(C, K)(M)-Anonymity: A Model To Resist Sub-Trajectory Linkage Attacks

2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom)(2015)

引用 1|浏览2
暂无评分
摘要
(k, l)(m)-anonymity is an effective model to preserve privacy for trajectory data publishing. However, the model cannot prevent sensitive location disclosure on the condition that l is large. To solve the problem, this paper proposes a (c, k)(m)-anonymity model, which can prevent the disclosure of identity and sensitive location information. We also propose an algorithm to realize (c, k)(m)-anonymity. Experiments show that the proposed algorithm can generate anonymous trajectories with high data utility.
更多
查看译文
关键词
trajectory,(c, k)(m)-anonymity,sensitive location,preserve privacy
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要