CN112257109B - Data processing method and device - Google Patents

Data processing method and device Download PDF

Info

Publication number
CN112257109B
CN112257109B CN202011193782.7A CN202011193782A CN112257109B CN 112257109 B CN112257109 B CN 112257109B CN 202011193782 A CN202011193782 A CN 202011193782A CN 112257109 B CN112257109 B CN 112257109B
Authority
CN
China
Prior art keywords
position information
target
equipment
moment
track
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011193782.7A
Other languages
Chinese (zh)
Other versions
CN112257109A (en
Inventor
方琦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Yep Telecommunication Technology Co Ltd
Original Assignee
Xian Yep Telecommunication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Yep Telecommunication Technology Co Ltd filed Critical Xian Yep Telecommunication Technology Co Ltd
Priority to CN202011193782.7A priority Critical patent/CN112257109B/en
Publication of CN112257109A publication Critical patent/CN112257109A/en
Application granted granted Critical
Publication of CN112257109B publication Critical patent/CN112257109B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Abstract

The embodiment of the application provides a data processing method and a data processing device, wherein the method comprises the following steps: first location information of a first device at each of a plurality of time instants is obtained. And determining a plurality of second devices respectively corresponding to the first device at each moment according to the first position information at each moment, wherein the distance between each second device and the first device is less than or equal to a preset threshold value. And obtaining the real track of the first equipment according to the first position information at each moment. And obtaining a plurality of interference tracks of the first equipment according to the second position information of the second equipment respectively corresponding to the first equipment at each moment. The true trajectory and the plurality of interference trajectories of the first device are stored in a database. The real track and the plurality of interference tracks of the first equipment are stored together, and an attacker cannot distinguish the real track from the interference tracks, so that the real track of the first equipment can be effectively protected, and the safety of track data is improved.

