吉林大学学报(工学版) ›› 2015, Vol. 45 ›› Issue (2): 630-638.doi: 10.13229/j.cnki.jdxbgxb201502044

• Orignal Article • Previous Articles     Next Articles

CCA-based algorithm for personalized privacy preservation in trajectory

LI Wen-ping1,2,3,YANG Jing1,ZHANG Jian-pei1,YIN Gui-sheng1,2   

  1. 1.College of Computer Science and Technology, Harbin Engineering University, Harbin 150001, China;
    2.National Science Park,Harbin Engineering University,Harbin 150001,China;
    3.College of Mathematics Physics and Information Engineering,Jiaxing Universty,Jiaxing 314001,China
  • Received:2013-07-06 Online:2015-04-01 Published:2015-04-01

Abstract: To satisfy the personalized requirement of privacy preservation, an algorithm for preserving trajectory privacy is proposed, which is based on the technique of Canonical Correlation Analysis (CCA). In this algorithm, the trajectories, which are considered to be insensitive by the data producer, are published directly. The protection of privacy is only imposed on the trajectories, which are considered to be sensitive by the data producer. To this end, a latent variable is first obtained from both the insensitive and sensitive trajectories. Then based on the latent variable, a lot of trajectories are generated to replace the sensitive trajectories. The advantage of this algorithm is that it can not only respect the privacy preserving wish of the data producer, but also obtain high quality trajectories. Experiments on real-world data set of trajectories were carried out, and the results demonstrate the effectiveness of the proposed algorithm.

CLC Number: 

  • TP309
[1] YU Yi-cheng, HU Liang, CHI Ling, CHU Jian-feng. Improved anonymous authentication protocol for multi-server architectures [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1586-1592.
[2] YANG Hong-yu, XU Jin. An Android malware static detection model [J]. 吉林大学学报(工学版), 2018, 48(2): 564-570.
[3] ZHAO Bo, QIN Gui-He, ZHAO Yong-Zhe, YANG Wen-Di. Public key cryptosystem based on semi-trapdoor one-way function [J]. 吉林大学学报(工学版), 2018, 48(1): 259-267.
[4] LUO Yang-xia, GUO Ye. Software recognition based on features of data dependency [J]. 吉林大学学报(工学版), 2017, 47(6): 1894-1902.
[5] HAN Jia-ling, ZHAO Xiao-hui. Adjustable reversible data hiding algorithm with large embedded capacity based on image gradient prediction [J]. 吉林大学学报(工学版), 2016, 46(6): 2074-2079.
[6] REN Wei-wu, HU Liang, ZHAO Kuo. Intrusion alert correlation model based on data mining and ontology [J]. 吉林大学学报(工学版), 2015, 45(3): 899-906.
[7] LUO Zhi-yong,YOU Bo,XU Jia-zhong,LIANG Yong. Automatic recognition model of intrusive intention based on three layers attack graph [J]. 吉林大学学报(工学版), 2014, 44(5): 1392-1397.
[8] CAI Zhao-hui, ZHANG Jian-pei, YANG Jing. Anonymous area estimation method of path data based on Bayesian network [J]. 吉林大学学报(工学版), 2014, 44(2): 454-458.
[9] WANG Hao, ZHANG Xiao, WANG Ping, ZHANG Yang. Lightweight certificateless signature and key agreement scheme for WSNs [J]. 吉林大学学报(工学版), 2014, 44(2): 465-470.
[10] SHENG Gang, WEN Tao, GUO Quan, YIN Ying. Correctness authentication of preference top-k query in cloud computing [J]. 吉林大学学报(工学版), 2014, 44(01): 164-170.
[11] PU Xin, TIAN Xiao-jian, WANG Chun-min, ZHANG Jing, DONG Lei, YIN Jing. Image encryption scheme based on substitution of fiber chaotic system [J]. 吉林大学学报(工学版), 2014, 44(01): 270-275.
[12] LUO Yang-xia, FANG Ding-yi. Software piracy detection based on birthmarks of multi-attribute features [J]. 吉林大学学报(工学版), 2013, 43(05): 1359-1366.
[13] HU Liang, YAN Zhi-jia, CHU Jian-feng, YUAN Wei, XU Xiao-bo. Cryptanalysis and improvement on subkey extendable algorithm of IDEA [J]. , 2012, (06): 1515-1520.
[14] LUO Wen-jun, GAO Yi-feng. Position-based authentication [J]. 吉林大学学报(工学版), 2012, 42(增刊1): 300-303.
[15] NING Fang-hua, ZHANG Yan-wei, YU Wu-jia. Security project for radio frequency identification access control system based on random hash-lock [J]. 吉林大学学报(工学版), 2012, 42(增刊1): 317-321.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!