Xianliang He , Junyi Li , Yaping Lin , Qiao Hu , Xiehua Li
{"title":"TDSF: Trajectory-preserving method of dual-strategy fusion with differential privacy in LBS","authors":"Xianliang He , Junyi Li , Yaping Lin , Qiao Hu , Xiehua Li","doi":"10.1016/j.cose.2025.104697","DOIUrl":null,"url":null,"abstract":"<div><div>When the public utilizes location-based services (LBS), a large amount of trajectory data is generated, and their location information is constantly exposed. However, providing trajectories to LBS without additional protection may result in the leakage of location privacy and correlation privacy in the trajectory. Most current methods only protect the location privacy of trajectories by adjusting the allocation of privacy budgets, without combining multiple strategies to protect location privacy and correlation privacy. These methods also struggle to balance data availability and privacy for trajectories. To address the above challenges, we propose a trajectory-preserving method of dual-strategy fusion with differential privacy (TDSF). Specifically, one strategy is used to protect the correlation privacy between sensitive locations, and the other is used to protect the non-sensitive locations. We use the trained transfer correlation matrix to extract sensitive locations in a trajectory that require correlation protection. The remaining locations introduce less noise as they involve minimal privacy disclosure, thus maintaining data availability. Finally, we also designed a privacy budget allocation strategy that is suitable for this dual-strategy fusion scenario. Strict security analysis shows that the mechanism we propose can well protect the location and correlation privacy of the trajectory. The experimental results on real data sets further demonstrate the advantages of this mechanism in data availability and confidentiality.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"159 ","pages":"Article 104697"},"PeriodicalIF":5.4000,"publicationDate":"2025-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Security","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0167404825003864","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
When the public utilizes location-based services (LBS), a large amount of trajectory data is generated, and their location information is constantly exposed. However, providing trajectories to LBS without additional protection may result in the leakage of location privacy and correlation privacy in the trajectory. Most current methods only protect the location privacy of trajectories by adjusting the allocation of privacy budgets, without combining multiple strategies to protect location privacy and correlation privacy. These methods also struggle to balance data availability and privacy for trajectories. To address the above challenges, we propose a trajectory-preserving method of dual-strategy fusion with differential privacy (TDSF). Specifically, one strategy is used to protect the correlation privacy between sensitive locations, and the other is used to protect the non-sensitive locations. We use the trained transfer correlation matrix to extract sensitive locations in a trajectory that require correlation protection. The remaining locations introduce less noise as they involve minimal privacy disclosure, thus maintaining data availability. Finally, we also designed a privacy budget allocation strategy that is suitable for this dual-strategy fusion scenario. Strict security analysis shows that the mechanism we propose can well protect the location and correlation privacy of the trajectory. The experimental results on real data sets further demonstrate the advantages of this mechanism in data availability and confidentiality.
期刊介绍:
Computers & Security is the most respected technical journal in the IT security field. With its high-profile editorial board and informative regular features and columns, the journal is essential reading for IT security professionals around the world.
Computers & Security provides you with a unique blend of leading edge research and sound practical management advice. It is aimed at the professional involved with computer security, audit, control and data integrity in all sectors - industry, commerce and academia. Recognized worldwide as THE primary source of reference for applied research and technical expertise it is your first step to fully secure systems.