Description

Data processing method and device
Technical Field
The present application relates to computer technologies, and in particular, to a data processing method and apparatus.
Background
With the continuous development of mobile terminals, the mobile terminals can generally record track data of users and upload the track data to a server, wherein it is important to protect the privacy of the track data.
At present, in the related art, when privacy protection is performed on track data, a K-anonymization technology is generally adopted to prevent data leakage, for example, an equivalence class may be constructed for data to be protected, at least K indistinguishable individuals exist in the equivalence class, and then the equivalence class is transmitted as a condition for data query, so that data protection may be achieved due to the existence of a plurality of indistinguishable individuals.
However, in the K-anonymity technology, when a plurality of similar data exist in one equivalence class, an attacker can still obtain real private data through data analysis, thereby resulting in low security of the data.
Disclosure of Invention
The embodiment of the application provides a data processing method and device, so as to overcome the problem of low data security.
In a first aspect, an embodiment of the present application provides a data processing method, including:
acquiring first position information of first equipment at each moment in a plurality of moments;
determining a plurality of second devices respectively corresponding to the first device at each moment according to the first position information at each moment, wherein the distance between the second devices and the first device is less than or equal to a preset threshold value;
obtaining a real track of the first equipment according to the first position information of each moment;
obtaining a plurality of interference tracks of the first equipment according to second position information of second equipment respectively corresponding to the first equipment at each moment;
storing the true trajectory of the first device and the plurality of interference trajectories in a database.
In one possible design, obtaining the true trajectory of the first device according to the first position information at each time includes:
and sequentially connecting the first position information of each moment according to the time sequence to obtain the real track of the first equipment.
In a possible design, obtaining multiple interference tracks of the first device according to second location information of second devices respectively corresponding to the first device at each time includes:
and connecting the second position information of the second equipment corresponding to the first equipment at different moments according to a time sequence respectively to obtain a plurality of interference tracks of the first equipment.
In one possible design, determining, according to the first location information at each time, a plurality of second devices respectively corresponding to the first device at each time includes:
in one possible design, N target interest points corresponding to the target first position information are determined, where N is an integer greater than or equal to 1;
and determining the devices within the coverage range of the N target interest points as the plurality of second devices corresponding to the first device at the target moment.
In one possible design, determining, according to first target location information of the first device at a target time, N target interest points corresponding to the first target location information includes:
taking a position corresponding to first target position information of the first equipment at a target moment as a center, and acquiring at least one first interest point within a preset distance range;
determining a distance between a position corresponding to the third position information of each first interest point and a position corresponding to the target first position information according to the third position information of each first interest point in the at least one first interest point;
and determining N target interest points corresponding to the first position information according to the distance between the position corresponding to the third position information of each first interest point and the position corresponding to the target first position information.
In one possible design, determining N target interest points corresponding to first location information according to a distance between a location corresponding to the third location information of each first interest point and a location corresponding to the target first location information includes:
and sorting the distances between the position corresponding to the third position information of each first interest point and the position corresponding to the target first position information from small to large, and determining the first interest points corresponding to the N distances in the front ranking as the N target interest points corresponding to the first position information.
In one possible design, the method further includes:
receiving a data query request for the first device;
according to the data query request, querying a motion track of first equipment from the database, wherein the motion track comprises a real track and an interference track;
and sending the motion trail.
In a second aspect, an embodiment of the present application provides a data processing apparatus, including:
the device comprises an acquisition module, a processing module and a processing module, wherein the acquisition module is used for acquiring first position information of first equipment at each moment in a plurality of moments;
the processing module is used for determining a plurality of second devices respectively corresponding to the first device at each moment according to the first position information at each moment, wherein the distance between each second device and the first device is smaller than or equal to a preset threshold value;
the processing module is further configured to obtain a real track of the first device according to the first position information at each time;
the processing module is further configured to obtain multiple interference tracks of the first device according to second location information of second devices respectively corresponding to the first device at each time;
a storage module, configured to store the real trajectory of the first device and the plurality of interference trajectories in a database.
In one possible design, the processing module is specifically configured to:
and sequentially connecting the first position information of each moment according to a time sequence to obtain a real track of the first equipment.
In one possible design, the processing module is specifically configured to:
and connecting the second position information of the second equipment corresponding to the first equipment at different moments according to a time sequence respectively to obtain a plurality of interference tracks of the first equipment.
In one possible design, the processing module is specifically configured to:
determining N target interest points corresponding to the target first position information according to the target first position information of the first device at a target moment, wherein N is an integer greater than or equal to 1;
and determining devices within the coverage range of the N target interest points as the plurality of second devices corresponding to the first device at the target moment.
In one possible design, the processing module is specifically configured to:
taking a position corresponding to first target position information of the first equipment at a target moment as a center, and acquiring at least one first interest point within a preset distance range;
determining a distance between a position corresponding to the third position information of each first interest point and a position corresponding to the target first position information according to the third position information of each first interest point in the at least one first interest point;
and determining N target interest points corresponding to the first position information according to the distance between the position corresponding to the third position information of each first interest point and the position corresponding to the target first position information.
In one possible design, the processing module is specifically configured to:
and sorting the distances between the position corresponding to the third position information of each first interest point and the position corresponding to the target first position information from small to large, and determining the first interest points corresponding to the N distances in the front ranking as the N target interest points corresponding to the first position information.
In one possible design, the processing module is further to:
receiving a data query request for the first device;
according to the data query request, querying a motion track of first equipment from the database, wherein the motion track comprises a real track and an interference track;
and sending the motion trail.
In a third aspect, an embodiment of the present application provides a data processing apparatus, including:
a memory for storing a program;
a processor for executing the program stored in the memory, the processor being adapted to perform the method as described above in the first aspect and in any of its various possible designs when the program is executed.
In a fourth aspect, embodiments of the present application provide a computer-readable storage medium, which includes instructions that, when executed on a computer, cause the computer to perform the method as described above in the first aspect and any one of various possible designs of the first aspect.
The embodiment of the application provides a data processing method and a data processing device, wherein the method comprises the following steps: first location information of a first device at each of a plurality of time instants is obtained. And determining a plurality of second devices respectively corresponding to the first device at each moment according to the first position information at each moment, wherein the distance between each second device and the first device is less than or equal to a preset threshold value. And obtaining the real track of the first equipment according to the first position information at each moment. And obtaining a plurality of interference tracks of the first equipment according to the second position information of the second equipment respectively corresponding to the first equipment at each moment. The true trajectory and the plurality of interference trajectories of the first device are stored in a database. The method comprises the steps of determining a plurality of second devices adjacent to a first device at each moment according to first position information of the first device at each moment in a plurality of moments, generating an interference track of the first device according to second position information of the plurality of second devices, and storing a real track and a plurality of interference tracks of the first device together.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to these drawings without inventive exercise.
