Affiliation:
1. School of Computer and Information, Anhui Normal University, Wuhu, Anhui, China
2. Anhui Provincial Key Laboratory of Network and Information Security, Wuhu, Anhui, China
Abstract
Fast-developing mobile location-aware services generate an enormous volume of trajectory data while adding value to people’s lives. However, trajectory data contains not only location information, but also sensitive personal information. If the original trajectory data is published directly, it could result in serious privacy leaks. Most of the existing privacy-preserving trajectory publishing methods only protect the location information or set the same privacy preservation levels for all moving objects. To meet the users’ personalized privacy requirements and ensure the utility of trajectory location and sensitive information, we propose a trajectory personalized privacy preservation method based on multi-sensitivity attribute generalization and local suppression. First, we set different security levels for each trajectory by calculating the correlation between sensitive attributes to establish a sensitive attribute classification tree. Second, we generalized sensitive attributes based on privacy preservation levels for each trajectory, the trajectory data still at risk of privacy leakage after generalization was locally suppressed. Finally, an anonymized trajectory dataset was generated. Experimental results on real datasets demonstrated that our method could improve data availability while preserving privacy.
Subject
Artificial Intelligence,Computer Vision and Pattern Recognition,Theoretical Computer Science
Reference30 articles.
1. A decentralized trust management system for intelligent transportation environments;Chen;IEEE Transactions on Intelligent Transportation Systems,2020
2. D. Parmar and U.P. Rao, Towards privacy-preserving dummy generation in location-based services, Procedia Computer Science 171 (2020), 1323–1326.
3. Location privacy preservation in vehicle-based spatial crowdsourcing via geo-indistinguishability;Qiu;IEEE Transactions on Mobile Computing,2020
4. Protecting trajectory from semantic attack considering k-anonymity, l-diversity, and t-closeness;Tu;IEEE Transactions on Network and Service Management,2019
5. X. Yang, L. Gao, H. Wang, J. Zheng and H. Guo, A semantic k-anonymity privacy preservation method for publishing sparse location data, in: Proceedings of the 7th IEEE International Conference on Advanced Cloud and Big Data, 2019, pp. 216–222.