吉林大学学报(工学版) ›› 2014, Vol. 44 ›› Issue (2): 454-458.doi: 10.13229/j.cnki.jdxbgxb201402028

• paper • Previous Articles     Next Articles

Anonymous area estimation method of path data based on Bayesian network

CAI Zhao-hui1,2, ZHANG Jian-pei1, YANG Jing1   

  1. 1. College of Computer Science and Technology, Harbin Engineering University, Harbin 150001, China;
    2. College of Computer Science and Information Technology, Daqing Normal University, Daqing 163712, China
  • Received:2013-03-20 Online:2014-02-01 Published:2014-02-01

Abstract:

In this paper, an anonymous area estimation method of path data based on Bayesian network is proposed. This method is based on the path network model, combined with road network data, and the maximum likelihood theory is used to determine the minimum anonymous region estimation. Simulation results show that the proposed anonymous area estimation method can provide timely and proper anonymous region suggestion for the privacy protection based on the position service, thus, the service quality in terms of anonymous time and precision. The proposed method also makes use of the known path data for objective reasoning and providing reasonable suggestion to individuation anonymous demands, which solves the major uncertainty problems in the mobile user queries.

Key words: artificial intelligence, location privacy protection, query sensitivity, Bayesian network, personal privacy requirements, anonymous area estimation

CLC Number: 

  • TP309

[1] Authorities: GPS system used to stalk woman. USA Today.[DB/OL] http://www.usatoday.com/ tech/new/2002-12-30-gps-stalker_x.htm, 2002.

[2] Gedik B, Liu L. Location privacy in mobile systems: a personalized anonymization model[C]//Proceedings of the 25th IEEE International Conference on Distributed Computing Systems, Columbus: IEEE Computer Society, 2005: 620-629.

[3] Chow C, Mokbel M F. Enabling private continuous queries for revealed user locations[C]//Proceedings of the 10th International Conference on Advances in Spatial and Temporal Databases. Boston: Springer, 2007: 258-275.

[4] Mokbel M F. Privacy in location-based services: state-of-the-art and research directions[C]//Proceedings of 8th International Conference on Mobile Data Management, Mannheim, 2007:228.

[5] Gruteser M, Grunwald D. Anonymous usage of location-based services through spatial and temporal cloaking[C]//Proceedings of the International Conference on Mobile Systems, Applications, and Services, Scan Francisco, 2003:163-168.

[6] Gabriel Ghinita, Panos Kalnis, Ali Khoshgozaran, et al. Private queries in location based services: anonymizers are not necessary[C]//Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data, SIGMOD, 2008:121-132.

[7] Xiao Z, Xu J, Meng X F. P-sensitivity: a semantic privacy-protection model for location-based services[C]//Proceedings of PALMS2008, China, 2008:47-54.

[8] Gedik Bugra, Liu Ling. Protecting location privacy with personalized k-anonymity: architecture and algorithms[J]. IEEE Transactions on Mobile Computing, 2008, 7(1): 1-18.

[9] Baik Hoh, Marco Gruteser. Protecting location privacy through path confusion[C]//Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Athens, 2005: 194-205.

[10] Machanavajjhala A, Gehrke J, Kifer D. L-diversity: privacy beyond K-anonymity[C]//Proceedings of 22nd International Conference on Data Engineering, Atlanta, 2006: 24-35.

[11] Wang Ting, Liu Ling. Privacy-aware mobile services over road networks[C]//Proceedings of the VLDB Endowment, Lyon, 2009, 2(1): 1042-1053.

[12] Chow C, Mokbel M F, Bao J, et al. Query-aware location anonymization for road networks[J]. GeoInformatica, 2011, 15(3): 571-607.

[13] Li Fei-fei, Cheng Di-han, Marios Hadjieleftheriou, et al. On trip planning queries in spatial databases[C]//Proceedings of 9th International Symposium, SSTD 2005. Berlin: Springer, 2005: 273-290.

[1] WANG Li-min,LIU Yang,SUN Ming-hui,LI Mei-hui. Ensemble of unrestricted K-dependence Bayesian classifiers based on Markov blanket [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1851-1858.
[2] DONG Sa, LIU Da-you, OUYANG Ruo-chuan, ZHU Yun-gang, LI Li-na. Logistic regression classification in networked data with heterophily based on second-order Markov assumption [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1571-1577.
[3] GU Hai-jun, TIAN Ya-qian, CUI Ying. Intelligent interactive agent for home service [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1578-1585.
[4] WANG Xu, OUYANG Ji-hong, CHEN Gui-fen. Measurement of graph similarity based on vertical dimension sequence dynamic time warping method [J]. 吉林大学学报(工学版), 2018, 48(4): 1199-1205.
[5] ZHANG Hao, ZHAN Meng-ping, GUO Liu-xiang, LI Zhi, LIU Yuan-ning, ZHANG Chun-he, CHANG Hao-wu, WANG Zhi-qiang. Human exogenous plant miRNA cross-kingdom regulatory modeling based on high-throughout data [J]. 吉林大学学报(工学版), 2018, 48(4): 1206-1213.
[6] SUN Xiao-ying, HU Ze-zheng, YANG Jin-peng. Assessment method of electromagnetic pulse sensitivity of vehicle engine system based on hierarchical Bayesian networks [J]. 吉林大学学报(工学版), 2018, 48(4): 1254-1264.
[7] HUANG Lan, JI Lin-ying, YAO Gang, ZHAI Rui-feng, BAI Tian. Construction of disease-symptom semantic net for misdiagnosis prompt [J]. 吉林大学学报(工学版), 2018, 48(3): 859-865.
[8] LI Xiong-fei, FENG Ting-ting, LUO Shi, ZHANG Xiao-li. Automatic music composition algorithm based on recurrent neural network [J]. 吉林大学学报(工学版), 2018, 48(3): 866-873.
[9] LIU Jie, ZHANG Ping, GAO Wan-fu. Feature selection method based on conditional relevance [J]. 吉林大学学报(工学版), 2018, 48(3): 874-881.
[10] WANG Xu, OUYANG Ji-hong, CHEN Gui-fen. Heuristic algorithm of all common subsequences of multiple sequences for measuring multiple graphs similarity [J]. 吉林大学学报(工学版), 2018, 48(2): 526-532.
[11] YANG Xin, XIA Si-jun, LIU Dong-xue, FEI Shu-min, HU Yin-ji. Target tracking based on improved accelerated gradient under tracking-learning-detection framework [J]. 吉林大学学报(工学版), 2018, 48(2): 533-538.
[12] LIU Xue-juan, YUAN Jia-bin, XU Juan, DUAN Bo-jia. Quantum k-means algorithm [J]. 吉林大学学报(工学版), 2018, 48(2): 539-544.
[13] SUN Xiao-ying, WANG Zhen, YANG Jin-peng, HU Ze-zheng, CHEN Jian. Electromagnetic susceptibility assessment of electronic throttle based on Bayesian network [J]. 吉林大学学报(工学版), 2018, 48(1): 281-289.
[14] QU Hui-yan, ZHAO Wei, QIN Ai-hong. A fast collision detection algorithm based on optimization operator [J]. 吉林大学学报(工学版), 2017, 47(5): 1598-1603.
[15] LI Jia-fei, SUN Xiao-yu. Clustering method for uncertain data based on spectral decomposition [J]. 吉林大学学报(工学版), 2017, 47(5): 1604-1611.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!