[1]陈泽伟[],张海涛[]. LBS连续查询的匿名序列规则挖掘方法研究[J].计算机技术与发展,2017,27(06):124-129.
 CHEN Ze-wei[],ZHANG Hai-tao[]. Investigation on Anonymous Sequential Rules Mining Method with LBS Continuous Query[J].,2017,27(06):124-129.
点击复制

 LBS连续查询的匿名序列规则挖掘方法研究()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
27
期数:
2017年06期
页码:
124-129
栏目:
安全与防范
出版日期:
2017-06-10

文章信息/Info

Title:
 Investigation on Anonymous Sequential Rules Mining Method with LBS Continuous Query
文章编号:
1673-629X(2017)06-0124-06
作者:
 陈泽伟[1] 张海涛[2]
 1.南京邮电大学 通信与信息工程学院;2.南京邮电大学 地理与生物信息学院
Author(s):
 CHEN Ze-wei[1] ZHANG Hai-tao[2]
关键词:
 位置服务位置隐私保护时空K-匿名序列规则
Keywords:
 location based servicelocation privacy protectionspatial temporal K-anonymitysequence rules
分类号:
TP301
文献标志码:
A
摘要:
 随着LBS的深入发展与广泛应用,隐私保护成为LBS深入发展中亟待解决的关键技术问题.时空K-匿名是LBS隐私保护的主要类型,当前研究尚未涉及匿名集数据的可用性和隐私保护的安全性.针对上述问题,基于匿名集数据具有时空序列的特性,提出了一种基于双向不可逆扩展的匿名集序列规则挖掘算法.该算法在扫描序列数据库的过程中,对相应的项集进行位置标记,从而保证了对序列数据库一次扫描即能挖掘出用户移动的序列规则.通过对频繁模式进行扩展并发现用户的移动规律、行为模式,对所提出的算法进行了验证实验及其结果分析.实验结果表明,所提出算法的挖掘结果会涉及到敏感区域,如军事领域等,因此对于实现LBS位置隐私保护具有重要的实践意义,对于丰富隐私保护数据挖掘领域的研究具有一定的理论价值.
Abstract:
 With the deep development and wide use of Location-Based Services (LBS),privacy protection has become the key technology to be solved urgently in LBS.The temporal and spatial K-anonymity is the main type of LBS privacy protection,in which the availability of anonymous datasets and the security of privacy protection have not been involved so far.Aimed at this problem and found on a characteristic of spatial-temporal sequences in anonymous dataset,a mining algorithm of anonymity dataset sequence rules has been presented with bidirectional irreversible expansion,which has marked the position of item sets in the process of scanning the sequence database to guarantee mining mobile sequential rules at just one scan of sequence database.Experiments of data mining and result validation have been conducted.Result mined by the algorithm covers sensitive regions like military possessions,which has been proved to have important practical value for realizing LBS privacy protection and certain theoretical value for enriching the study in privacy protection data mining area.

相似文献/References:

[1]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(06):1.
[2]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(06):5.
[3]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(06):13.
[4]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(06):21.
[5]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(06):25.
[6]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(06):29.
[7]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(06):34.
[8]尚福华,李想,巩淼. 基于模糊框架-产生式知识表示及推理研究[J].计算机技术与发展,2014,24(07):38.
 SHANG Fu-hua,LI Xiang,GONG Miao. Research on Knowledge Representation and Inference Based on Fuzzy Framework-production[J].,2014,24(06):38.
[9]叶偲,李良福,肖樟树. 一种去除运动目标重影的图像镶嵌方法研究[J].计算机技术与发展,2014,24(07):43.
 YE Si,LI Liang-fu,XIAO Zhang-shu. Research of an Image Mosaic Method for Removing Ghost of Moving Targets[J].,2014,24(06):43.
[10]余松平[][],蔡志平[],吴建进[],等. GSM-R信令监测选择录音系统设计与实现[J].计算机技术与发展,2014,24(07):47.
 YU Song-ping[][],CAI Zhi-ping[] WU Jian-jin[],GU Feng-zhi[]. Design and Implementation of an Optional Voice Recording System Based on GSM-R Signaling Monitoring[J].,2014,24(06):47.
[11]方巍,单滢滢,张俊杰. 基于Android的云考勤系统设计与实现[J].计算机技术与发展,2016,26(09):61.
 FANG Wei,SHAN Ying-ying,ZHANG Jun-jie. Design and Implementation of Cloud Attendance System Based on Android[J].,2016,26(06):61.
[12]邰淳亮[],谢怡[],孙知信[][]. 一种基于用户兴趣的位置服务推荐算法[J].计算机技术与发展,2017,27(09):64.
 TAI Chun-liang[],XIE Yi[],SUN Zhi-xin[][]. A Recommendation Algorithm of Location Service Based on User Interest[J].,2017,27(06):64.
[13]张笑非,刘庆华,刘镇. 基于小基站的校园位置服务系统设计[J].计算机技术与发展,2017,27(11):201.
 ZHANG Xiao-fei,LIU Qing-hua,LIU Zhen. Design of Campus Location Service System Based on Small Cell Stations[J].,2017,27(06):201.

更新日期/Last Update: 2017-07-28