Journal of Guangdong University of Technology ›› 2023, Vol. 40 ›› Issue (05): 56-63.doi: 10.12052/gdutxb.220170

• Computer Science and Technology • Previous Articles    

Differential Privacy Trajectory Data Publishing Based on Orientation Control

Li Yang, Zhou Ying   

  1. School of Computer Science and Technology, Guangdong University of Technology, Guangzhou 510006, China
  • Received:2022-11-16 Published:2023-09-26

Abstract: With the continuous expansion of differential privacy and its applications, its application in the privacy protection field of trajectory data release has received extensive attention. However, most existing research methods use the Kmeans to cluster the trajectory, , which cannot guarantee the final convergence due to the fact that the trajectory datasets under differential privacy constraints are usually disturbed by noise. To addrss this, this paper proposes an orientation control-based differential privacy-preserving trajectory data publishing method. Firstly, a trajectory generalization algorithm based on SKmeans|| clustering is proposed, which updates the centroid via a direction control mechanism during iterative process of clustering, and designs a scoring function in the index mechanism to control the convergence of the centroid, such that the quality of high dimensional data clustering can be improved. Secondly, a trajectory data publishing algorithm based on bounded noise mechanism is designed, which improves the availability of trajectory data after publishing. Meanwhile, the bounded noise mechanism ensures the true count of the hidden trajectory. Finally, the effectiveness of the method proposed in this paper is evaluated by experiments.

Key words: differential privacy, clustering, trajectory publishing, orientation control, bounded noise

CLC Number: 

  • TP391
[1] LI J Y, GUO W Z, LI X Y, et al. Privacy-preserving real-time road conditions monitoring scheme based on intelligent traffic [J]. Journal on Communications, 2020, 41(7): 73-83.
[2] SWEENEY L. k-anonymity: a model for protecting privacy [J]. International Journal of Uncertainty, Fuzziness and Knowledge Based Systems, 2002, 10(5): 557-570.
[3] MACHANAVAJJHALA A, KIFER D, GEHRKE J, et al. l-diversity: privacy beyond k-anonymity [J]. ACM Transactions on Knowledge Discovery from Data (TKDD), 2007, 1(1): 3-14.
[4] DWORK C. Differential privacy: a survey of results[C]//International Conference on Theory and Applications of Models of Computation. Heidelberg: Springer, 2008: 1-19.
[5] CHEN R, FUNG B C M, DESAI B C, et al. Differentially private transit data publication: a case study on the montreal transportation system[C]// Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Beijing: ACM, 2012: 213-221.
[6] CHEN R, ACS G, CASTELLUCCIA C. Differentially private sequential data publication via variable-length n-grams[C]//Proceedings of the 2012 ACM Conference on Computer and Communications Security. Raleigh: ACM, 2012: 638-649.
[7] ZHAO X, DONG Y, PI D. Novel trajectory data publishing method under differential privacy [J]. Expert Systems with Applications, 2019, 138: 112791.
[8] HUA J, GAO Y, ZHONG S. Differentially private publication of general time-serial trajectory data[C]//2015 IEEE Conference on Computer Communications (INFOCOM). Hong Kong: IEEE, 2015: 549-557.
[9] LI M, ZHU L, ZHANG Z, et al. Achieving differential privacy of trajectory data publishing in participatory sensing [J]. Information Sciences, 2017, 400: 1-13.
[10] GENG Q, VISWANATH P. The optimal noise-adding mechanism in differential privacy [J]. IEEE Transactions on Information Theory, 2015, 62(2): 925-951.
[11] LI Y, YANG D, HU X. A differential privacy-based privacy-preserving data publishing algorithm for transit smart card data [J]. Transportation Research Part C:Emerging Technologies, 2020, 115: 102634.
[12] GURSOY M E, LIU L, TRUEX S, et al. Differentially private and utility preserving publication of trajectory data [J]. IEEE Transactions on Mobile Computing, 2018, 18(10): 2315-2329.
[13] NI T, QIAO M, CHEN Z, et al. Utility efficient differentially private K-means clustering based on cluster merging [J]. Neurocomputing, 2021, 424: 205-214.
[14] LU Z, SHEN H. Differentially private K-means clustering with convergence guarantee [J]. IEEE Transactions on Dependable and Secure Computing, 2020, 18(4): 1541-1552.
[15] LIU Q, YU J, HAN J, et al. Differentially private and utility-aware publication of trajectory data [J]. Expert Systems with Applications, 2021, 180: 115120.
[16] HAMALAINEN J, KARKKAINEN T, ROSSI T. Scalable initialization methods for large-scale clustering[EB/OL]. arXiv preprint arXiv: 2007.11937 (2020-07-23)[2022-11-01].https://doi.org/10.48550/arXiv.2007.11937.
[17] XU C, ZHU L, LIU Y, et al. DP-LTOD: differential privacy latent trajectory community discovering services over location-based social networks [J]. IEEE Transactions on Services Computing, 2018, 14(4): 1068-1083.
[18] 陈思, 付安民, 苏铓, 等. 基于差分隐私的轨迹隐私保护方案[J]. 通信学报, 2021, 42(9): 54-64.
CHEN S, FU A M, SU M, et al. Trajectory privacy protection scheme based on differential privacy [J]. Journal on Communications, 2021, 42(9): 54-64.
[19] ZHAO X, PI D, CHEN J. Novel trajectory privacy-preserving method based on clustering using differential privacy [J]. Expert Systems with Applications, 2020, 149: 113241.
[20] YUAN J, ZHENG Y, ZHANG C, et al. T-drive: driving directions based on taxi trajectories[C]// Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems. California: ACM, 2010: 99-108.
[1] Jin Yu-kai, Li Zhi-sheng, Ou Yao-chun, Zhang Hua-gang, Zeng Jiang-yi, Chen Bo-chao. Prediction and Comparative Study of PM2.5 Concentration Based on Multi-stage Clustering [J]. Journal of Guangdong University of Technology, 2023, 40(03): 17-24.
[2] Fan Juan, Deng Xiu-qin, Liu Yu-lan. A Spectral Clustering Algorithm Based on Fréchet Distance [J]. Journal of Guangdong University of Technology, 2023, 40(02): 39-44.
[3] Mo Zan, Fan Meng-ting, Liu Hong-wei, Yan Yang-fan. Market Structure of Product Asymmetric Competition Based on Online User Behavior [J]. Journal of Guangdong University of Technology, 2023, 40(02): 111-119.
[4] Yang Da-sen. DPLORE: A Location Recommendation Algorithm for Differential Privacy Protection [J]. Journal of Guangdong University of Technology, 2021, 38(01): 69-74.
[5] Fan Meng-ting, Liu Hong-wei, Gao Hong-ming, He Rui-chao. A Research on Competitive Product Market Structure of E-commerce Platform [J]. Journal of Guangdong University of Technology, 2019, 36(06): 32-37.
[6] He Qing-xiang, Zhang Wei. Application of Improved Clustering Algorithm in Terrorist Attacks [J]. Journal of Guangdong University of Technology, 2019, 36(04): 24-30.
[7] Zhang Wei, Mai Zhi-shen. A Research on Local Outlier Factor De-noising Method for Kernel Fuzzy Spectral Clustering [J]. Journal of Guangdong University of Technology, 2018, 35(06): 77-82.
[8] Wang Rong-rong, Fu Xiu-fen. An Improved mpts-HDBSCAN Algorithm [J]. Journal of Guangdong University of Technology, 2017, 34(03): 49-53.
[9] Chen Li, Cao Xi, Lin Jun-jie, Gao Hong-ming, Liu Fei-ya, Li Yan-yan. Prediction of Short-Term Load Based on Big Data Mining [J]. Journal of Guangdong University of Technology, 2017, 34(03): 105-109.
[10] Chen Ji-feng, Liu Guang-cong, Peng Cheng-ping. An Improved DV-Hop Localization Algorithm for Wireless Sensor Networks [J]. Journal of Guangdong University of Technology, 2017, 34(02): 80-85.
[11] SHEN Xiao-Min, LI Bao-Jun, SUN Xu, XU Wei-Chao. Large Scale Face Clustering Based on Convolutional Neural Network [J]. Journal of Guangdong University of Technology, 2016, 33(06): 77-84.
[12] TENG Shao-Hua, LIU Xiang. An E-CARGO Based Cluster Mechanism Research on WSN [J]. Journal of Guangdong University of Technology, 2015, 32(04): 92-98.
[13] WANG Bo, ZHONG Ying-Chun, CHEN Jun-Bin. Research on Speaker Recognition Based on Both AP and GMM [J]. Journal of Guangdong University of Technology, 2015, 32(04): 145-149.
[14] TENG Shao-Hua, WU Hao, LI Ri-Gui, ZHANG Wei, LIU Dong-Ning, LIANG Lu. The Application of the Adjustable Multitimes Clustering Algorithm in Telecom Data [J]. Journal of Guangdong University of Technology, 2014, 31(3): 1-7.
[15] JIANG Sheng-Yi, WANG Lian-Xi. Some Challenges in Clustering Analysis [J]. Journal of Guangdong University of Technology, 2014, 31(3): 32-38.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!