检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:She Sun Shuai Ma Jing-He Song Wen-Hai Yue Xue-Lian Lin Tiejun Ma 孙设;马帅;宋景和;岳文海;林学练;马铁军(State Key Laboratory of Software Development Environment,School of Computer Science and Engineering Beihang University,Beijing 100191,China;Department of Decision Analytics and Risk,Southampton Business School,University of Southampton Southampton SO171BJ,U.K)
机构地区:[1]State Key Laboratory of Software Development Environment,School of Computer Science and Engineering Beihang University,Beijing 100191,China [2]Department of Decision Analytics and Risk,Southampton Business School,University of Southampton Southampton SO171BJ,U.K
出 处:《Journal of Computer Science & Technology》2022年第5期1026-1048,共23页计算机科学技术学报(英文版)
基 金:This work was partially supported by the National Natural Science Foundation of China under Grant Nos.61925203 and 62172024;Beijing Advanced Innovation Center for Future Blockchain and Privacy Computing。
摘 要:With the advancing of location-detection technologies and the increasing popularity of mobile phones and other location-aware devices,trajectory data is continuously growing.While large-scale trajectories provide opportunities for various applications,the locations in trajectories pose a threat to individual privacy.Recently,there has been an interesting debate on the reidentifiability of individuals in the Science magazine.The main finding of Sánchez et al.is exactly opposite to that of De Montjoye et al.,which raises the first question:"what is the true situation of the privacy preservation for trajectories in terms of reidentification?''Furthermore,it is known that anonymization typically causes a decline of data utility,and anonymization mechanisms need to consider the trade-off between privacy and utility.This raises the second question:"what is the true situation of the utility of anonymized trajectories?''To answer these two questions,we conduct a systematic experimental study,using three real-life trajectory datasets,five existing anonymization mechanisms(i.e.,identifier anonymization,grid-based anonymization,dummy trajectories,k-anonymity andε-differential privacy),and two practical applications(i.e.,travel time estimation and window range queries).Our findings reveal the true situation of the privacy preservation for trajectories in terms of reidentification and the true situation of the utility of anonymized trajectories,and essentially close the debate between De Montjoye et al.and Sánchez et al.To the best of our knowledge,this study is among the first systematic evaluation and analysis of anonymized trajectories on the individual privacy in terms of unicity and on the utility in terms of practical applications.
关 键 词:ANONYMIZATION PRIVACY reidentification TRAJECTORY UTILITY
分 类 号:TP31[自动化与计算机技术—计算机软件与理论]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.84