A Trajectory Privacy Protection Method Based on Random Sampling Differential Privacy [PDF]
With the popularity of location-aware devices (e.g., smart phones), a large number of trajectory data were collected. The trajectory dataset can be used in many fields including traffic monitoring, market analysis, city management, etc.
Tinghuai Ma, Fagen Song
doaj +4 more sources
Trajectory privacy protection scheme based on differential privacy
To solve the problem that the current sampling mechanism and data obfuscation method may raise insufficient data availability and privacy protection, a trajectory privacy protection scheme based on differential privacy was proposed.A new efficient ...
Si CHEN +3 more
doaj +3 more sources
Interchange-Based Privacy Protection for Publishing Trajectories [PDF]
Information extracted from trajectory data is very useful in many practical application scenarios. Before trajectories for data mining are published, they need to be processed to protect the privacy of the trajectories' bodies.
Shuai Wang +3 more
doaj +2 more sources
CLM:differential privacy protection method for trajectory publishing
In order to solve the problem existing in differential privacy preserving publishing methods that the independent noise was easy to be filtered out,a differential privacy publishing method for trajectory data (CLM),was proposed.A correlated Laplace ...
Hao WANG +3 more
doaj +3 more sources
Trajectory privacy protection method based on location obfuscation
In the process of continuous queries,a method of trajectory privacy protection based on location obfuscation was proposed to solve the problem that K-anonymity was difficult to guarantee user privacy in third party architectrue.Firstly,the (G-1) query ...
Shaobo ZHANG, Qin LIU, Guojun WANG
doaj +3 more sources
Trajectory differential privacy protection method based on exponential mechanism
A trajectory differential privacy protection method based on exponential mechanism was proposed, aiming at the problem of privacy disclosure caused by ignoring semantic information carried by location points in traditional trajectory data protection.For ...
Huicong JIAO, Wenju LIU, Ze WANG
doaj +1 more source
Trajectory privacy protection mechanism of obfuscating paths based on vehicles cooperation
Vehicles sent location information to third parties to obtain location-based services in the Internet of vehicles, which may lead to vehicle trajectory privacy leakage.
ZHAO Ziwen, YE Ayong, JIN Junlin, MENG Lingyu
doaj +3 more sources
Differential privacy protection method based on published trajectory cross-correlation constraint.
Aiming to solve the problem of low data utilization and privacy protection, a personalized differential privacy protection method based on cross-correlation constraints is proposed.
Zhaowei Hu, Jing Yang
doaj +1 more source
Risk-Aware Individual Trajectory Data Publishing With Differential Privacy
Large-scale spatiotemporal data mining has created valuable insights into managing key areas of society and the economy. It has encouraged data owners to release/publish trajectory datasets. However, the ill-informed publication of such valuable datasets
Jianzhe Zhao +4 more
doaj +1 more source
Towards trajectory anonymization: a generalization-based approach [PDF]
Trajectory datasets are becoming popular due to the massive usage of GPS and locationbased services. In this paper, we address privacy issues regarding the identification of individuals in static trajectory datasets.
Atzori, Maurizio +5 more
core +2 more sources

