A Privacy-Preserving Trajectory Publication Method Based on Secure Start-Points and End-Points

By judging whether the start-point and end-point of a trajectory conform to the user’s behavioral habits, an attacker who possesses background knowledge can breach the anonymous trajectory. Traditional trajectory privacy preservation schemes often generate an anonymous set of trajectories without co...

Full description

Bibliographic Details
Main Authors: Yannian Zhao, Yonglong Luo, Qingying Yu, Zhaoyan Hu
Format: Article
Language:English
Published: Hindawi Limited 2020-01-01
Series:Mobile Information Systems
Online Access:http://dx.doi.org/10.1155/2020/3429256