Privacy preserving algorithm based on trajectory location and shape similarity
In order to reduce the privacy disclosure risks when trajectory data is released,a variety of trajectories anonymity methods were proposed.However,while calculating similarity of trajectories,the existing methods ignore the impact that the shape factor of trajectory has on similarity of trajectories...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2015-02-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2015043/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539680858800128 |
---|---|
author | Chao WANG Jing YANG Jian-pei ZHANG |
author_facet | Chao WANG Jing YANG Jian-pei ZHANG |
author_sort | Chao WANG |
collection | DOAJ |
description | In order to reduce the privacy disclosure risks when trajectory data is released,a variety of trajectories anonymity methods were proposed.However,while calculating similarity of trajectories,the existing methods ignore the impact that the shape factor of trajectory has on similarity of trajectories,and therefore the produced set of trajectory anonymity has a lower utility.To solve this problem,a trajectory similarity measure model was presented,considered not only the time and space elements of the trajectory,but also the shape factor of trajectory.It is computable in polynomial time,and can calculate the distance of trajectories not defined over the same time span.On this basis,a greedy clustering and data mask based trajectory anonymization algorithm was presented,which maximized the trajectory similarity in the clusters,and formed data "mask" which is formed by fully accurate true original locations information to meet the trajectory k-anonymity.Finally,experimental results on a synthetic data set and a real-life data set were presented; our method offer better utility and cost less time than comparable previous proposals in the literature. |
format | Article |
id | doaj-art-b7fb136b13e8459ca0f843b0045085ac |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2015-02-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-b7fb136b13e8459ca0f843b0045085ac2025-01-14T06:46:00ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2015-02-013614415759691758Privacy preserving algorithm based on trajectory location and shape similarityChao WANGJing YANGJian-pei ZHANGIn order to reduce the privacy disclosure risks when trajectory data is released,a variety of trajectories anonymity methods were proposed.However,while calculating similarity of trajectories,the existing methods ignore the impact that the shape factor of trajectory has on similarity of trajectories,and therefore the produced set of trajectory anonymity has a lower utility.To solve this problem,a trajectory similarity measure model was presented,considered not only the time and space elements of the trajectory,but also the shape factor of trajectory.It is computable in polynomial time,and can calculate the distance of trajectories not defined over the same time span.On this basis,a greedy clustering and data mask based trajectory anonymization algorithm was presented,which maximized the trajectory similarity in the clusters,and formed data "mask" which is formed by fully accurate true original locations information to meet the trajectory k-anonymity.Finally,experimental results on a synthetic data set and a real-life data set were presented; our method offer better utility and cost less time than comparable previous proposals in the literature.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2015043/spatio-tempporal trajectory datapublication of trajectory datagreedy clusteringdata mask |
spellingShingle | Chao WANG Jing YANG Jian-pei ZHANG Privacy preserving algorithm based on trajectory location and shape similarity Tongxin xuebao spatio-tempporal trajectory data publication of trajectory data greedy clustering data mask |
title | Privacy preserving algorithm based on trajectory location and shape similarity |
title_full | Privacy preserving algorithm based on trajectory location and shape similarity |
title_fullStr | Privacy preserving algorithm based on trajectory location and shape similarity |
title_full_unstemmed | Privacy preserving algorithm based on trajectory location and shape similarity |
title_short | Privacy preserving algorithm based on trajectory location and shape similarity |
title_sort | privacy preserving algorithm based on trajectory location and shape similarity |
topic | spatio-tempporal trajectory data publication of trajectory data greedy clustering data mask |
url | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2015043/ |
work_keys_str_mv | AT chaowang privacypreservingalgorithmbasedontrajectorylocationandshapesimilarity AT jingyang privacypreservingalgorithmbasedontrajectorylocationandshapesimilarity AT jianpeizhang privacypreservingalgorithmbasedontrajectorylocationandshapesimilarity |