信息网络安全 ›› 2017, Vol. 17 ›› Issue (6): 1-5.doi: 10.3969/j.issn.1671-1122.2017.06.001

• Contents •     Next Articles

Digital Footprint Trajectory Privacy Protection Method Based on Geometric Transformation

ZOU Jiancheng1, 2, XU Shuqing1, 2   

  1. 1.College of Science, North China University of Technology, Beijing 100144, China;
    2. Institute of Image Processing and Pattern Recognition, North China University of Technology, Beijing 100144, China
  • Received:2017-04-25 Online:2017-06-20

Abstract: With the rapid development of information technology, people leave digital footprints in different forms in cyberspace. Digital footprints can reveal personal and group behaviors and hobbies, which brings privacy issues while brings conveniences to people to communicate with each other, causing wide public concerns. Aiming at the moving trajectory of user in digital footprint, this paper proposes a trajectory privacy protection method based on geometric transformation in digital footprint. In this method, the central anonymous server generates false tracks that satisfy the user's requirements by rotating and translating the real trajectory, thereby reducing the probability that the real trajectory is recognized. The simulation experiments show that, when the user's demand for privacy protection is high, the false trajectory similarity that the method generates is higher than the random pattern generation method and the rotation pattern generation method, and the generation efficiency is also high.

Key words: digital footprint, trajectory privacy, false trajectory, geometric transformation

CLC Number: