Skip to main content

Dummy Trajectory Generation Scheme Based on Deep Learning

  • Conference paper
  • First Online:
Cyberspace Safety and Security (CSS 2019)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11983))

Included in the following conference series:

Abstract

Nowadays, the traditional dummy trajectory generation algorithm used to protect users’ trajectory privacy usually uses statistical methods to build trajectory model. Because the human mobility model is a complex equation, it is difficult to use mathematical methods to model, so the established trajectory model can not consider the human mobility model which restricts the formation of trajectory. Therefore, traditional dummy trajectory generation algorithms can not defend against data mining attacks based on in-depth learning. In this paper, LSTM (Long Short-Term Memory) is used to design the real and dummy trajectory discriminator. Experiments show that data mining based on deep learning can eliminate more than 95% of the algorithm generated trajectories, and the error rate of real trajectory is less than 10%. We restrict the traditional dummy trajectory generation algorithm to human mobility model, and design a dummy trajectory generation strategy so that the generated trajectory can defend against multiple recognition attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Krumm, J.: A survey of computational location privacy. Pers. Ubiquitous Comput. 13, 391–399 (2009). https://doi.org/10.1007/s00779-008-0212-5

    Article  Google Scholar 

  2. Wernke, M., Skvortsov, P., Dürr, F., Rothermel, K.: A classification of location privacy attacks and approaches. Pers. Ubiquitous Comput. 18(1), 163–175 (2014). https://doi.org/10.1007/s00779-012-0633-z

    Article  Google Scholar 

  3. Tang, M., Wu, Q., Zhang, G., He, L., Zhang, H.: A new scheme of LBS privacy protection. In: 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing, Beijing, pp. 1–6 (2009)

    Google Scholar 

  4. He, W.: Research on LBS privacy protection technology in mobile social networks. In: 2017 IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), Chongqing, pp. 73–76 (2017)

    Google Scholar 

  5. Xu, T., Cai, Y.: Feeling-based location privacy protection for location-based services. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 348–357 (2009). https://doi.org/10.1145/1653662.1653704

  6. Xu, T., Cai, Y.: Exploring historical location data for anonymity preservation in location-based services. In: IEEE INFOCOM 2008 - The 27th Conference on Computer Communications, Phoenix, AZ, pp. 547–555 (2008)

    Google Scholar 

  7. Wang, Y., Xu, D., He, X., et al.: L2P2: location-aware location privacy protection for location-based services. In: 2012 Proceedings IEEE INFOCOM, Orlando, FL, pp. 1996–2004 (2012)

    Google Scholar 

  8. Kido, H., Yanagisawa, Y., Satoh, T.: An anonymous communication technique using dummies for location-based services. In: ICPS 2005. Proceedings. International Conference on Pervasive Services, 2005, Santorini, Greece, pp. 88–97 (2005)

    Google Scholar 

  9. Kido, H., Yanagisawa, Y., Satoh, T.: Protection of location privacy using dummies for location-based services. In: 21st International Conference on Data Engineering Workshops (ICDEW 2005), Tokyo, Japan, pp. 1248–1248 (2005)

    Google Scholar 

  10. Wu, X., Sun, G.: A novel dummy-based mechanism to protect privacy on trajectories. In: 2014 IEEE International Conference on Data Mining Workshop, Shenzhen, pp. 1120–1125 (2014)

    Google Scholar 

  11. Kato, R., Iwata, M., Hara, T., et al.: A dummy-based anonymization method based on user trajectory with pauses. In: Proceedings of the 20th International Conference on Advances in Geographic Information Systems (SIGSPATIAL 2012), pp. 249–258. ACM, New York (2012)

    Google Scholar 

  12. Niu, B., Li, Q., Zhu, X., et al.: Achieving k-anonymity in privacy-aware location-based services. In: IEEE INFOCOM 2014 - IEEE Conference on Computer Communications, Toronto, ON, pp. 754–762 (2014)

    Google Scholar 

  13. Pan, J., Liu, Y., Zhang, W.: Detection of dummy trajectories using convolutional neural networks. Secur. Commun. Netw. 2019, 12 (2019)

    Google Scholar 

Download references

Acknowledgment

This work was partly supported by National Natural Science Foundation of China (61662016), Key projects of Guangxi Natural Science Foundation (2018JJD170004), and Fundamental Research Funds for the Central Universities (Program No. 201-510318070).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yining Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Pan, J., Yang, J., Liu, Y. (2019). Dummy Trajectory Generation Scheme Based on Deep Learning. In: Vaidya, J., Zhang, X., Li, J. (eds) Cyberspace Safety and Security. CSS 2019. Lecture Notes in Computer Science(), vol 11983. Springer, Cham. https://doi.org/10.1007/978-3-030-37352-8_45

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-37352-8_45

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-37351-1

  • Online ISBN: 978-3-030-37352-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics