{"title":"一种个性化、语义感知的弹道保护方法","authors":"Yong-Yi Chen, Yu-Ling Hsueh","doi":"10.1016/j.cose.2025.104608","DOIUrl":null,"url":null,"abstract":"<div><div>State-of-the-art privacy protection research often aims to reduce the computational costs required of entire trajectories by typically omitting less significant location information. Considering locations where users frequently stay for a longer duration or frequently visit as stay points, techniques such as location generalization, location deception, location perturbation, <span><math><mi>k</mi></math></span>-anonymity, cryptography, and the involvement of a trusted third party (TTP for short) are employed to achieve privacy protection at these stay points. Semantic-aware trajectory privacy methods typically either categorize semantic values or use user role differences in locations to establish LBS queries with similar or different semantic types of point of interest (POI for short) to protect users’ semantic privacy. However, techniques such as generalization, deception, and perturbation often yield less accurate results. The <span><math><mi>k</mi></math></span>-anonymity technique requires handling numerous service requests, cryptography entails significant computational costs, and TTP might become a target for attacks leading to severe privacy breaches. Identifying stay points or user role differences can only be done after the trajectory has been completely established. Classifying semantic values cannot effectively achieve the semantic privacy users require. To address these shortcomings and establish spatial–temporal correlations between trajectories and semantic values, we propose a novel personalized semantic-aware obfuscation scheme (PSAS for short) combined with differential privacy. PSAS utilizes Markov chains to establish spatial–temporal correlations and to predict user movement points to reduce query frequency. This study introduces a novel graph structure to represent semantic relationships, and calculates semantic importance using term frequency-inverse document frequency (TF-IDF for short). By adopting differential privacy, trajectories are added with noise based on different location privacy budgets to protect users’ privacy of locations, POIs, and trajectories. Experimental results demonstrate that PSAS effectively and comprehensively protects trajectory data and semantic privacy without sacrificing quality of service (QoS for short).</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"157 ","pages":"Article 104608"},"PeriodicalIF":5.4000,"publicationDate":"2025-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A personalized and semantic-aware approach for trajectory protection\",\"authors\":\"Yong-Yi Chen, Yu-Ling Hsueh\",\"doi\":\"10.1016/j.cose.2025.104608\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>State-of-the-art privacy protection research often aims to reduce the computational costs required of entire trajectories by typically omitting less significant location information. Considering locations where users frequently stay for a longer duration or frequently visit as stay points, techniques such as location generalization, location deception, location perturbation, <span><math><mi>k</mi></math></span>-anonymity, cryptography, and the involvement of a trusted third party (TTP for short) are employed to achieve privacy protection at these stay points. Semantic-aware trajectory privacy methods typically either categorize semantic values or use user role differences in locations to establish LBS queries with similar or different semantic types of point of interest (POI for short) to protect users’ semantic privacy. However, techniques such as generalization, deception, and perturbation often yield less accurate results. The <span><math><mi>k</mi></math></span>-anonymity technique requires handling numerous service requests, cryptography entails significant computational costs, and TTP might become a target for attacks leading to severe privacy breaches. Identifying stay points or user role differences can only be done after the trajectory has been completely established. Classifying semantic values cannot effectively achieve the semantic privacy users require. To address these shortcomings and establish spatial–temporal correlations between trajectories and semantic values, we propose a novel personalized semantic-aware obfuscation scheme (PSAS for short) combined with differential privacy. PSAS utilizes Markov chains to establish spatial–temporal correlations and to predict user movement points to reduce query frequency. This study introduces a novel graph structure to represent semantic relationships, and calculates semantic importance using term frequency-inverse document frequency (TF-IDF for short). By adopting differential privacy, trajectories are added with noise based on different location privacy budgets to protect users’ privacy of locations, POIs, and trajectories. Experimental results demonstrate that PSAS effectively and comprehensively protects trajectory data and semantic privacy without sacrificing quality of service (QoS for short).</div></div>\",\"PeriodicalId\":51004,\"journal\":{\"name\":\"Computers & Security\",\"volume\":\"157 \",\"pages\":\"Article 104608\"},\"PeriodicalIF\":5.4000,\"publicationDate\":\"2025-08-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computers & Security\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0167404825002974\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Security","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0167404825002974","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
A personalized and semantic-aware approach for trajectory protection
State-of-the-art privacy protection research often aims to reduce the computational costs required of entire trajectories by typically omitting less significant location information. Considering locations where users frequently stay for a longer duration or frequently visit as stay points, techniques such as location generalization, location deception, location perturbation, -anonymity, cryptography, and the involvement of a trusted third party (TTP for short) are employed to achieve privacy protection at these stay points. Semantic-aware trajectory privacy methods typically either categorize semantic values or use user role differences in locations to establish LBS queries with similar or different semantic types of point of interest (POI for short) to protect users’ semantic privacy. However, techniques such as generalization, deception, and perturbation often yield less accurate results. The -anonymity technique requires handling numerous service requests, cryptography entails significant computational costs, and TTP might become a target for attacks leading to severe privacy breaches. Identifying stay points or user role differences can only be done after the trajectory has been completely established. Classifying semantic values cannot effectively achieve the semantic privacy users require. To address these shortcomings and establish spatial–temporal correlations between trajectories and semantic values, we propose a novel personalized semantic-aware obfuscation scheme (PSAS for short) combined with differential privacy. PSAS utilizes Markov chains to establish spatial–temporal correlations and to predict user movement points to reduce query frequency. This study introduces a novel graph structure to represent semantic relationships, and calculates semantic importance using term frequency-inverse document frequency (TF-IDF for short). By adopting differential privacy, trajectories are added with noise based on different location privacy budgets to protect users’ privacy of locations, POIs, and trajectories. Experimental results demonstrate that PSAS effectively and comprehensively protects trajectory data and semantic privacy without sacrificing quality of service (QoS for short).
期刊介绍:
Computers & Security is the most respected technical journal in the IT security field. With its high-profile editorial board and informative regular features and columns, the journal is essential reading for IT security professionals around the world.
Computers & Security provides you with a unique blend of leading edge research and sound practical management advice. It is aimed at the professional involved with computer security, audit, control and data integrity in all sectors - industry, commerce and academia. Recognized worldwide as THE primary source of reference for applied research and technical expertise it is your first step to fully secure systems.