Fig. 1 is a schematic diagram of an implementation of a K-anonymization method provided in an embodiment of the present application;
fig. 2 is a flowchart of a data processing method according to an embodiment of the present application;
fig. 3 is a flowchart of a data processing method provided in an embodiment of the present application;
fig. 4 is a schematic diagram illustrating an implementation of determining a target interest point according to an embodiment of the present application;
fig. 5 is a schematic implementation diagram of a single time determination second device according to an embodiment of the present application;
fig. 6 is a schematic diagram illustrating an implementation of a plurality of time determination second devices according to an embodiment of the present application;
fig. 7 is a schematic diagram of a real track of a first device provided in an embodiment of the present application;
fig. 8 is a schematic diagram of an interference track of a first device according to an embodiment of the present disclosure;
FIG. 9 is a flow chart of a data processing method according to another embodiment of the present application;
FIG. 10 is a system diagram of data access provided by an embodiment of the present application;
fig. 11 is a schematic structural diagram of a data processing apparatus according to an embodiment of the present application;
fig. 12 is a schematic hardware structure diagram of a data processing device according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
For clarity of description of the following embodiments, a brief introduction to the related art is first given:
with the continuous development of terminal device technology, the current mobile terminal may record the track data of the user through a positioning service, for example, and upload the track data to a server.
The mobile terminal may be, for example, an intelligent wearable device, a mobile phone (or referred to as a "cellular" phone), a computer with a mobile terminal, and the Positioning service may be, for example, a Global Positioning System (GPS) service.
In the process of recording and storing the track data of the user, a track data privacy leakage event of the user may occur, so that the information security and the data security are seriously threatened, and therefore, the track data needs to be subjected to privacy protection.
In the prior art, although privacy protection of data is performed in the aspects of data encryption, data distortion, data anonymity and the like, and Secure communication protocols such as hypertext Transfer Protocol over Secure Layer (HTTPS), transmission Control Protocol/Internet Protocol (TCP/IP), secure Socket/Transport Layer Security Protocol (SSL/TLS) and the like are designed to ensure data Secure communication, there is a certain risk of information Security for privacy protection of motion trajectory data.
Therefore, in the related art, a data anonymization technology can be further adopted to prevent the leakage of data, wherein the core idea of the data anonymization technology is that through the processing of data, an attacker cannot determine a specific individual user according to stolen data.
The current traditional data anonymization technical scheme mainly prevents data leakage through a K-anonymization technology, and the principle is that an equivalence class is constructed, at least K indistinguishable individuals exist in the equivalence class, and then the equivalence class is used as a condition for data query processing to carry out information transmission. Therefore, when the intelligent device is subjected to malicious attacks such as data stealing and data tampering, due to the fact that a plurality of indistinguishable individuals exist, the association between the user individuals and the private data cannot be generated by 1-1, and finally data leakage can be avoided.
It can be understood that the k-anonymization technology is to form an anonymous data set satisfying certain anonymity requirements by anonymizing certain attribute values in the original data set, and can be used for data distribution, and for any value row projected on the attributes, at least k-1 other record attribute values identical to the value row must exist at the same time. In general, the K-anonymity technique requires that for any value row projected on the attributes, at least K-1 other records must exist simultaneously, which are identical to the value row on the attribute set, and the K records form an equivalent group, so that an individual is hidden in the K data, and it cannot be determined which specific record in the K data is the record corresponding to the individual, so that the protection of the privacy attribute value is exchanged for the loss of partial information of the attribute value.
However, when there are a plurality of similar data in an equivalence class, an attacker can analyze a large amount of personal private data of users and find out real private data by comparing the similar data in the equivalence class and the relevance information therein. Therefore, the security of the private data cannot be effectively ensured by the K-anonymization technology, and the security of the data is low.
Meanwhile, the K-anonymization technology generally adopts a larger K value to protect the privacy of the trajectory data of the user, but when the K value is selected to be larger, the formed anonymization set is larger, and the system load and service resources consumed for finally performing trajectory anonymization and data processing are larger, so that the position service quality is reduced.
And the traditional track K-anonymization method needs to find other K-1 users to form a track anonymization set when a data access request is received, but if not enough users are found in a short time, the method is invalid, so that the K-anonymization method cannot protect data in certain scenes.
On the other hand, in the conventional K-anonymous method, the user can be searched recursively until K-1 users are found, so that the search range needs to be enlarged continuously, the execution time is prolonged, the execution efficiency is reduced, and good experience cannot be brought to the user.
For example, an implementation manner of recursively finding users in a K-anonymization technology can be understood with reference to fig. 1, and fig. 1 is a schematic implementation diagram of a K-anonymization method provided by an embodiment of the present application.
Referring to fig. 1, the current user's location may be, for example, the location indicated at 101 in fig. 1. Each small circle in FIG. 1, such as 102 as an example, represents the motion footprint of other K-1 users located in the neighborhood near the current user. In the current implementation manner, when receiving a data access request, a server recursively searches users from a current user location 101 until K-1 users are found, and then performs equivalence class construction according to the K-1 users, thereby protecting private data of the users.
In view of the above-mentioned shortcomings in the prior art, the following technical ideas are proposed in the present application: for the track data needing data protection, a plurality of false interference tracks can be constructed according to the position information of the adjacent users of the users at each moment, and then the interference tracks and the real tracks of the users are stored together, so that when an attacker accesses the data, the attacker cannot determine which specific track is the current access user because of the existence of a plurality of tracks and the absence of similarity between the track data, and the safety of the track data can be effectively ensured.
The data processing method provided by the present application is described below with reference to specific embodiments, and it should be noted that an execution subject of each embodiment in the present application may be a server, or may also be a processor, a microprocessor, or the like.
Fig. 2 is a flowchart of a data processing method according to an embodiment of the present application.
As shown in fig. 2, the method includes:
s201, first position information of the first device at each moment in a plurality of moments is acquired.
The first device may be, for example, a mobile device carried by a user who currently needs to perform trajectory data protection. It will be appreciated that the determination of the trajectory data for a user is actually determined from the mobile device carried by the user. Assuming that the trajectory data of the user a needs to be protected currently, the first location information of the first device carried by the user a at each of the multiple times may be obtained.
In one possible implementation manner, for example, the location information of the first device may be obtained according to a preset period, so as to obtain the first location information at each of the multiple time instants, for example, the location information of the first device is obtained every 5 seconds.
In another possible implementation manner, for example, the location information of the first device may be obtained in real time, so as to obtain the first location information at each of the multiple time instants, for example, the location information of the first device may be obtained in real time at each time instant.
The implementation manner of obtaining the first location information of the first device at each of the multiple time instants is not particularly limited in this embodiment, and may be selected according to actual requirements.
S202, according to the first position information of each moment, determining a plurality of second devices corresponding to the first device at each moment, wherein the distance between each second device and the first device is smaller than or equal to a preset threshold value.
Wherein the first location information of the first device at each time may indicate where the first device is located at each time. In this embodiment, the confusion track information corresponding to the track information of the first device needs to be constructed, and the confusion track information needs to be constructed by means of the position information of the neighboring devices of the first device.
In a possible implementation manner, for example, first location information of the first device at time 1 is currently determined, and then a plurality of second devices adjacent to the first device at time 1 may be obtained, where a distance between the second device and the first device may be smaller than or equal to a preset threshold, for example.
It can be understood that the first device may obtain a plurality of second devices at each time, and the embodiment does not limit the number of the second devices obtained by the first device at each time and the specific implementation of the second devices, as long as the distance between the second device and the first device is less than or equal to the preset threshold.
And S203, obtaining a real track of the first equipment according to the first position information at each moment.
If the first location information is the real location information of the first device, the real track of the first device can be obtained according to the first location information of the first device at each moment. In one possible implementation, the first position information of the first device at each time instant may be linked in chronological order, for example, to obtain a true trajectory of the first device,
and S204, obtaining a plurality of interference tracks of the first equipment according to the second position information of the second equipment respectively corresponding to the first equipment at each moment.
The second location information of the second device respectively corresponding to the first device at each time is not the location information of the first device, but is relatively close to the location of the first device at each time. Therefore, a plurality of interference tracks of the first device can be obtained according to the second position information of the second device respectively corresponding to the first device at each moment. This trajectory is not then the trajectory of the first device but may be stored together with the real trajectory of the first device as an interference trajectory of the first device.
S205, storing the real track and the plurality of interference tracks of the first device into a database.
After the real track of the first device and the multiple interference tracks of the first device are obtained, the real track and the interference tracks of the first device can be stored in a database, when the track data of the first device is accessed by a device, the real track and the multiple interference tracks can be accessed simultaneously, and the tracks are not similar to each other, so that the real track cannot be distinguished from the multiple tracks, the real track of the first device is effectively protected, and the track data of a user is effectively protected.
The data processing method provided by the embodiment of the application comprises the following steps: first location information of a first device at each of a plurality of times is obtained. And determining a plurality of second devices respectively corresponding to the first device at each moment according to the first position information at each moment, wherein the distance between each second device and the first device is less than or equal to a preset threshold value. And obtaining the real track of the first equipment according to the first position information at each moment. And obtaining a plurality of interference tracks of the first equipment according to the second position information of the second equipment respectively corresponding to the first equipment at each moment. The true trajectory and the plurality of interference trajectories of the first device are stored in a database. The method comprises the steps of determining a plurality of second devices adjacent to a first device at each moment according to first position information of the first device at each moment in a plurality of moments, generating an interference track of the first device according to second position information of the plurality of second devices, and storing a real track and a plurality of interference tracks of the first device together.
On the basis of the foregoing embodiment, with reference to a more specific embodiment, a data processing method provided by the present application is further described in detail with reference to fig. 3 to 8, fig. 3 is a flowchart of the data processing method provided by the embodiment of the present application, fig. 4 is an implementation schematic diagram of determining a target interest point provided by the embodiment of the present application, fig. 5 is an implementation schematic diagram of determining a second device at a single time provided by the embodiment of the present application, fig. 6 is an implementation schematic diagram of determining the second device at multiple times provided by the embodiment of the present application, fig. 7 is a schematic diagram of a true trajectory of a first device provided by the embodiment of the present application, and fig. 8 is a schematic diagram of an interference trajectory of the first device provided by the embodiment of the present application.
As shown in fig. 3, the method includes:
s301, first position information of the first device at each moment in a plurality of moments is obtained.
The implementation manner of S301 is similar to that of S201, and is not described herein again.
S302, taking a position corresponding to the first target position information of the first device at the target moment as a center, and acquiring at least one first interest point within a preset distance range.
In this embodiment, the target first location information may be any one of a plurality of first location information, and the corresponding target time is a time corresponding to the target first location information. When determining a second device adjacent to the first device at the target time, in order to improve processing efficiency, N interest points adjacent to the first device may be obtained, and then each device within a coverage range of the N interest points is obtained, so as to obtain the second device, where N is an integer greater than or equal to 1.
The first point of interest may be, for example, a school, a bank, a restaurant, a gas station, a hospital, a supermarket, and the like, and the first point of interest may be understood as, for example, a building, and the specific implementation manner of the first point of interest is not particularly limited in this embodiment, and may be selected according to actual needs, as long as it is a geographic entity, and all of them may be used as the point of interest in this embodiment.
In this embodiment, if it is necessary to acquire a plurality of second devices corresponding to the first device at each time, the same operation may be performed at each time, and the following description takes any target time as an example, and the processing manner at each time is similar.
In a possible implementation manner, at least one first interest point within a preset distance range may be obtained by taking a position corresponding to the target first position information at the target time as a center.
In this embodiment, specific implementation of the preset range is not limited, and with reference to fig. 4, an implementation manner of obtaining at least one first interest point is described by taking the preset distance range as a circle corresponding to a preset radius as an example.
Referring to fig. 4, assuming that the target first location information of the first device at the current target time is the location indicated by 401, and assuming that the target first location information is currently used as the center and the corresponding preset distance range is a circle shown by 402, the interest points located within the preset distance range may be determined according to the location of each interest point, so as to obtain at least one first interest point.
For example, referring to fig. 4, the interest points 1 to 16 currently within the preset distance range may be all regarded as the first interest points, and the interest points outside the preset distance range are not regarded as the first interest points in the present embodiment.
S303, determining the distance between the position corresponding to the third position information of each first interest point and the position corresponding to the target first position information according to the third position information of each first interest point in the at least one first interest point.
Each interest point also corresponds to respective position information, third position information of each first interest point in at least one first interest point can be obtained, and a distance between a position corresponding to the third position information of each first interest point and a position corresponding to the target first position information is determined. It will be appreciated that the currently acquired distance also indicates the distance between the respective first point of interest and the first device at the target time.
S304, the distances between the position corresponding to the third position information of each first interest point and the position corresponding to the target first position information are sorted from small to large, and the first interest points corresponding to the N distances in the front of the ranking are determined as the N target interest points corresponding to the first position information.
After the distance between the position corresponding to the third position information of each first interest point and the position corresponding to the target first position information is determined, the distances may be sorted from small to large, and the first interest points corresponding to the first N ranked distances are determined as N target interest points corresponding to the currently required first position information.
In one possible implementation, for example, the method may be implementedThe distance corresponding to the third location information of each first interest point and the interest point index of each first interest point are added to the ordered set M, which may be written as M = { d = { for example 1 ,d 2 ,d 3 A. }, then the ordered set M is ordered from smallest to largest (ascending) to get a new set P = { d = { d } min ,...,d max And then, the first N entries may be selected from the sorted new set P, and the interest points corresponding to the first N entries are used as the N target interest points corresponding to the first location information of the current time.
For example, referring to fig. 4, assuming that N is 7 at present, it can be understood that 7 interest points closer to the first device at the present time are selected, which are respectively the interest point 1-the interest point 7 shown in fig. 4; or, for example, N may also be 8, it may be understood that 8 interest points that are closer to the first device at the current time are selected, which are the interest points 1 to 7 and the interest point 12 shown in fig. 4, respectively, and the specific value of N is not particularly limited in this embodiment, and may be selected and expanded according to actual requirements.
S305, determining the devices within the coverage range of the N target interest points as a plurality of second devices corresponding to the first device at the target time.
After the N target interest points are determined, each device in the coverage area of the N target interest points may be acquired, so as to determine a plurality of second devices corresponding to the first device at the target time.
Assuming that the N target points of interest in the above example of fig. 4 are continued to be points of interest 1-7, an implementation of determining the second device may refer to fig. 5, for example.
As shown in fig. 5, a position corresponding to the target first position information of the first device at the current target time is a position shown by 501 in fig. 5, and assuming that 7 target interest points are currently determined, which are respectively interest points 1 to interest points 7, each target interest point in fig. 5 corresponds to a respective coverage range, and multiple devices may exist in the coverage range of each target interest point, where a small circle in the coverage range of each target interest point may be, for example, a motion footprint of another user, and then according to the multiple devices in the coverage range of each target interest point, multiple second devices corresponding to the first device at the target time may be obtained.
The outermost circular area formed by the coverage range of each target interest point can be understood as a temporary anonymous user selection area corresponding to the N target interest points.
In this embodiment, N target interest points adjacent to the first device are determined first, and then the devices within the coverage area of each target interest point are obtained, so that a plurality of second devices adjacent to the first device are obtained, thereby effectively avoiding the problems of long execution time and low efficiency caused by the need of recursive user search, and effectively improving the processing efficiency of determining the devices adjacent to the first device.
It can be understood that fig. 5 illustrates a plurality of second devices determined by the first device at a certain time, in this embodiment, a plurality of second devices are determined for the first device at each time, and the final implementation may be as shown in fig. 6, for example.
Referring to fig. 6, during the movement of the user, the location of the user may be updated, and accordingly, the first location information of the first device may be changed. For example, as shown in fig. 6, the first device may be located at the location indicated by 601 at time 1, the first device may be located at the location indicated by 603 at time 2, and so on, and the locations of the first devices at the remaining respective times may be understood with reference to fig. 6.
At each moment, a plurality of second devices corresponding to the first position information at the current moment can be found. For example, it is described above that a plurality of second devices within the coverage of N points of interest may constitute a temporary anonymous user selection area, and accordingly, at each time, the temporary anonymous user selection area corresponding to the first device may be determined, for example, the temporary anonymous user selection area corresponding to the first time may be a selection area indicated by a dashed line 60 in fig. 6. It will be appreciated that what is shown in 60 corresponds to what is shown in figure 5.
It will be appreciated that the temporary anonymous user selection areas of the first device at various times, i.e. the dynamic anonymous user selection areas that may constitute the first device, each have a plurality of second devices within it.
S306, sequentially connecting the first position information of each moment according to the time sequence to obtain a real track of the first equipment.
In this embodiment, first location information of the first device at each time may be obtained, and then the first location information of each time is sequentially connected according to the order of the times, so that a real track of the first device may be obtained, where the real track of the first device may be, for example, a track shown in fig. 7.
And S307, sequentially connecting the second position information of the second equipment corresponding to the first equipment at different moments according to a time sequence to obtain a plurality of interference tracks of the first equipment.
In this embodiment, the first device corresponds to a plurality of second devices at each time, and similarly, the second position information of the second devices corresponding to different times may be sequentially connected according to the time sequence, so as to obtain a plurality of interference tracks of the first device.
It is understood that the second devices acquired by the first device at different times may be different devices, and there may also be the same device, for example, the second devices corresponding to the first time are device 2, device 3, and device 4, the second devices corresponding to the second time are device 2, device 6, and device 7, and the second devices corresponding to the third time are device 5 and device 8. In a possible implementation manner, for example, when the location information of one second device is currently connected, for example, second location information of the same device as the current second device may be searched for and connected to the second device in a plurality of second devices at the next time to obtain a track, and for example, when the second location information of the second device at the first time and the second time is connected, the second location information of the device 2 at the first time and the second location information of the device 2 at the second time may be connected.
Or, one of the plurality of second devices at the next time may be randomly selected to perform the connection of the location information, so as to obtain the trajectory, for example, when the second location information of the second device at the second time and the second location information of the second device at the third time are connected, the second location information of the device 2 at the second time and the second location information of the device 5 at the third time may be connected; or, in a plurality of second devices at the next time, a second device whose position is close to the current second device may be selected, and the position information may be connected to obtain the track.
In a possible implementation manner, the currently obtained one interference track may be, for example, the track illustrated in fig. 8, and it may be determined with reference to fig. 8 that the track is formed by the second position information of the second device at each time.
In this embodiment, an implementation manner of obtaining the interference track of the first device according to the second location information of the second device corresponding to different times is not particularly limited, and the implementation manner may be selected according to actual requirements, and as long as the track is obtained by connecting the second location information of the second device corresponding to the time that is not used, the track may be used as the interference track in this embodiment.
S308, storing the real track and the plurality of interference tracks of the first device into a database.
In one possible implementation, the currently obtained real trajectory and the plurality of interference trajectories of the first device may be understood, for example, as in table 1 below:
table 1:
Figure GDA0004079983310000141
referring to table 1, it is assumed that position information of a first device is currently acquired every 5 seconds(s), and a plurality of second devices corresponding to the first device are acquired at each time, and then a plurality of tracks including a real track and a plurality of interference tracks may be obtained according to the first position information at each time and the second position information at each time, for example, the tracks a, b, c, d, and e described in table 1.
Taking the track a as an example, at the time corresponding to 5 seconds, the position information in the track a is coordinates (0, 3), at the time corresponding to 10 seconds, the position information in the track a is coordinates (0.6, 3), and the position information of the rest of the time points is shown in table 1, so that the position information of the time points together form the track a, and the implementation manners of the rest of the tracks are similar.
In the 5 tracks shown in table 1, the real tracks of 1 first device and the interference tracks of 4 first devices are included, however, the tracks are all stored in the database and serve as track data corresponding to the first devices, when an attacker accesses data, since the tracks do not have similarities and all correspond to the movement direction of the user corresponding to the first device, the attacker cannot determine which specific track is the real track of the currently accessed user.
Table 1 above exemplarily shows 5 tracks, and in an actual implementation process, for example, the first device corresponds to 100 tracks, wherein there are one real track and 99 interfering tracks, so as to further improve the safety of the real track, and therefore it can be determined that the greater the number of interfering tracks, the higher the safety of the corresponding track data.
According to the data processing method provided by the embodiment of the application, the N adjacent target interest points of the first device are determined, and then the devices within the coverage range of each target interest point are obtained, so that the plurality of second devices adjacent to the first device are obtained, the problems of long execution time and low efficiency caused by the fact that a user needs to search recursively are effectively solved, and the processing efficiency of determining the devices adjacent to the first device is effectively improved. In addition, in the embodiment, the real track and the multiple interference tracks of the first device are generated and stored, so that data protection on the real track can be effectively realized, and the data security is improved.
