A Privacy-Preserving Trajectory Publication Method Based on Secure Start-Points and End-Points
By judging whether the start-point and end-point of a trajectory conform to the user’s behavioral habits, an attacker who possesses background knowledge can breach the anonymous trajectory. Traditional trajectory privacy preservation schemes often generate an anonymous set of trajectories without co...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi Limited
2020-01-01
|
Series: | Mobile Information Systems |
Online Access: | http://dx.doi.org/10.1155/2020/3429256 |