{"title":"基于差分隐私k-means的轨迹数据保护","authors":"Qiyuan Xu, Z. Chen, Baochuan Fu, Xue-Jun Shao","doi":"10.23919/CCC50068.2020.9188564","DOIUrl":null,"url":null,"abstract":"Considering that the existing trajectory data protection methods will result in low data availability, this paper considers the characteristics of trajectory data. It proposes a trajectory data protection method that satisfies differential privacy. It not only protects the privacy of the user’s trajectory but also has certain data analyzability. First, with the introduction of the weighted-multi-point judgment method, the infection points in the trajectory are found by setting the threshold of the infection angle. Second, the density of each trajectory point is calculated so as to determine the initial clustering center point. In addition, the privacy protection of the trajectory data is processed with the use of an improved differential privacy k − means method, which improves the availability of the trajectory data on the premise of satisfying the differential privacy. Finally, some numerical experiments are carried out to verify the effectiveness of the method.","PeriodicalId":255872,"journal":{"name":"2020 39th Chinese Control Conference (CCC)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Trajectory Data Protection based on Differential Privacy k-means\",\"authors\":\"Qiyuan Xu, Z. Chen, Baochuan Fu, Xue-Jun Shao\",\"doi\":\"10.23919/CCC50068.2020.9188564\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Considering that the existing trajectory data protection methods will result in low data availability, this paper considers the characteristics of trajectory data. It proposes a trajectory data protection method that satisfies differential privacy. It not only protects the privacy of the user’s trajectory but also has certain data analyzability. First, with the introduction of the weighted-multi-point judgment method, the infection points in the trajectory are found by setting the threshold of the infection angle. Second, the density of each trajectory point is calculated so as to determine the initial clustering center point. In addition, the privacy protection of the trajectory data is processed with the use of an improved differential privacy k − means method, which improves the availability of the trajectory data on the premise of satisfying the differential privacy. Finally, some numerical experiments are carried out to verify the effectiveness of the method.\",\"PeriodicalId\":255872,\"journal\":{\"name\":\"2020 39th Chinese Control Conference (CCC)\",\"volume\":\"49 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 39th Chinese Control Conference (CCC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.23919/CCC50068.2020.9188564\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 39th Chinese Control Conference (CCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23919/CCC50068.2020.9188564","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Trajectory Data Protection based on Differential Privacy k-means
Considering that the existing trajectory data protection methods will result in low data availability, this paper considers the characteristics of trajectory data. It proposes a trajectory data protection method that satisfies differential privacy. It not only protects the privacy of the user’s trajectory but also has certain data analyzability. First, with the introduction of the weighted-multi-point judgment method, the infection points in the trajectory are found by setting the threshold of the infection angle. Second, the density of each trajectory point is calculated so as to determine the initial clustering center point. In addition, the privacy protection of the trajectory data is processed with the use of an improved differential privacy k − means method, which improves the availability of the trajectory data on the premise of satisfying the differential privacy. Finally, some numerical experiments are carried out to verify the effectiveness of the method.