On the basis of the foregoing embodiments, the following describes a process of accessing track data by a device with reference to fig. 9 and fig. 10, where fig. 9 is a flowchart of a data processing method according to another embodiment of the present application, and fig. 10 is a system schematic diagram of data access according to an embodiment of the present application.
As shown in fig. 9, the method includes:
s901, receiving a data query request aiming at the first equipment.
Assuming that the second device needs to access data currently, the server may receive a data query request of the second device for the first device, where the data query request is used to access trajectory data of the first device.
S902, according to the data query request, querying a motion track of the first device from the database, wherein the motion track comprises a real track and an interference track.
In this application, for example, referring to fig. 10, the trajectory processing server may process trajectory data of the first data, and a specific implementation manner of the trajectory processing server may refer to the description in the foregoing embodiment, so as to obtain a real trajectory and an interference trajectory of the first device, and the server may store the real trajectory and the interference trajectory of the first device in a database as a motion trajectory of the first device.
And then when receiving a data query request, the track processing server queries the motion track of the first device from the database, wherein the motion track comprises a real track and an interference track.
And S903, sending the motion trail.
The server may then send the motion trajectory of the first device to a device corresponding to the data query request, for example, referring to fig. 10, the trajectory processing server sends a query result to the second device, where the query result includes the motion trajectory, and the motion trajectory includes a real trajectory and an interference trajectory.
After the second device acquires the motion track of the first device, it cannot be determined which real track the first device corresponds to, so that the real track of the first device can be effectively protected, and the data security is improved.
In summary, according to the data protection method provided in the embodiment of the present application, multiple interference tracks corresponding to a first device are obtained according to second position information of a second device that is adjacent to the first device at each time, and the multiple interference tracks and a real track of the first device are stored together.
In addition, in the embodiment, the plurality of second devices do not need to be searched recursively, and are directly determined based on the coverage range of the selected interest point, so that the processing speed and efficiency can be effectively improved.
Fig. 11 is a schematic structural diagram of a data processing apparatus according to an embodiment of the present application. As shown in fig. 11, the apparatus 110 includes: an acquisition module 1101, a processing module 1102 and a storage module 1103.
An obtaining module 1101, configured to obtain first location information of a first device at each of a plurality of time instants;
a processing module 1102, configured to determine, according to the first location information at each time, a plurality of second devices respectively corresponding to the first device at each time, where a distance between each of the second devices and the first device is smaller than or equal to a preset threshold;
the processing module 1102 is further configured to obtain a real track of the first device according to the first position information at each time;
the processing module 1102 is further configured to obtain multiple interference tracks of the first device according to second location information of second devices respectively corresponding to the first device at each time;
a storage module 1103, configured to store the real trajectory of the first device and the plurality of interference trajectories in a database.
In one possible design, the processing module 1102 is specifically configured to:
and sequentially connecting the first position information of each moment according to the time sequence to obtain the real track of the first equipment.
In one possible design, the processing module 1102 is specifically configured to:
and connecting the second position information of the second equipment corresponding to the first equipment at different moments according to a time sequence respectively to obtain a plurality of interference tracks of the first equipment.
In one possible design, the processing module 1102 is specifically configured to:
determining N target interest points corresponding to the target first position information according to the target first position information of the first device at a target moment, wherein N is an integer greater than or equal to 1;
and determining the devices within the coverage range of the N target interest points as the plurality of second devices corresponding to the first device at the target moment.
In one possible design, the processing module 1102 is specifically configured to:
taking a position corresponding to the first target position information of the first device at the target moment as a center, and acquiring at least one first interest point within a preset distance range;
determining a distance between a position corresponding to the third position information of each first interest point and a position corresponding to the target first position information according to the third position information of each first interest point in the at least one first interest point;
and determining N target interest points corresponding to the first position information according to the distance between the position corresponding to the third position information of each first interest point and the position corresponding to the target first position information.
In one possible design, the processing module 1102 is specifically configured to:
and sorting the distances between the position corresponding to the third position information of each first interest point and the position corresponding to the target first position information from small to large, and determining the first interest points corresponding to the N distances in the front ranking as the N target interest points corresponding to the first position information.
In one possible design, the processing module 1102 is further configured to:
receiving a data query request for the first device;
according to the data query request, querying a motion track of the first device from the database, wherein the motion track comprises a real track and an interference track;
and sending the motion trail.
The apparatus provided in this embodiment may be used to implement the technical solutions of the above method embodiments, and the implementation principles and technical effects are similar, which are not described herein again.
Fig. 12 is a schematic diagram of a hardware structure of a data processing device according to an embodiment of the present application, and as shown in fig. 12, a data processing device 120 according to the embodiment includes: a processor 1201 and a memory 1202; wherein
A memory 1202 for storing computer-executable instructions;
the processor 1201 is configured to execute the computer executable instructions stored in the memory to implement the steps performed by the data processing method in the above embodiments. Reference may be made in particular to the description relating to the method embodiments described above.
Alternatively, the memory 1202 may be separate or integrated with the processor 1201.
When the memory 1202 is separately provided, the data processing apparatus further includes a bus 1203 for connecting the memory 1202 and the processor 1201.
The embodiment of the present application further provides a computer-readable storage medium, in which computer-executable instructions are stored, and when a processor executes the computer-executable instructions, the data processing method performed by the data processing apparatus is implemented.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described embodiments of the apparatus are merely illustrative, and for example, the division of modules is only one logical division, and other divisions may be realized in practice, for example, a plurality of modules may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed coupling or direct coupling or communication connection between each other may be through some interfaces, indirect coupling or communication connection between devices or modules, and may be in an electrical, mechanical or other form.
The integrated module implemented in the form of a software functional module may be stored in a computer-readable storage medium. The software functional module is stored in a storage medium and includes several instructions for enabling a computer device (which may be a personal computer, a server, or a network device) or a processor (in english: processor) to execute some steps of the methods according to the embodiments of the present application.
It should be understood that the Processor may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with the present invention may be embodied directly in a hardware processor, or in a combination of the hardware and software modules within the processor.
The memory may comprise a high-speed RAM memory, and may further comprise a non-volatile storage NVM, such as at least one disk memory, and may also be a usb disk, a removable hard disk, a read-only memory, a magnetic or optical disk, etc.
The bus may be an Industry Standard Architecture (ISA) bus, a Peripheral Component Interconnect (PCI) bus, an Extended ISA (EISA) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, the buses in the figures of the present application are not limited to only one bus or one type of bus.
The storage medium may be implemented by any type or combination of volatile and non-volatile memory devices, such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks. A storage media may be any available media that can be accessed by a general purpose or special purpose computer.
Those of ordinary skill in the art will understand that: all or a portion of the steps of implementing the above-described method embodiments may be performed by hardware associated with program instructions. The program may be stored in a computer-readable storage medium. When executed, the program performs steps comprising the method embodiments described above; and the aforementioned storage medium includes: various media that can store program codes, such as ROM, RAM, magnetic or optical disks.
Finally, it should be noted that: the above embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present application.

