Synthetic Privacy-Preserving Trajectories With Semantic-Aware Dummies for Location-Based Services

IF 5.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS
Haojun Huang;Hao Sun;Weimin Wu;Chen Wang;Wuwu Liu;Wang Miao;Geyong Min
{"title":"Synthetic Privacy-Preserving Trajectories With Semantic-Aware Dummies for Location-Based Services","authors":"Haojun Huang;Hao Sun;Weimin Wu;Chen Wang;Wuwu Liu;Wang Miao;Geyong Min","doi":"10.1109/TSC.2025.3556642","DOIUrl":null,"url":null,"abstract":"Trajectory synthesis with a series of fake locations has been deemed as a promising obfuscation technology to preserve the individual privacy of users in Location-Based Services (LBSs). However, a number of previous approaches fail to take into consideration the geographic distance and motion direction of the real locations to synthesize trajectories. As a result, most of them always cannot represent the statistical characteristics of real trajectories in a privacy-preserving manner, and thus suffer from various attacks through data analysis. To tackle this issue, this paper presents SPSD, a novel privacy-preserving trajectory synthesis approach with a <inline-formula><tex-math>$k$</tex-math></inline-formula>-anonymous guarantee, through extracting the semantic, geographic and directional similarity of locations from the real trajectories to create plausible trajectories. SPSD first classifies all historical trajectory data into a series of sets for location identity, by introducing the visiting time and visiting duration, which can clearly represent the semantic information of locations. Then, <inline-formula><tex-math>$ 4k$</tex-math></inline-formula> locations and <inline-formula><tex-math>$ 2k$</tex-math></inline-formula> of <inline-formula><tex-math>$ 4k$</tex-math></inline-formula> ones have been selected from each set to act as the initial disguises of each corresponding real location, with quantitative semantic and geographic similarities, respectively. In order to find enough fake locations for each real location in less time, the candidate locations have been narrowed down to <inline-formula><tex-math>$k$</tex-math></inline-formula> in direction recovery through step-by-step screening, with the <inline-formula><tex-math>$k$</tex-math></inline-formula>-anonymous property. Experiment results built on the real-world trajectory datasets indicate that SPSD has outperformed the previous approaches in terms of semantic similarity, directional accuracy and security resistance to synthesize privacy-preserving trajectories at the tolerable time cost.","PeriodicalId":13255,"journal":{"name":"IEEE Transactions on Services Computing","volume":"18 3","pages":"1811-1824"},"PeriodicalIF":5.8000,"publicationDate":"2025-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Services Computing","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10947488/","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

Trajectory synthesis with a series of fake locations has been deemed as a promising obfuscation technology to preserve the individual privacy of users in Location-Based Services (LBSs). However, a number of previous approaches fail to take into consideration the geographic distance and motion direction of the real locations to synthesize trajectories. As a result, most of them always cannot represent the statistical characteristics of real trajectories in a privacy-preserving manner, and thus suffer from various attacks through data analysis. To tackle this issue, this paper presents SPSD, a novel privacy-preserving trajectory synthesis approach with a $k$-anonymous guarantee, through extracting the semantic, geographic and directional similarity of locations from the real trajectories to create plausible trajectories. SPSD first classifies all historical trajectory data into a series of sets for location identity, by introducing the visiting time and visiting duration, which can clearly represent the semantic information of locations. Then, $ 4k$ locations and $ 2k$ of $ 4k$ ones have been selected from each set to act as the initial disguises of each corresponding real location, with quantitative semantic and geographic similarities, respectively. In order to find enough fake locations for each real location in less time, the candidate locations have been narrowed down to $k$ in direction recovery through step-by-step screening, with the $k$-anonymous property. Experiment results built on the real-world trajectory datasets indicate that SPSD has outperformed the previous approaches in terms of semantic similarity, directional accuracy and security resistance to synthesize privacy-preserving trajectories at the tolerable time cost.
基于位置服务的具有语义感知假人的合成隐私保护轨迹
在基于位置的服务(lbs)中,利用一系列假位置进行轨迹合成被认为是一种很有前途的混淆技术,可以保护用户的个人隐私。然而,许多先前的方法没有考虑真实位置的地理距离和运动方向来合成轨迹。因此,它们中的大多数往往不能以保护隐私的方式表示真实轨迹的统计特征,从而在数据分析中遭受各种攻击。为了解决这一问题,本文提出了一种新的具有$k$匿名保证的隐私保护轨迹合成方法SPSD,该方法通过从真实轨迹中提取位置的语义、地理和方向相似性来创建可信轨迹。SPSD首先将所有历史轨迹数据分类为一系列的位置识别集,通过引入访问时间和访问持续时间,可以清晰地表示位置的语义信息。然后,从每一组$ 4k$位置和$ 2k$ 4k$位置中分别选择$ 4k$位置作为每个对应真实位置的初始伪装,分别具有定量语义和地理相似性。为了在更短的时间内为每个真实位置找到足够的假位置,通过逐步筛选,候选位置在方向恢复中被缩小到$k$,并具有$k$-匿名属性。在真实轨迹数据集上的实验结果表明,SPSD在语义相似度、方向准确性和抗安全性方面都优于以往的方法,在可容忍的时间成本下合成了保护隐私的轨迹。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
IEEE Transactions on Services Computing
IEEE Transactions on Services Computing COMPUTER SCIENCE, INFORMATION SYSTEMS-COMPUTER SCIENCE, SOFTWARE ENGINEERING
CiteScore
11.50
自引率
6.20%
发文量
278
审稿时长
>12 weeks
期刊介绍: IEEE Transactions on Services Computing encompasses the computing and software aspects of the science and technology of services innovation research and development. It places emphasis on algorithmic, mathematical, statistical, and computational methods central to services computing. Topics covered include Service Oriented Architecture, Web Services, Business Process Integration, Solution Performance Management, and Services Operations and Management. The transactions address mathematical foundations, security, privacy, agreement, contract, discovery, negotiation, collaboration, and quality of service for web services. It also covers areas like composite web service creation, business and scientific applications, standards, utility models, business process modeling, integration, collaboration, and more in the realm of Services Computing.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信