Skip to main content

2019 | OriginalPaper | Buchkapitel

Dummy Trajectory Generation Scheme Based on Deep Learning

verfasst von : Jiaji Pan, Jingkang Yang, Yining Liu

Erschienen in: Cyberspace Safety and Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Nowadays, the traditional dummy trajectory generation algorithm used to protect users’ trajectory privacy usually uses statistical methods to build trajectory model. Because the human mobility model is a complex equation, it is difficult to use mathematical methods to model, so the established trajectory model can not consider the human mobility model which restricts the formation of trajectory. Therefore, traditional dummy trajectory generation algorithms can not defend against data mining attacks based on in-depth learning. In this paper, LSTM (Long Short-Term Memory) is used to design the real and dummy trajectory discriminator. Experiments show that data mining based on deep learning can eliminate more than 95% of the algorithm generated trajectories, and the error rate of real trajectory is less than 10%. We restrict the traditional dummy trajectory generation algorithm to human mobility model, and design a dummy trajectory generation strategy so that the generated trajectory can defend against multiple recognition attacks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
3.
Zurück zum Zitat Tang, M., Wu, Q., Zhang, G., He, L., Zhang, H.: A new scheme of LBS privacy protection. In: 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing, Beijing, pp. 1–6 (2009) Tang, M., Wu, Q., Zhang, G., He, L., Zhang, H.: A new scheme of LBS privacy protection. In: 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing, Beijing, pp. 1–6 (2009)
4.
Zurück zum Zitat He, W.: Research on LBS privacy protection technology in mobile social networks. In: 2017 IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), Chongqing, pp. 73–76 (2017) He, W.: Research on LBS privacy protection technology in mobile social networks. In: 2017 IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), Chongqing, pp. 73–76 (2017)
6.
Zurück zum Zitat Xu, T., Cai, Y.: Exploring historical location data for anonymity preservation in location-based services. In: IEEE INFOCOM 2008 - The 27th Conference on Computer Communications, Phoenix, AZ, pp. 547–555 (2008) Xu, T., Cai, Y.: Exploring historical location data for anonymity preservation in location-based services. In: IEEE INFOCOM 2008 - The 27th Conference on Computer Communications, Phoenix, AZ, pp. 547–555 (2008)
7.
Zurück zum Zitat Wang, Y., Xu, D., He, X., et al.: L2P2: location-aware location privacy protection for location-based services. In: 2012 Proceedings IEEE INFOCOM, Orlando, FL, pp. 1996–2004 (2012) Wang, Y., Xu, D., He, X., et al.: L2P2: location-aware location privacy protection for location-based services. In: 2012 Proceedings IEEE INFOCOM, Orlando, FL, pp. 1996–2004 (2012)
8.
Zurück zum Zitat Kido, H., Yanagisawa, Y., Satoh, T.: An anonymous communication technique using dummies for location-based services. In: ICPS 2005. Proceedings. International Conference on Pervasive Services, 2005, Santorini, Greece, pp. 88–97 (2005) Kido, H., Yanagisawa, Y., Satoh, T.: An anonymous communication technique using dummies for location-based services. In: ICPS 2005. Proceedings. International Conference on Pervasive Services, 2005, Santorini, Greece, pp. 88–97 (2005)
9.
Zurück zum Zitat Kido, H., Yanagisawa, Y., Satoh, T.: Protection of location privacy using dummies for location-based services. In: 21st International Conference on Data Engineering Workshops (ICDEW 2005), Tokyo, Japan, pp. 1248–1248 (2005) Kido, H., Yanagisawa, Y., Satoh, T.: Protection of location privacy using dummies for location-based services. In: 21st International Conference on Data Engineering Workshops (ICDEW 2005), Tokyo, Japan, pp. 1248–1248 (2005)
10.
Zurück zum Zitat Wu, X., Sun, G.: A novel dummy-based mechanism to protect privacy on trajectories. In: 2014 IEEE International Conference on Data Mining Workshop, Shenzhen, pp. 1120–1125 (2014) Wu, X., Sun, G.: A novel dummy-based mechanism to protect privacy on trajectories. In: 2014 IEEE International Conference on Data Mining Workshop, Shenzhen, pp. 1120–1125 (2014)
11.
Zurück zum Zitat Kato, R., Iwata, M., Hara, T., et al.: A dummy-based anonymization method based on user trajectory with pauses. In: Proceedings of the 20th International Conference on Advances in Geographic Information Systems (SIGSPATIAL 2012), pp. 249–258. ACM, New York (2012) Kato, R., Iwata, M., Hara, T., et al.: A dummy-based anonymization method based on user trajectory with pauses. In: Proceedings of the 20th International Conference on Advances in Geographic Information Systems (SIGSPATIAL 2012), pp. 249–258. ACM, New York (2012)
12.
Zurück zum Zitat Niu, B., Li, Q., Zhu, X., et al.: Achieving k-anonymity in privacy-aware location-based services. In: IEEE INFOCOM 2014 - IEEE Conference on Computer Communications, Toronto, ON, pp. 754–762 (2014) Niu, B., Li, Q., Zhu, X., et al.: Achieving k-anonymity in privacy-aware location-based services. In: IEEE INFOCOM 2014 - IEEE Conference on Computer Communications, Toronto, ON, pp. 754–762 (2014)
13.
Zurück zum Zitat Pan, J., Liu, Y., Zhang, W.: Detection of dummy trajectories using convolutional neural networks. Secur. Commun. Netw. 2019, 12 (2019) Pan, J., Liu, Y., Zhang, W.: Detection of dummy trajectories using convolutional neural networks. Secur. Commun. Netw. 2019, 12 (2019)
Metadaten
Titel
Dummy Trajectory Generation Scheme Based on Deep Learning
verfasst von
Jiaji Pan
Jingkang Yang
Yining Liu
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-37352-8_45