Claims (10)

1. A method of data processing, comprising:
acquiring first position information of first equipment at each moment in a plurality of moments;
determining a plurality of second devices respectively corresponding to the first device at each moment according to the first position information at each moment, wherein the distance between the second devices and the first device is smaller than or equal to a preset threshold value;
obtaining a real track of the first equipment according to the first position information of each moment;
obtaining a plurality of interference tracks of the first equipment according to second position information of second equipment respectively corresponding to the first equipment at each moment;
storing the true trajectory of the first device and the plurality of interference trajectories into a database.
2. The method of claim 1, wherein obtaining the true trajectory of the first device according to the first position information at each time comprises:
and sequentially connecting the first position information of each moment according to the time sequence to obtain the real track of the first equipment.
3. The method of claim 1, wherein obtaining a plurality of interference tracks of the first device according to second location information of second devices respectively corresponding to the first device at each time comprises:
and connecting the second position information of the second equipment corresponding to the first equipment at different moments according to a time sequence respectively to obtain a plurality of interference tracks of the first equipment.
4. The method according to claim 1, wherein determining, according to the first location information at each time, a plurality of second devices respectively corresponding to the first device at each time comprises:
determining N target interest points corresponding to the target first position information according to the target first position information of the first device at a target moment, wherein N is an integer greater than or equal to 1;
and determining the devices within the coverage range of the N target interest points as the plurality of second devices corresponding to the first device at the target moment.
5. The method according to claim 4, wherein determining N target interest points corresponding to the target first location information according to the target first location information of the first device at the target time includes:
taking a position corresponding to first target position information of the first equipment at a target moment as a center, and acquiring at least one first interest point within a preset distance range;
determining a distance between a position corresponding to the third position information of each first interest point and a position corresponding to the target first position information according to the third position information of each first interest point in the at least one first interest point;
and determining N target interest points corresponding to the first position information according to the distance between the position corresponding to the third position information of each first interest point and the position corresponding to the target first position information.
6. The method according to claim 5, wherein determining N target interest points corresponding to first location information according to a distance between a location corresponding to the third location information of each first interest point and a location corresponding to the target first location information comprises:
and sorting the distances between the position corresponding to the third position information of each first interest point and the position corresponding to the target first position information from small to large, and determining the first interest points corresponding to the N distances in the front ranking as the N target interest points corresponding to the first position information.
7. The method according to any one of claims 1 to 6, further comprising:
receiving a data query request for the first device;
according to the data query request, querying a motion track of first equipment from the database, wherein the motion track comprises a real track and an interference track;
and sending the motion trail.
8. A data processing apparatus for performing the method of any one of the preceding claims 1 to 7.
9. A data processing apparatus, characterized by comprising:
a memory for storing a program;
a processor for executing the program stored in the memory, the processor being adapted to perform the method of any of claims 1 to 7 when the program is executed.
10. A computer-readable storage medium comprising instructions which, when executed on a computer, cause the computer to perform the method of any one of claims 1 to 7.
CN202011193782.7A 2020-10-30 2020-10-30 Data processing method and device Active CN112257109B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011193782.7A CN112257109B (en) 2020-10-30 2020-10-30 Data processing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011193782.7A CN112257109B (en) 2020-10-30 2020-10-30 Data processing method and device

