Abstract
In contemporary times, there is an increasing integration of Location-Based Service (LBS) enabled smart devices into the fabric of individuals’ daily lives. The prevalent era of large-scale models predicting users’ historical location points poses a significant threat to user privacy. Simultaneously, conventional data release models exhibit suboptimal performance. This paper proposes a novel approach incorporating a deep learning prediction model and a location data release method called Hilbert-ConvLSTM, aimed at enhancing data availability while ensuring the privacy of user information. Firstly, leveraging the properties of the Hilbert curve, the predicted location point data is partitioned into multiple spatio-temporal structures. A sampling mechanism and exponential mechanism are employed for the selection of representative points within each location cluster. Subsequently, utilizing the “4V” characteristics of location point data, deep learning models are employed to extract spatio-temporal features, facilitating the prediction of location point data. Finally, in conjunction with the architecture derived from Hilbert curve partitioning, differential privacy budget allocation and Laplace noise addition are applied to achieve privacy protection in the statistical partitioned release of large-scale location data. Experimental analyses using real-world data validate the proposed method’s advantages in terms of data release usability and efficiency.
Similar content being viewed by others
Data Availability
The datasets generated during and/or analysed during the current study are not publicly available due to the authors do not have the permission, but are available from the corresponding author on reasonable request.
References
Qiu, M., Dai, W., & Vasilakos, A. (2019). Loop parallelism maximization for multimedia data processing in mobile vehicular clouds. IEEE Transactions on Cloud Computing, 7(1), 250–258.
Qiu, M., Ming, Z., et al. (2015). Phase-change memory optimization for green cloud with genetic algorithm. IEEE Transactions on Computers, 64(12), 3528–3540.
Song, Y., Li, Y., et al. (2019). Retraining strategy-based domain adaption network for intelligent fault diagnosis. IEEE TII, 16(9), 6163–6171.
Qiu, H., Zheng, Q., et al. (2020). Toward secure and efficient deep learning inference in dependable IoT systems. IEEE Internet of Things Journal, 8(5), 3180–3188.
Gai, K., Xu, K., et al. (2019). Fusion of cognitive wireless networks and edge computing. IEEE Wireless Communications, 26(3), 69–75.
Wei, X., Guo, H., et al. (2021). Reliable data collection techniques in underwater wireless sensor networks: A survey. IEEE Communication Surveys & Tutorials, 24(1), 404–431.
Chen, S., Fu, A., Shen, J., Yu, S., Wang, H., & Sun, H. (2020). Rnn-dp: A new differential privacy scheme base on recurrent neural network for dynamic trajectory privacy protection. Journal of Network and Computer Applications, 168, 102736.
Cheng, W., Wen, R., Huang, H., Miao, W., & Wang, C. (2022). Optdp: Towards optimal personalized trajectory differential privacy for trajectory data publishing. Neurocomputing, 472, 201–211.
Li, Y., Yang, D., & Hu, X. (2020). A differential privacy-based privacy-preserving data publishing algorithm for transit smart card data. Transportation Research Part C: Emerging Technologies, 115, 102634.
Li, C., & Qiu, M. (2019). Reinforcement learning for cyber-physical systems: with cybersecurity case studies. Chapman and Hall/CRC.
Ling, C., Jiang, J., Wang, J., et al. (2023). Deep graph representation learning and optimization for influence maximization. In: International Conference on Machine Learning (ICML), PMLR, pp. 21350–21361.
Zhang, Y., Qiu, M., & Gao, H. (2023). Communication-efficient stochastic gradient descent ascent with momentum algorithms. In: IJCAI 2023.
Zhao, X., Dong, Y., & Pi, D. (2019). Novel trajectory data publishing method under differential privacy. Expert Systems with Applications, 138, 112791.
Rao, J., Gao, S., Kang, Y., et al. (2020). Lstm-trajgan: A deep learning approach to trajectory privacy protection. Preprint retrieved from http://arxiv.org/abs/2006.10521
Ghane, S., Kulik, L., & Ramamohanarao, K. (2019). Tgm: A generative mechanism for publishing trajectories with differential privacy. IEEE Internet of Things Journal, 7(4), 2611–2621.
Rao, J., Gao, S., & Zhu, S. (2023). CATS: Conditional adversarial trajectory synthesis for privacy-preserving trajectory data publication using deep learning approaches. International Journal of Geographical Information Science, 37(12), 2538–2574.
