首页|基于语义融合轨迹生成的k匿名轨迹集补全方法

基于语义融合轨迹生成的k匿名轨迹集补全方法

扫码查看
轨迹隐私保护是数据安全和个人隐私保护领域的热点问题之一.文章针对k匿名轨迹计算中可能存在匿名轨迹数量不足的问题,提出一种基于语义融合的匿名轨迹生成方法.该方法选择间距小于指定阈值且存在通路的轨迹对,进行融合和校准后生成两条具有较好语义解释性的虚拟轨迹.基于上述研究成果,文章进一步提出一种基于语义融合轨迹生成的k匿名轨迹集补全方法TS-ATC.该方法首先从匿名轨迹集中选取轨迹作为候选轨迹集;然后,从候选轨迹集中选取符合条件的轨迹对执行基于语义融合的匿名轨迹生成方法,并将符合条件的生成轨迹添加到匿名轨迹集.如果匿名轨迹集数量还达不到要求,再从k匿名轨迹计算淘汰的轨迹中选择合适的轨迹加入候选轨迹集,并进行轨迹融合生成.该步骤也将符合条件的生成轨迹再次添加入匿名轨迹集,直至匿名轨迹集的数量达到要求.文章提出的轨迹生成及匿名轨迹补全方法不但具有较好的可解释性,同时能够有效解决k匿名轨迹计算中可能遇到的轨迹数量不足的问题.
A k-Anonymity Completion Method Generated Based on Semantic Fusion Trajectories
Trajectory privacy protection is one of the hot issues in the field of data security and personal privacy protection. Aiming at the problem that the number of anonymous trajectories might be insufficient in k-anonymous trajectory computation,the article proposed an anonymous trajectory generation method based on semantic fusion. The method selected pairs of trajectories with spacing less than a specified threshold and with pathways,and generates two virtual trajectories with better semantic interpretations after fusion and calibration. Based on the above research results,the article further proposed an anonymous trajectory set complementation algorithm based on semantic fusion trajectory generation. The method first selected trajectories from the anonymous trajectory set as the candidate trajectory set;then,the eligible trajectory pairs were selected from the candidate trajectory set to execute the semantic fusion-based anonymous trajectory generation method,and the eligible generated trajectories were added into the anonymous trajectory set. If the number of anonymous trajectory sets was still not enough to meet the requirements,suitable trajectories could also be selected again from the trajectories eliminated by the k-anonymous trajectory computation to be added to the candidate trajectory set,and the trajectory fusion generation could be performed again. This step also added the eligible generated trajectories into the anonymous trajectory set again until the number of anonymous trajectory sets reached the requirement. The trajectory generation and anonymous trajectory complementation method proposed in the article not only has good interpretability,but also can effectively solve the problem of insufficient number of trajectories that may be encountered in k-anonymous trajectory computation.

privacy protectiontrajectory completiontrajectory generationsemantic fusion

徐健锋、张炜、涂敏、魏勍颋、赖展晴、王倩倩

展开 >

南昌大学软件学院,南昌 330031

江西警察学院网络安全学院,南昌 330103

电子数据管控与取证江西省重点实验室,南昌 330103

隐私保护 轨迹补全 轨迹生成 语义融合

2024

信息网络安全
公安部第三研究所 中国计算机学会计算机安全专业委员会

信息网络安全

CSTPCDCHSSCD北大核心
影响因子:0.814
ISSN:1671-1122
年,卷(期):2024.(12)