信息网络安全 ›› 2016, Vol. 16 ›› Issue (6): 15-21.doi: 10.3969/j.issn.1671-1122.2016.06.003

• • 上一篇    下一篇

基于Voronoi图的路网轨迹隐私保护研究

肖剑川1,2, 许力1,2(), 叶阿勇1,2, 林丽美1,2   

  1. 1.福建师范大学数学与计算机科学学院, 福建福州 350007
    2.福建省网络安全与密码技术重点实验室, 福建福州 350007
  • 收稿日期:2016-05-04 出版日期:2016-06-20 发布日期:2020-05-13
  • 作者简介:

    作者简介: 肖剑川(1990—),男,福建,硕士研究生,主要研究方向为轨迹隐私保护;许力(1970—),男,福建,教授,博士,主要研究方向为无线网络与移动通信、网络与信息安全、物联网与云计算、智能信息处理、复杂系统和网络的建模与仿真;叶阿勇(1977—),男,福建,副教授,博士,主要研究方向为网络信息安全;林丽美(1988—),女,福建,博士研究生,主要研究方向为移动社交网络。

  • 基金资助:
    国家自然科学基金[U1405255]:福州市科技局项目[2015-G-59]

Research on Trajectory Privacy Preserving over Road Network Based on Voronoi Diagram

Jianchuan XIAO1,2, Li XU1,2(), A-yong YE1,2, Limei LIN1,2   

  1. 1. School of Mathematics and Computer Science, Fujian Normal University, Fuzhou Fujian 350007, China
    2.Fujian Provincial Key Laboratory of Network Security and Cryptology, Fuzhou Fujian 350007, China
  • Received:2016-05-04 Online:2016-06-20 Published:2020-05-13

摘要:

轨迹数据的发布可能泄露用户隐私,文章提出一种基于Voronoi图的停留点路网轨迹隐私保护方法来解决这个问题。根据Voronoi图的特性,文章提出的方法可以保证路段的多样性。在此基础上,考虑到初始划分的区域面积和区域内兴趣点数量存在差异,文章将预处理生成的Voronoi区域进一步优化,使得每个区域满足(k,l,s)匿名。此外,通过识别轨迹中有意义的停留点,根据停留点所在区域做泛化或抑制处理,进一步实现个性化隐私保护。在路网轨迹数据生成器Brinkhoff上的仿真实验表明,在同等隐私安全条件下,文章提出的方法信息损失小。

关键词: 道路网络, 轨迹隐私保护, 停留点, Voronoi图

Abstract:

Trajectory data publication may leak user’s privacy. This paper proposes an approach to protect trajectory privacy through generalization of stay points over road network based on Voronoi diagram. According to the characteristics of Voronoi diagram, the proposed approach can ensure the diversity of road segments. Because of the difference of the partitioned region area and the difference of the number of points of interest, the approach further optimizes the Voronoi regions to satisfy (k,l,s) anonymity. In addition, the approach generalizes or suppresses those stay points according to the regions they belong to, and realizes personalized privacy protection further by identifying the significant stay points on trajectories. The experiment on Brinkhoff generator shows the information loss of the proposed approach is smaller than other approaches under the same privacy security condition.

Key words: road network, trajectory privacy preserving, stay points, Voronoi diagram

中图分类号: