Space Disturbing Based Uncertainty Trajectory Anonymous Algorithm in Trajectory Databases Publication

In recent years, privacy preserving trajectory data publishing has gained widespread attention. Aiming at the trajectory anonymity issues in publishing trajectory data of moving target, using the inherent uncertainty of the trajectory acquisition system, and based on the case that the uncertain threshold of trajectory is variable in practical applications, the traditional (k, δ)-anonymous model was improved, and a (k, ∆)-anonymous model is proposed. Based on the (k, ∆)-anonymous model, a space disturbing based trajectory anonymous algorithm is proposed. Simulation results show that the proposed algorithm has better performance in terms of data quality and data availability.

[1]  Yücel Saygin,et al.  Towards trajectory anonymization: a generalization-based approach , 2008, SPRINGL '08.

[2]  Mahdi Abadi,et al.  PPTD: Preserving personalized privacy in trajectory data publishing by sensitive attribute generalization and trajectory local suppression , 2016, Knowl. Based Syst..

[3]  Benjamin C. M. Fung,et al.  Privacy-preserving trajectory stream publishing , 2014, Data Knowl. Eng..

[4]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[5]  Meng Xiao A Survey of Trajectory Privacy-Preserving Techniques , 2011 .

[6]  S. Arunkumar,et al.  A review paper on preserving privacy in mobile environments , 2015, J. Netw. Comput. Appl..

[7]  Jun Zhang,et al.  PrivBayes: private data release via bayesian networks , 2014, SIGMOD Conference.

[8]  Yu Zhang,et al.  Differentially Private High-Dimensional Data Publication via Sampling-Based Inference , 2015, KDD.

[9]  Thomas Brinkhoff,et al.  Generating Traffic Data , 2003, IEEE Data Eng. Bull..

[10]  Francesco Bonchi,et al.  Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[11]  Xiao-Feng Meng,et al.  A Survey of Trajectory Privacy-Preserving Techniques: A Survey of Trajectory Privacy-Preserving Techniques , 2011 .

[12]  Laks V. S. Lakshmanan,et al.  Anonymizing moving objects: how to hide a MOB in a crowd? , 2009, EDBT '09.

[13]  Francesco Bonchi,et al.  Anonymization of moving objects databases by clustering and perturbation , 2010, Inf. Syst..

[14]  Torben Bach Pedersen,et al.  Privacy-Preserving Data Mining on Moving Object Trajectories , 2007, 2007 International Conference on Mobile Data Management.

[15]  Hui Xiong,et al.  Achieving Guaranteed Anonymity in GPS Traces via Uncertainty-Aware Path Cloaking , 2010, IEEE Transactions on Mobile Computing.