中国综合性科技类核心期刊(北大核心)

中国科学引文数据库来源期刊(CSCD)

美国《化学文摘》(CA)收录

美国《数学评论》(MR)收录

俄罗斯《文摘杂志》收录

Message Board

Respected readers, authors and reviewers, you can add comments to this page on any questions about the contribution, review, editing and publication of this journal. We will give you an answer as soon as possible. Thank you for your support!

Name
E-mail
Phone
Title
Content
Verification Code
Issue 5
Oct.  2015
Turn off MathJax
Article Contents
XU Jian-qiu, HUANG Huo-rong. Privacy preserving for moving objects with transportation modes[J]. Journal of East China Normal University (Natural Sciences), 2015, (5): 77-87. doi: 10.3969/j.issn.1000-5641.2015.05.006
Citation: XU Jian-qiu, HUANG Huo-rong. Privacy preserving for moving objects with transportation modes[J]. Journal of East China Normal University (Natural Sciences), 2015, (5): 77-87. doi: 10.3969/j.issn.1000-5641.2015.05.006

Privacy preserving for moving objects with transportation modes

doi: 10.3969/j.issn.1000-5641.2015.05.006
  • Received Date: 2015-07-09
  • Publish Date: 2015-09-25
  • The current methods of locationbased privacy preserving focus on protecting the location of users, but do not consider transportation modes such as BUS, WALK and CAR. Being one key attribute of moving objects, transportation mode reflects the feature of mobile users and can be used to analyze their behavior. This paper proposes a method including cloaking location and reset modes to preserve transportation modes of moving objects for range queries. Such a technique prevents modes from being disclosed and avoids returning precise data to illegal users. We analyze the two methods and introduce how to integrate the solution into the existing system. In addition, cloaking location and reset modes with different preserving granularity is proposed to have a flexible and tunable method for different applications.
  • loading
  • [1]
    [1]〖ZK(#〗ZHENG Y, LIU L, WANG L, et al. Learning transportation mode from raw GPS data for geographic applications on the web[C]Proceedings of the 17th International Conference on World Wide Web. New York: ACM, 2008: 247256.

    [2]ZHENG Y, CHEN Y, XIE X, et al. Understanding transportation modes based on GPS data for Web applications [J]. ACM Transactions on the Web, 2010, 4(1): 495507.

    [3]REDDY S, MUN M, BURKE J, et al. Using mobile phones to determine transportation modes[J]. ACM Transactions on Sensor Networks (TOSN), 2010, 6(2): article 13.

    [4]STENNETH L, WOLFSON O, YU P S, et al. Transportation mode detection using mobile phones and GIS information [C]Proceedings of the 19th ACM SIGSPATIAC International Conference on Advances in Geographic Information Systems. New York: ACM, 2011: 5463.

    [5]BETTINI C, WANG X S, JAJODIA S. Protecting privacy against locationbased personal identification[C]2nd VLDB Workshop Secure Data Management. Berlin: SpringerVerlag, 2005: 185199.

    [6]薛娇,刘向宇,杨晓春,等. 一种面向公路网络的位置隐私保护方法[J].计算机学报,2011,34(5): 865878.

    [7]霍峥,孟小峰.轨迹隐私保护技术研究[J].计算机学报;2011,34(10):18201930.

    [8]田秀霞,王晓玲,高明,等.数据库服务—安全与隐私保护[J].软件学报,2010,21(5):9911006.

    [9]CICEK A E, NERGIZ M E, SAYGIN Y. Ensuring location diversity in privacypreserving spatiotemporal data publishing[J]. the VLDB J, 2014, 23(4): 609625.

    [10]XU J, GTING R H. A generic data model for moving objects[J]. Geoinformatica, 2013, 17(1): 125172.

    [11]XU J,  GTING R H, QIN X. et al. Benchmarking generic moving objects [J]. Geoinformatica, 2015, 19(2): 227276.

    [12]LIU L. From data privacy to location privacy: Models and algorithms[C]Proceedings of the 33rd International Conference on Very Large Data Bases. Seoul: VLDB Endowment.2007: 14291430.

    [13]MOKBEL M F, CHOW C Y, AREF W G. The new casper: Query processing for location services without compromising privacy[C]Proceeding of the 32nd International Conference on Very Large Data Bases. Seoul: VLDB Endowment, 2006: 763774.

    [14]SAMARATI P. Protecting respondent’s privacy in microdata release[J]. IEEE Trans. on Knowl. and Data Eng, 2011, 13(6): 10101027.

    [15]GHINITA G, DAMIANI M L, BERTINO E, et al. Interactive location cloaking with the PROBE obfuscator[C]Mobile Data Management: System, Services and Middleware. Tenth International Conference on IEEE. [s. l.]: IEEE, 2009: 355356.

    [16]GKOULALASDIVANIS A, VERYKIOS V S. A Free Terrain Model for Trajectory KAnonymity[M]Database and Expert Systems Applications. New York: Springer, 2008: 4956.

    [17]GRUTESER M, GRUNWALD D. Anonymous usage of locationbased services through spatial and temporalcloaking [C]Proceedings of the 1st International Conference on Mobile Systems, Applications and Services. New York: ACM, 2003: 3142.

    [18]KHOSHGOZARAN A, SHAHABI C, MEHR H S. Location privacy: Going beyond kanonymity, cloaking and anonymizers[J]. Knowl. and Inf. Syst, 2011, 26(3): 43546.

    [19]GONG Z Q, SUN G Z, XIE X. Protecting privacy in locationbased services using kanonymity without cloaked region[C]11th International Conference on Mobile Data Management. USA: DBLP, 2010: 366371.

    [20]YUNG D, LO E, YIU M L. Authentication of moving range queries[C]Proceedings of the 21st ACM International Conference on Information and Knowledge Management. New York: ACM, 2012: 13721381.

    [21]XU J L, CHEN Q, HU H B. VERDICT: Privacypreserving authentication of range queries in locationbased services[C]Proceedings of the 2013 IEEE International Conference on Data Engineering. Washington, DC: IEEE, 2013: 13121315.

    [22]HU H B, XU J L, CHEN Q, et al. Authenticating locationbased services without compromising location privacy [C] Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data. New York: ACM, 2012: 301312.

    [23]YAO B, LI F F, XIAO X K. Secure nearest neighbor revisited[M]29th International Conference on Data Engineering (ICDE).[s. l.]: IEEE, 2013: 733744.

    [24]YI X, PAULET R, BERTINO E, et al. Practical k nearest neighbor queries with location privacy[M]30th International Conference on Data Engineering (ICDE)[s. l.]: IEEE, 2014: 640651.

    [25]SHAO D X, JIANG K F, KISTER T, et al. Publishing trajectory with differential privacy: A priori vs. A posteriori sampling mechanisms[M]Database and Expert Systems Applications. New York: Springer, 2013: 357365.

    [26]PELEKIS N, DIVANIS A G, VODAS M, et al. Privacyaware querying over sensitive trajectory data[C]Proceedings of the 20th ACM International Conference on Information and Knowledge Management. New York: ACM, 2011: 895904.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索
    Article views (811) PDF downloads(623) Cited by()
    Proportional views

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return