Wang, W., Wang, Y., Duan, P., et al. (2022). A triple real-time trajectory privacy protection mechanism based on edge computing and blockchain in mobile crowdsourcing. IEEE Transactions on Mobile Computing.
Sweeney, L. (2002). k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(05), 557–570.
Gruteser, M., & Grunwald, D. (2003). Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, pp. 31–42.
Gursoy, M. E., Liu, L., Truex, S., & Yu, L. (2018). Differentially private and utility preserving publication of trajectory data. IEEE Transactions on Mobile Computing, 18(10), 2315–2329.
Qiu, M., Gai, K., & Xiong, Z. (2018). Privacy-preserving wireless communications using bipartite matching in social big data. FGCS, 87, 772–781.
Qiu, M., Gai, K., Zhao, H., et al. (2018). Privacy-preserving smart data storage for financial industry in cloud computing. Concurrency and Computation: Practice and Experience, 30(5), e4278.
Gai, K., Qiu, M., & Zhao, H. (2021). Privacy-preserving data encryption strategy for big data in mobile cloud computing. IEEE Transactions on Big Data, 7(4), 678–688.
Zeng, Y., Pan, M., Just, H. A., et al. (2023). Narcissus: A practical clean-label backdoor attack with limited information. In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, pp. 771–785.
Qiu, M., & Qiu, H. (2020). Review on image processing based adversarial example defenses in computer vision. In: 2020 IEEE 6th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS), IEEE, pp. 94–99.
Zeng, Y., Qiu, H., Memmi. G., et al. (2020). A data augmentation-based defense method against adversarial attacks in neural networks. In: Algorithms and Architectures for Parallel Processing: 20th International Conference, ICA3PP 2020, New York City, NY, USA, October 2–4, 2020, Proceedings, Part II 20. Springer International Publishing, pp. 274–289.
Qardaji, W., Yang, W., & Li, N. (2013). Differentially private grids for geospatial data. In: 2013 IEEE 29th International Conference on Data Engineering (ICDE). IEEE, pp. 757–768.
Xiong, P., Zhang, L., & Zhu, T. (2017). Reward-based spatial crowdsourcing with differential privacy preservation. Enterprise Information Systems, 11(10), 1500–1517.
Wang, J., Zhu, R., Liu, S., & Cai, Z. (2018). Node location privacy protection based on differentially private grids in industrial wireless sensor networks. Sensors, 18(2), 410.
Cui, J., Ding, Z., Deng, Y., Nallanathan, A., & Hanzo, L. (2020). Adaptive uav-trajectory optimization under quality of service constraints: A model-free solution. IEEE Access, 8, 112253–112265.
Jin, Y., Yu, R., Si, H., Bian, Y., Qiao, X., Ji, L., Liu, Q., Wang, W., Yu, J., Li, Y., et al. (2022). Effects of social support on frailty trajectory classes among community-dwelling older adults: the mediating role of depressive symptoms and physical activity. Geriatric Nursing, 45, 39–46.
Zhao, X., Pi, D., & Chen, J. (2020). Novel trajectory privacy-preserving method based on clustering using differential privacy. Expert Systems with Applications, 149, 113241.
Zhao, Y., Wu, W., & Di, C. (2021). Release of trajectory data based on space segmentation using differential privacy. In: 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, pp. 1246–1253.
Wu, Y., Cao, X., & An, Z. (2020). A spatiotemporal trajectory data index based on the Hilbert curve code. IOP Conference Series: Earth and Environmental Science, 502(1), 012005.
Yuan, J., Zheng, Y., Zhang, C., et al. (2010). T-drive: Driving directions based on taxi trajectories. In: Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems, pp. 99–108.
Chen, X., Xu, J., Zhou, R., Chen, W., Fang, J., & Liu, C. (2021). Trajvae: A variational autoencoder model for trajectory generation. Neurocomputing, 428, 332–339.
Kim, J. W., & Jang, B. (2022). Deep learning-based privacy-preserving framework for synthetic trajectory generation. Journal of Network and Computer Applications, 206, 103459.
Funding
No funding was received to assist with the preparation of this manuscript.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Ethics Approval
Not Applicable.
Competing Interests
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Liu, C., Li, J. & Sun, Y. Deep Learning-based Privacy-preserving Publishing Method for Location Big Data in Vehicular Networks. J Sign Process Syst (2024). https://doi.org/10.1007/s11265-024-01912-z
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11265-024-01912-z