Successive Trajectory Privacy Protection with Semantics Prediction Differential Privacy [PDF]
The publication of trajectory data provides critical information for various location-based services, and it is critical to publish trajectory data safely while ensuring its availability.
Jing Zhang +4 more
doaj +4 more sources
A Vehicle Trajectory Privacy Preservation Method Based on Caching and Dummy Locations in the Internet of Vehicles [PDF]
In the internet of vehicles (IoVs), vehicle users should provide location information continuously when they want to acquire continuous location-based services (LBS), which may disclose the vehicle trajectory privacy.
Qianyong Huang +3 more
doaj +2 more sources
Spatiotemporal Mobility Based Trajectory Privacy-Preserving Algorithm in Location-Based Services [PDF]
Recent years have seen the wide application of Location-Based Services (LBSs) in our daily life. Although users can enjoy many conveniences from the LBSs, they may lose their trajectory privacy when their location data are collected.
Zhiping Xu +4 more
doaj +2 more sources
A Trajectory Privacy Preserving Scheme in the CANNQ Service for IoT [PDF]
Nowadays, anyone carrying a mobile device can enjoy the various location-based services provided by the Internet of Things (IoT). ‘Aggregate nearest neighbor query’ is a new type of location-based query which asks the question, ‘what is
Lin Zhang +4 more
doaj +2 more sources
KSDP scheme for trajectory data publishing
For clustering applications in the field of trajectory privacy protection, the k-means algorithm is sensitive to initial values and the number of clusters may be somewhat arbitrary.
ZHANG Jun +4 more
doaj +1 more source
Trajectory-Differential Privacy-Protection Method with Interest Region
Trajectory data privacy protection method is a hot topic in data privacy protection research field. Most of existing trajectory data privacy protection methods adopt the strategy of adding noise to all locations, which reduces the availability of data ...
LAN Wei, LIN Ying, BAO Lingyan, LI Tong, CHEN Mengrong, SHAN Jinzhao
doaj +1 more source
A trajectory data publishing algorithm satisfying local suppression
Suppressing the trajectory data to be released can effectively reduce the risk of user privacy leakage. However, the global suppression of the data set to meet the traditional privacy model method reduces the availability of trajectory data.
Xiaohui Li +3 more
doaj +1 more source
Privacy-Preserving Trajectory Data Publishing by Dynamic Anonymization with Bounded Distortion
Publication of trajectory data that contain rich information of vehicles in the dimensions of time and space (location) enables online monitoring and supervision of vehicles in motion and offline traffic analysis for various management tasks. However, it
Songyuan Li +3 more
doaj +1 more source
Towards trajectory anonymization: a generalization-based approach [PDF]
Trajectory datasets are becoming popular due to the massive usage of GPS and locationbased services. In this paper, we address privacy issues regarding the identification of individuals in static trajectory datasets.
Atzori, Maurizio +5 more
core +2 more sources
Maintaining trajectory privacy in mobile wireless sensor networks [PDF]
Mobile wireless sensor networks (MWSN) is a subdomain of wireless sensor networks in which sensors and/or sinks are mobile. In this study, we propose a scheme for providing trajectory privacy of mobile sink nodes.
Kiraz, Osman, Levi, Albert
core +2 more sources

