Efficient scheme for user's trajectory privacy
As one of the most important information in location-based services (LBS),the trajectory privacy for smart devices users has gained increasingly popularity over recent years.To address this problem,(k−1) dummy trajectories to achieve trajectory k-anonymity with comprehensively considering side infor...
Saved in:
| Main Authors: | , , , , , |
|---|---|
| Format: | Article |
| Language: | zho |
| Published: |
Editorial Department of Journal on Communications
2015-12-01
|
| Series: | Tongxin xuebao |
| Subjects: | |
| Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2015320/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Summary: | As one of the most important information in location-based services (LBS),the trajectory privacy for smart devices users has gained increasingly popularity over recent years.To address this problem,(k−1) dummy trajectories to achieve trajectory k-anonymity with comprehensively considering side information were generated,user's mobility pattern and the trajectory similarity etc.Without relying on the trusted third party,the scheme could provide trajectory k-anonymity against adversaries with side information by generating (k−1) realistic dummy trajectories.The evaluation results indicate its effectiveness and efficiency. |
|---|---|
| ISSN: | 1000-436X |