中国综合性科技类核心期刊(北大核心)

中国科学引文数据库来源期刊(CSCD)

美国《化学文摘》(CA)收录

美国《数学评论》(MR)收录

俄罗斯《文摘杂志》收录

Message Board

Respected readers, authors and reviewers, you can add comments to this page on any questions about the contribution, review, editing and publication of this journal. We will give you an answer as soon as possible. Thank you for your support!

Name
E-mail
Phone
Title
Content
Verification Code
Issue 5
Oct.  2015
Turn off MathJax
Article Contents
XIONG Sheng-chao, WU Xia, PENG Zhi-yong. Finegrained privacypreserving framework while ensuring data usability in trajectory databases[J]. Journal of East China Normal University (Natural Sciences), 2015, (5): 96-103. doi: 10.3969/j.issn.1000-5641.2015.05.008
Citation: XIONG Sheng-chao, WU Xia, PENG Zhi-yong. Finegrained privacypreserving framework while ensuring data usability in trajectory databases[J]. Journal of East China Normal University (Natural Sciences), 2015, (5): 96-103. doi: 10.3969/j.issn.1000-5641.2015.05.008

Finegrained privacypreserving framework while ensuring data usability in trajectory databases

doi: 10.3969/j.issn.1000-5641.2015.05.008
  • Received Date: 2015-07-09
  • Publish Date: 2015-09-25
  • The privacy of trajectories has aroused a wide concern. In previous works, rarely have the differences between different sensitive locations been discussed, nor the differences between different applications (eg: for advertising and for emergencies). While in fact, some sensitive locations are more important and some applications ought to be granted the access. In this paper, to meet different privacy requirements and data utility requirements, we propose a finegrained privacypreserving framework which allows the users to specify which locations are visible to some applications and invisible to others at the same time. In addition, since most sensitive locations are relevant to stay points and a significant stay in a sensitive place may last longer than the ordinary places, we also propose an efficient approach to distribute invisible location samples along the nearby popular visit sequences. Experiment results indicate that our framework performs efficiently without introducing significant performance penalties.
  • loading
  • [1]
    [1]PELEKIS N, GKOULALASDIVANIS A, VODAS M, et al. Privacyaware querying over sensitive trajectory data[C]Proceedings of the 20th ACM International Conference on Information and Knowledge Management. ACM, 2011: 895904.

    [2]FERRAIOLO D F, SANDHU R, GAVRILA S, et al.Proposed NIST standard for rolebased access control[J]. ACM Transactions on Information and System Security (TISSEC), 2001, 4(3): 224274.

    [3]BERTINO E, BONATTI P A, FERRARI E. TRBAC: A temporal rolebased access control model[J]. ACM Transactions on Information and System Security (TISSEC), 2001, 4(3): 191233.

    [4]BERTINO E, CATANIA B, DAMIANI M L, et al. GEORBAC:A spatially aware RBAC [C]Proceedings of the  10th ACM Symposium on Access Control Models and Technologies. ACM, 2005: 2937.

    [5]CHANDRAN S M, JOSHI J B D. LoTRBAC: A location and timebased RBAC model[M]Web Information Systems Engineering. Berlin: Springer, 2005: 361375.

    [6]YOU T H, PENG W C, LEE W C. Protecting moving trajectories with dummies[C]Proceedings of the 2007 International Conference on Mobile Data Management. IEEE, 2007: 278282.

    [7]TERROVITIS M, MAMOULIS N. Privacy preservation in the publication of trajectories[C]Proceedings of the 9th International Conference on Mobile Data Management.  IEEE, 2008: 6572.

    [8]ABUL O, BONCHI F, NANNI M. Never walk alone: Uncertainty for anonymity in moving objects databases[C]Proceedings of the IEEE 24th International Conference on Data Engineering.  IEEE, 2008: 376385.

    [9]KROHN M, YIP A, BRODSKY M, et al. Information flow control for standard OS abstractions[J]. ACM SIGOPS Operating Systems Review, 2007, 41(6): 321334.

    [10]HUO Z, MENG X, HU H, et al. You can walk alone: Trajectory privacypreserving through significant stays protection[M]Database Systems for Advanced Applications. Berlin: Springer, 2012: 351366.

    [11]XIE K, DENG K, ZHOU X. From trajectories to activities: A spatiotemporal join approach[C]Proceedings of the 2009 International Workshop on LocationBased Social Networks. ACM, 2009: 2532.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索
    Article views (590) PDF downloads(760) Cited by()
    Proportional views

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return