper, a method for such privacy protection is proposed. Our method guarantees that the generated trajectory points satisfy the k-anonymity by interchanging the positions of the trajectory points on the k-core subnet of the relation network. The method treats the trajectory points as the privacy protection object. It overcomes the curse of dimensionality resulting from the K-anonymity of trajectories, and reduces the distortion of the generated trajectories significantly. Moreover, our proposed strategy can preserve the original positions of the trajectory points. Experiments on both real-life and synthetic data sets are carried out with different methods for comparison. The results show that our method has greater efficiency and lower distortion of the processed trajectories.
topic Privacy protection
publishing trajectories
<italic xmlns:ali="http://www.niso.org/schemas/ali/1.0/" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">K</italic>-anonymity
<italic xmlns:ali="http://www.niso.org/schemas/ali/1.0/" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">K</italic>-core subnet
interchange
url https://ieeexplore.ieee.org/document/8845638/
work_keys_str_mv AT shuaiwang interchangebasedprivacyprotectionforpublishingtrajectories
AT chunyichen interchangebasedprivacyprotectionforpublishingtrajectories
AT guijiezhang interchangebasedprivacyprotectionforpublishingtrajectories
AT yuxin interchangebasedprivacyprotectionforpublishingtrajectories
_version_ 1724189988758749184