| Literature DB >> 35978018 |
Kun Qian1, Xiaohui Li2.
Abstract
During the data set input or output, or the data set itself adds noise to enable data distortion to effectively reduce the risk of user privacy leakage. However, in the conventional method, the added noise may cause data distortion, thereby appealed against it. However, the amount of noise is too small and cannot meet the effect of privacy protection. Therefore, we propose a LBS user location privacy protection scheme based on trajectory similarity (DPTS). With double privacy protection without reducing the efficiency of algorithms, it does not cause data distortion to provide more reliable privacy protection. The main contributions of this article include: (1) In the process of collecting and publishing the location data, introduce into the privacy protection method, (2) The differential privacy algorithm based on the trajectory prefix tree is superimposed on the basis of the false position replacement algorithm based on the trajectory similarity, (3) Propose LBS-based Difference Privacy Protection Algorithm. In the algorithm, We reach the purpose of protecting user personal privacy by replace the original trajectory into a fake track trace that is the lowest degree of similarity in the interval. Then establish a prefix tree and add noise to the positional frequency. It is in order to further protect the sensitive location information, double protection in the trajectory data set, and the degree of privacy protection is improved. Simulation experiment results show that the proposed algorithm is effective. The algorithm can suppress the distortion rate of data while improving the amount of noise, and in improving the algorithm operation efficiency, it reduces the risk of leakage of sensitive position information.Entities:
Mesh:
Year: 2022 PMID: 35978018 PMCID: PMC9386014 DOI: 10.1038/s41598-022-18268-8
Source DB: PubMed Journal: Sci Rep ISSN: 2045-2322 Impact factor: 4.996
System parameters and meaning.
| Parameter | Meaning |
|---|---|
| t | time |
| (lati,lngi) | The latitude and latitude of the i query location |
| T | Trajectory |
| TU | Primitive trajectory collection |
| TC | Candidate trajectory collection |
| Candidate and primitive position relative to the movement of the movement trajectory of the initial time of | |
| dis (TU,TC) | The Euclidean distance between the candidate and the original position |
| Pi | Position access frequency |
| Fake (LIDi)· | Fake(LIDi)’s weights |
| σ2 | Trajectory similarity |
| H(X) | Location information entropy |
| P(X) | Output probability function |
| Δ | Global sensitivity of function |
| Laplace noise | |
| Privacy budget |
Figure 1Position trie tree.
Figure 2The algorithm flowchart.
Location data pre-processing table.
| Numbering | Storage unit information | Frequently |
|---|---|---|
| 1 | Shop | 13 |
| 2 | Community | 34 |
| 3 | Medical place | 56 |
| 4 | Stadium | 8 |
| 5 | Mall | 26 |
| 6 | Office building | 22 |
| … | … | … |
Location transaction database.
| Identifier | Position set | Frequently |
|---|---|---|
| L1–L18 | {1} | 13 |
| L19–L29 | {2} | 34 |
| L30–L37 | {3} | 56 |
| L38–L42 | {4} | 8 |
| L43–L47 | {5} | 26 |
| L48–L70 | {6} | 22 |
| L71–L84 | {1, 2} | 5 |
| L85–L89 | {1, 3} | 3 |
| L90–L93 | {1, 4} | 2 |
| … | … | … |
Experimental parameters configuration table.
| Parameter | Defaults | Ranges |
|---|---|---|
| 7 | [2, 10] | |
| 0.5 | ||
| 0.02 | [0.005, 0.4] | |
| Historical location | 27,898 | |
| User number | 22,567 | |
| History sign-in record | 1,467,543 |
Figure 3K value on algorithm runtime.
Figure 4Location entropy.
Figure 5K value on data loss rate.
Figure 6ε impact on error.
Figure 7Before running the DPT algorithm.
Figure 8After running the DPT algorithm.