信息网络安全 ›› 2017, Vol. 17 ›› Issue (6): 1-5.doi: 10.3969/j.issn.1671-1122.2017.06.001

• 等级保护 •    下一篇

一种基于几何变换的数字脚印轨迹隐私保护方法研究

邹建成1, 2, 徐淑情1, 2   

  1. 1.北方工业大学理学院,北京 100144;
    2.北方工业大学图像处理与模式识别研究所,北京100144
  • 收稿日期:2017-04-25 出版日期:2017-06-20
  • 通讯作者: 徐淑情 shuqingxu@yeah.net
  • 作者简介:邹建成(1966-),男,贵州,教授,博士,主要研究方向为信息安全、图像处理;徐淑情(1991-),男,山东,硕士研究生,主要研究方向为信息安全。
  • 基金资助:
    国家科技重大专项课题[2014ZX02502003]; 国家自然科学基金[61170327]; 北京市自然科学基金[KZ201410009013]

Digital Footprint Trajectory Privacy Protection Method Based on Geometric Transformation

ZOU Jiancheng1, 2, XU Shuqing1, 2   

  1. 1.College of Science, North China University of Technology, Beijing 100144, China;
    2. Institute of Image Processing and Pattern Recognition, North China University of Technology, Beijing 100144, China
  • Received:2017-04-25 Online:2017-06-20

摘要: 随着信息技术的快速发展,人们在网络空间留下了形式各异的数字脚印。数字脚印可以揭示个人和群体的行为爱好,在方便人们交流的同时,也带来了隐私安全问题,引起人们的广泛关注。针对数字脚印中的用户移动轨迹,文章提出了基于几何变换的数字脚印轨迹隐私保护方法。根据用户对隐私保护的需求强度,中心匿名服务器对真实轨迹进行旋转、平移变换生成满足要求的假轨迹,从而减小真实轨迹被识别的概率。仿真实验表明,当用户对隐私保护需求程度较高时,相比于随机模式生成法和旋转模式生成法,文章所提方法生成的假轨迹相似度更高,假轨迹生成效率更高。

关键词: 数字脚印, 轨迹隐私, 假轨迹, 几何变换

Abstract: With the rapid development of information technology, people leave digital footprints in different forms in cyberspace. Digital footprints can reveal personal and group behaviors and hobbies, which brings privacy issues while brings conveniences to people to communicate with each other, causing wide public concerns. Aiming at the moving trajectory of user in digital footprint, this paper proposes a trajectory privacy protection method based on geometric transformation in digital footprint. In this method, the central anonymous server generates false tracks that satisfy the user's requirements by rotating and translating the real trajectory, thereby reducing the probability that the real trajectory is recognized. The simulation experiments show that, when the user's demand for privacy protection is high, the false trajectory similarity that the method generates is higher than the random pattern generation method and the rotation pattern generation method, and the generation efficiency is also high.

Key words: digital footprint, trajectory privacy, false trajectory, geometric transformation

中图分类号: