Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Sensitive label track data publishing method using graph difference privacy model

A trajectory data and differential privacy technology, applied in the field of information security, can solve problems such as user personal information privacy leakage, and achieve the effect of solving privacy leakage, ensuring usability, and good user service

Active Publication Date: 2020-06-30
DALIAN UNIV OF TECH
View PDF1 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Even after correct and simple anonymous user identity, the release of trajectory data will still cause privacy leakage of user personal information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sensitive label track data publishing method using graph difference privacy model
  • Sensitive label track data publishing method using graph difference privacy model
  • Sensitive label track data publishing method using graph difference privacy model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to express the purpose, technical solutions and advantages of the present invention more clearly, the present invention will be further described in detail through the following examples and accompanying drawings.

[0036]A sensitive label trajectory data publishing method based on the graph differential privacy model, including trajectory clustering and generalization, graph-based spatiotemporal point differential privacy, and three-stage processing of publishing trajectory data with privacy labels;

[0037] first stage, see figure 2 , the specific operation process of trajectory clustering and generalization is as follows:

[0038] Step 1. Obtain the original trajectory data set D.

[0039] Step 2. Use the DBSCAN algorithm to find candidate location areas containing hotspot locations and outliers. A hotspot location is an area where spatio-temporal points are relatively dense, such as buildings (shopping malls, hospitals, etc.) or road intersections and ot...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of information security, and relates to a sensitive label track data publishing method based on a graph differential privacy model. The method comprises the steps: clustering and generalizing tracks, performing graph-based time-space point differential privacy and publishing track data with privacy labels. In the first stage, firstly, all space-time points are divided into hot spot areas and abnormal values, and then the center positions of the hot spot areas are used for generalizing each specific position in the trajectory data; in the second stage, a noise map is established, hot spots, abnormal values and privacy tags are mapped to a directed weighted graph, different privacy budgets are set for different vertexes in order to control the size of the added noise and protect the availability of the data as much as possible, and then Laplace noise is added to achieve differential privacy; in a publishing stage, each record in the generalized trajectory data set is restored, the overhead point is selected, the trajectory data is generated according to the heuristic expression, anonymous data is obtained, and high availability of the datais ensured.

Description

technical field [0001] The invention relates to a method for publishing sensitive tag trajectory data based on a graph differential privacy model, and belongs to the technical field of information security. Background technique [0002] With the explosive growth of location-aware devices and wireless communications, the spatio-temporal trajectories of moving objects can be easily collected and analyzed. There are more and more applications that rely on these trajectory data to provide users with rich services in daily life, such as location-based social networks, location-based services, and mobile health. In such data-driven applications, a trajectory often consists of a label and a series of spatiotemporal points. The source of trajectory data is very rich, such as various GPS devices, mobile devices such as mobile phones, base stations and even locations shared by social networks, etc. With the development of data acquisition equipment and the accumulation of trajectory...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
CPCG06F21/6254
Inventor 姚琳陈振宇孙云栋吴国伟
Owner DALIAN UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products