Abstract
Nowadays, the traditional dummy trajectory generation algorithm used to protect users’ trajectory privacy usually uses statistical methods to build trajectory model. Because the human mobility model is a complex equation, it is difficult to use mathematical methods to model, so the established trajectory model can not consider the human mobility model which restricts the formation of trajectory. Therefore, traditional dummy trajectory generation algorithms can not defend against data mining attacks based on in-depth learning. In this paper, LSTM (Long Short-Term Memory) is used to design the real and dummy trajectory discriminator. Experiments show that data mining based on deep learning can eliminate more than 95% of the algorithm generated trajectories, and the error rate of real trajectory is less than 10%. We restrict the traditional dummy trajectory generation algorithm to human mobility model, and design a dummy trajectory generation strategy so that the generated trajectory can defend against multiple recognition attacks.
Keywords
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Krumm, J.: A survey of computational location privacy. Pers. Ubiquitous Comput. 13, 391–399 (2009). https://doi.org/10.1007/s00779-008-0212-5
Wernke, M., Skvortsov, P., Dürr, F., Rothermel, K.: A classification of location privacy attacks and approaches. Pers. Ubiquitous Comput. 18(1), 163–175 (2014). https://doi.org/10.1007/s00779-012-0633-z
Tang, M., Wu, Q., Zhang, G., He, L., Zhang, H.: A new scheme of LBS privacy protection. In: 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing, Beijing, pp. 1–6 (2009)
He, W.: Research on LBS privacy protection technology in mobile social networks. In: 2017 IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), Chongqing, pp. 73–76 (2017)
Xu, T., Cai, Y.: Feeling-based location privacy protection for location-based services. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 348–357 (2009). https://doi.org/10.1145/1653662.1653704
Xu, T., Cai, Y.: Exploring historical location data for anonymity preservation in location-based services. In: IEEE INFOCOM 2008 - The 27th Conference on Computer Communications, Phoenix, AZ, pp. 547–555 (2008)
Wang, Y., Xu, D., He, X., et al.: L2P2: location-aware location privacy protection for location-based services. In: 2012 Proceedings IEEE INFOCOM, Orlando, FL, pp. 1996–2004 (2012)
Kido, H., Yanagisawa, Y., Satoh, T.: An anonymous communication technique using dummies for location-based services. In: ICPS 2005. Proceedings. International Conference on Pervasive Services, 2005, Santorini, Greece, pp. 88–97 (2005)
Kido, H., Yanagisawa, Y., Satoh, T.: Protection of location privacy using dummies for location-based services. In: 21st International Conference on Data Engineering Workshops (ICDEW 2005), Tokyo, Japan, pp. 1248–1248 (2005)
Wu, X., Sun, G.: A novel dummy-based mechanism to protect privacy on trajectories. In: 2014 IEEE International Conference on Data Mining Workshop, Shenzhen, pp. 1120–1125 (2014)
Kato, R., Iwata, M., Hara, T., et al.: A dummy-based anonymization method based on user trajectory with pauses. In: Proceedings of the 20th International Conference on Advances in Geographic Information Systems (SIGSPATIAL 2012), pp. 249–258. ACM, New York (2012)
Niu, B., Li, Q., Zhu, X., et al.: Achieving k-anonymity in privacy-aware location-based services. In: IEEE INFOCOM 2014 - IEEE Conference on Computer Communications, Toronto, ON, pp. 754–762 (2014)
Pan, J., Liu, Y., Zhang, W.: Detection of dummy trajectories using convolutional neural networks. Secur. Commun. Netw. 2019, 12 (2019)
Acknowledgment
This work was partly supported by National Natural Science Foundation of China (61662016), Key projects of Guangxi Natural Science Foundation (2018JJD170004), and Fundamental Research Funds for the Central Universities (Program No. 201-510318070).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Pan, J., Yang, J., Liu, Y. (2019). Dummy Trajectory Generation Scheme Based on Deep Learning. In: Vaidya, J., Zhang, X., Li, J. (eds) Cyberspace Safety and Security. CSS 2019. Lecture Notes in Computer Science(), vol 11983. Springer, Cham. https://doi.org/10.1007/978-3-030-37352-8_45
Download citation
DOI: https://doi.org/10.1007/978-3-030-37352-8_45
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-37351-1
Online ISBN: 978-3-030-37352-8
eBook Packages: Computer ScienceComputer Science (R0)