期刊文献+

基于敏感项集动态隐藏的用户隐私保护方法 被引量:4

User privacy protection method based on dynamic hiding of sensitive items
下载PDF
导出
摘要 时空k-匿名因其适应移动性环境以及实现更为简单方便等特点,是当前LBS(基于位置服务)领域中被使用最广泛的模型。由于LBS在线及动态的特性,使传统的数据变形或重构方法不足以对抗利用从大量时空k-匿名数据集挖掘到的关联规则的用户隐私攻击。针对以上问题提出了基于敏感项集动态隐藏的用户隐私保护方法(SIDH),感知敏感规则对应项集空间的正负边界,增量扩展原始快照查询匿名集数据,以敏感项集的动态隐藏净化敏感关联规则,最终实现用户隐私保护。通过对2 612辆出租车的GPS数据生成的匿名集进行敏感项集隐藏实验,结果表明,SIDH方法隐藏敏感项集的数量和速度明显高于传统匿名方法,并且不会新增敏感项集。因此SIDH方法更能有效应对匿名集敏感关联规则的推理攻击,副作用较小。 Recently,spatial-temporal k-anonymity has become a prominent approach among the field of LBS( location-based services) privacy protection. Analyzing numerous spatial-temporal k-anonymity datasets is beneficial for lots of LBS applications,but it will cause an adversary to bring inference attacks which are not able to be handled by traditional methods of sensitive knowledge hiding. The reason is that traditional anti-attack methods can only solve the problems of privacy protection in offline and static environments,but do not meet privacy demands of online and dynamic LBS applications. To overcome these challenges,this paper presented a method called SIDH. The detailed procedure contained three phases:a) offline mined frequent items of original anonymous datasets and computed the boundaries of items;b) online perceived the boundaries and avoided negative boundaries based on the designed principles;c) incrementally expanded snapshot anonymous sets and dynamically hided sensitive items to purify association rules. Finally,the conducted experiments on anonymous sets generated by GPS data of 2 612 taxis demonstrate that SIDH can realize faster hiding of sensitive items than traditional methods,and effectively deal with inference attacks on user privacy based on sensitive rules mined from anonymous datasets.
出处 《计算机应用研究》 CSCD 北大核心 2017年第12期3740-3744,共5页 Application Research of Computers
基金 国家自然科学基金资助项目(41201465) 江苏省自然科学基金资助项目(BK2012439) 江苏省社会发展项目(BE2016774)
关键词 隐私保护 K-匿名 敏感项集 动态隐藏 privacy protection k-anonymity sensitive items dynamic hiding
  • 相关文献

参考文献8

二级参考文献162

  • 1钟珞,张开松,李三得,夏红霞.Web使用挖掘研究及实现[J].微机发展,2005,15(1):33-35. 被引量:8
  • 2李清峰,杨路明,张晓峰.关联规则中最大频繁项目集的研究[J].计算机应用研究,2005,22(1):93-95. 被引量:3
  • 3张继福,赵旭俊.基于关联规则的恒星光谱数据相关性分析[J].高技术通讯,2006,16(6):575-579. 被引量:1
  • 4Witten I H, Frank E. Data Mining Practical Machine Learning Tools and Techniques with JAVA Implementations[M].Beijing:China Machine Press, 2003.
  • 5JIAWEI HAN, MICHELINE KAMBER. Data mining concepts and techniques, higher Education Press[ M ]. Morgran Kaufmann Publishers, 2001.
  • 6HYUNYOON YUN A, DANSHIM HA B, BUHYUN HWANG A, KEUN HO RYU C. Mining association rules on significant rare data using relative support [ J ]. The Journal of Systems and Software , 2003, (67) :181-191.
  • 7ZHONG N, YAO Y Y,OHSHIMA M. Peculiarity Oriented Multi-Database Mining[ J]. IEEE Transactions on Knowledge and Data Engineering, 2003,15 (4) :952-960.
  • 8ALl S, TORABI T, ALl H. Ix)cation aware business process deployment[A]. Proceedings of ICCSA(4)[C]. 2006. 217-225.
  • 9BALDAUF M, DUSTDAR S, ROSENBERG F. A survey on context aware systems[A]. Proceedings of IJAHUC[C]. 2007. 263-277.
  • 10KULIK L. Privacy for real-time location-based services[A]. Proceedings of SIGSPATIAL Special[C]. 2009. 9-14.

共引文献249

同被引文献132

引证文献4

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部