Netinfo Security ›› 2024, Vol. 24 ›› Issue (12): 1911-1921.doi: 10.3969/j.issn.1671-1122.2024.12.009

Previous Articles     Next Articles

A k-Anonymity Completion Method Generated Based on Semantic Fusion Trajectories

XU Jianfeng1, ZHANG Wei1, TU Min2,3(), WEI Qingting1, LAI Zhanqing1, WANG Qianqian1   

  1. 1. School of Software, Nanchang University, Nanchang 330031, China
    2. Jiangxi Police Academy Network Security College, Nanchang 330103, China
    3. Key Laboratory of Electronic Data Control and Evidence Collection, Nanchang 330103, China
  • Received:2024-06-11 Online:2024-12-10 Published:2025-01-10

Abstract:

Trajectory privacy protection is one of the hot issues in the field of data security and personal privacy protection. Aiming at the problem that the number of anonymous trajectories might be insufficient in k-anonymous trajectory computation, the article proposed an anonymous trajectory generation method based on semantic fusion. The method selected pairs of trajectories with spacing less than a specified threshold and with pathways, and generates two virtual trajectories with better semantic interpretations after fusion and calibration. Based on the above research results, the article further proposed an anonymous trajectory set complementation algorithm based on semantic fusion trajectory generation. The method first selected trajectories from the anonymous trajectory set as the candidate trajectory set; then, the eligible trajectory pairs were selected from the candidate trajectory set to execute the semantic fusion-based anonymous trajectory generation method, and the eligible generated trajectories were added into the anonymous trajectory set. If the number of anonymous trajectory sets was still not enough to meet the requirements, suitable trajectories could also be selected again from the trajectories eliminated by the k-anonymous trajectory computation to be added to the candidate trajectory set, and the trajectory fusion generation could be performed again. This step also added the eligible generated trajectories into the anonymous trajectory set again until the number of anonymous trajectory sets reached the requirement. The trajectory generation and anonymous trajectory complementation method proposed in the article not only has good interpretability, but also can effectively solve the problem of insufficient number of trajectories that may be encountered in k-anonymous trajectory computation.

Key words: privacy protection, trajectory completion, trajectory generation, semantic fusion

CLC Number: