作者
Sheng Gao, Jianfeng Ma, Cong Sun, Xinghua Li
发表日期
2014/2/1
期刊
Journal of Network and Computer Applications
卷号
38
页码范围
125-134
出版商
Academic Press
简介
With the widespread use of location-based services (LBS), the number of trajectories gathered by location service providers is dynamically growing. On the one hand, mining and analyzing these spatiotemporal trajectories can help to work out a mobile-related strategic planning; on the other hand, knowledge of each trajectory can be used by adversaries to identify the user's sensitive information and lead to an unpredictable harm. The concept of trajectory k-anonymity extends from location k-anonymity that has been widely used to address this issue. The main challenge of trajectory k-anonymity is the selection of a trajectory k-anonymity set. However, existing anonymity methods ignore the trajectory similarity and direction, assuming that it has little impact on privacy. Thus, it cannot provide a preferable trajectory k-anonymity set. In this paper, we propose to use trajectory angle to evaluate trajectory similarity and …
引用总数
201420152016201720182019202020212022202320243751120141513671
学术搜索中的文章