Paper
6 June 2024 Trajectory privacy preserving method for transmission resources
Xingliang Zhang, Jiaruo Li, Yiran Cao, Zhaoming Su, Shitao Jiang
Author Affiliations +
Proceedings Volume 13175, International Conference on Computer Network Security and Software Engineering (CNSSE 2024); 1317507 (2024) https://doi.org/10.1117/12.3031947
Event: 4th International Conference on Computer Network Security and Software Engineering (CNSSE 2024), 2024, Sanya, China
Abstract
To protect the location privacy of key nodes in transmission routing, we have studied a trajectory privacy preserving method for transmission resources. By anonymizing the gis information of the whole route, that is, anonymizing all the location information including the first and last stations of the route. Firstly, the internal point of the whole optical cable is protected by grid protection method, and then a method based on Bayesian reasoning is proposed to protect the location privacy of the endpoints including starting point and destination. Through Bayesian inference process, it is proved that the starting point of optical cable routing can be protected by shear the point closest to the starting point and the destination, and the destination location protection algorithm can be obtained in the same way. In order to further improve the endpoints protection performance, we divide the day into different time spans according to the scene of optical cable inspection, and then integrate the anonymization process into this time span. By comparing the two endpoints prediction algorithms with Syn_sub and PBT, it is proved that the proposed endpoints protection algorithm is more effective than the classical algorithm.
(2024) Published by SPIE. Downloading of the abstract is permitted for personal use only.
Xingliang Zhang, Jiaruo Li, Yiran Cao, Zhaoming Su, and Shitao Jiang "Trajectory privacy preserving method for transmission resources", Proc. SPIE 13175, International Conference on Computer Network Security and Software Engineering (CNSSE 2024), 1317507 (6 June 2024); https://doi.org/10.1117/12.3031947
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Optical fiber cables

Data privacy

Inspection

Bayesian inference

Geographic information systems

Detection and tracking algorithms

Lithium

RELATED CONTENT

A method to recognize spams based on Dynamic-LSTM
Proceedings of SPIE (June 15 2022)
Feature matching algorithm based on spatial similarity
Proceedings of SPIE (November 07 2008)
Feature reduction methods for hyperspectral data
Proceedings of SPIE (October 05 2001)
Using level of detail for underway path finding solution
Proceedings of SPIE (November 05 2008)
A strategy of using remote sensing image to update the...
Proceedings of SPIE (November 03 2005)

Back to Top