Differential privacy protection method based on published trajectory cross-correlation constraint.
Aiming to solve the problem of low data utilization and privacy protection, a personalized differential privacy protection method based on cross-correlation constraints is proposed.
Zhaowei Hu, Jing Yang
doaj +1 more source
Trajectory privacy data publishing scheme based on local optimisation and R-tree
The proliferation of location-based service applications has led to a substantial surge in the amount of life trajectory data produced by mobile devices. And these data frequently contain confidential personal details.
Peiqian Liu +3 more
doaj +1 more source
Privacy Preservation in the Publication of Trajectories [PDF]
We study the problem of protecting privacy in the publication of location sequences. Consider a database of trajectories, corresponding to movements of people, captured by their transactions when they use credit or RFID debit cards. We show that, if such trajectories are published exactly (by only hiding the identities of persons that followed them ...
Mamoulis, N, Terrovitis, M
openaire +2 more sources
IFTS: A Location Privacy Protection Method Based on Initial and Final Trajectory Segments
Privacy protection problem is one of the most concerning issues related to Location-Based Services (LBS) in our daily life. Privacy protection of LBS often requires anonymizing customer's trajectory data.
Jiuyun Xu +5 more
doaj +1 more source
Trajectory data privacy protection based on differential privacy mechanism
In this paper, we propose a trajectory data privacy protection scheme based on differential privacy mechanism. In the proposed scheme, the algorithm first selects the protected points from the user's trajectory data; secondly, the algorithm forms the polygon according to the protected points and the adjacent and high frequent accessed points that are ...
Ke Gu, Lihao Yang, Yongzhi Liu, Bo Yin
openaire +2 more sources
Trajectory privacy protection mechanism of obfuscating paths based on vehicles cooperation
Vehicles sent location information to third parties to obtain location-based services in the Internet of vehicles,which may lead to vehicle trajectory privacy leakage.To address the privacy problem,trajectory privacy protection mechanism of obfuscating ...
Ziwen ZHAO +3 more
doaj +3 more sources
With the popularity of location services and the widespread use of trajectory data, trajectory privacy protection has become a popular research area. k-anonymity technology is a common method for achieving privacy-preserved trajectory publishing.
Hua Shen, Yu Wang, Mingwu Zhang
doaj +1 more source
PPTPF: Privacy-Preserving Trajectory Publication Framework for CDR Mobile Trajectories [PDF]
As mobile phone technology evolves quickly, people could use mobile phones to conduct business, watch entertainment shows, order food, and many more. These location-based services (LBS) require users’ mobility data (trajectories) in order to provide many useful services.
Jianxi Yang, Manoranjan Dash, Sin G. Teo
openaire +2 more sources
Trajectory differential privacy protection mechanism based on prediction and sliding window
To address the issues of privacy budget and quality of service in trajectory differential privacy protection,a trajectory differential privacy mechanism integrating prediction disturbance was proposed.Firstly,Markov chain and exponential perturbation ...
Ayong YE +4 more
doaj +2 more sources
Differentially private count queries over personalized-location trajectory databases
Differential privacy is a technique for releasing statistical information about a database without revealing information about its individual data records.
Fatemeh Deldar, Mahdi Abadi
doaj +1 more source