Publications (2)

Publication Number Publication Date
CN112257109A CN112257109A (en) 2021-01-22
CN112257109B true CN112257109B (en) 2023-04-07

Family

ID=74269052

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011193782.7A Active CN112257109B (en) 2020-10-30 2020-10-30 Data processing method and device

Country Status (1)

Country Link
CN (1) CN112257109B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104703138A (en) * 2015-03-19 2015-06-10 福建师范大学 Method and system for protecting location privacy
CN104754509A (en) * 2014-10-31 2015-07-01 南京邮电大学 LBS (Location Based Service) privacy protecting method based on position semantics K-anonymity
CN105516190A (en) * 2016-01-13 2016-04-20 福建师范大学 Position privacy protection method based on road network in continuous position service
WO2017193783A1 (en) * 2016-05-10 2017-11-16 北京京东尚科信息技术有限公司 Method and device for protecting user location information
CN108307380A (en) * 2018-01-26 2018-07-20 中国电子科技集团公司电子科学研究院 A kind of location of mobile users method for secret protection and mobile gateway
US10034135B1 (en) * 2011-06-08 2018-07-24 Dstillery Inc. Privacy-sensitive methods, systems, and media for geo-social targeting
CN110602145A (en) * 2019-09-30 2019-12-20 哈尔滨工程大学 Track privacy protection method based on location-based service
CN111259434A (en) * 2020-01-08 2020-06-09 广西师范大学 Privacy protection method for individual preference position in track data release
CN111650620A (en) * 2020-05-29 2020-09-11 电子科技大学 Track deception method based on GPS navigation

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10034135B1 (en) * 2011-06-08 2018-07-24 Dstillery Inc. Privacy-sensitive methods, systems, and media for geo-social targeting
CN104754509A (en) * 2014-10-31 2015-07-01 南京邮电大学 LBS (Location Based Service) privacy protecting method based on position semantics K-anonymity
CN104703138A (en) * 2015-03-19 2015-06-10 福建师范大学 Method and system for protecting location privacy
CN105516190A (en) * 2016-01-13 2016-04-20 福建师范大学 Position privacy protection method based on road network in continuous position service
WO2017193783A1 (en) * 2016-05-10 2017-11-16 北京京东尚科信息技术有限公司 Method and device for protecting user location information
CN108307380A (en) * 2018-01-26 2018-07-20 中国电子科技集团公司电子科学研究院 A kind of location of mobile users method for secret protection and mobile gateway
CN110602145A (en) * 2019-09-30 2019-12-20 哈尔滨工程大学 Track privacy protection method based on location-based service
CN111259434A (en) * 2020-01-08 2020-06-09 广西师范大学 Privacy protection method for individual preference position in track data release
CN111650620A (en) * 2020-05-29 2020-09-11 电子科技大学 Track deception method based on GPS navigation

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Rubén Álvarez 等.Multi-Objective Optimization for Asynchronous Positioning Systems Based on a Complete Characterization of Ranging Errors in 3D Complex Environments.《IEEE Access》.2020,第8卷 *
基于位置语义的位置服务(LBS)隐私保护研究;侯洁;《中国优秀硕士学位论文全文数据库(信息科技辑)》;20160215(第2期);第I138-101页 *

Also Published As

Publication number Publication date
CN112257109A (en) 2021-01-22

Similar Documents

Publication Publication Date Title
CN110674247A (en) Barrage information intercepting method and device, storage medium and equipment
CN108718341B (en) Method for sharing and searching data
Jin et al. A survey and experimental study on privacy-preserving trajectory data publishing
CN109583227A (en) A kind of method for protecting privacy, apparatus and system
CN111586695B (en) Short message identification method and related equipment
CN110445772B (en) Internet host scanning method and system based on host relationship
Li et al. Location privacy protection scheme for LBS in IoT
CN112257109B (en) Data processing method and device
Zhang et al. Protecting the moving user’s locations by combining differential privacy and k-anonymity under temporal correlations in wireless networks
Song et al. Efficient dummy generation for considering obstacles and protecting user location
CN112632614A (en) Preference perception track anonymization method and system
CN116127337B (en) Risk mining method, device, storage medium and equipment based on position and image
CN108111968B (en) Generalization-based location privacy protection method
Xia et al. Multiple attributes based spoofing detection using an improved clustering algorithm in mobile edge network
CN111800391B (en) Port scanning attack detection method and device, electronic equipment and storage medium
Lu et al. A novel method for location privacy protection in LBS applications
CN110457600B (en) Method, device, storage medium and computer equipment for searching target group
CN111611337B (en) Terminal data processing system
US11621944B2 (en) Systems and methods for anonymous and consistent data routing in a client-server architecture
Ruppel et al. Geocookie: A space-efficient representation of geographic location sets
Durmaz et al. Entering Watch Dogs: Evaluating Privacy Risks Against Large-Scale Facial Search and Data Collection
Dan et al. IP geolocation through geographic clicks
Zhang et al. A Local Differential Privacy Trajectory Protection Method Based on Temporal and Spatial Restrictions for Staying Detection
Jadallah et al. Aman: Spatial cloaking for privacy-aware location-based queries in the cloud
She et al. An improved malicious code intrusion detection method based on target tree for space information network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant