Efficient scheme for user's trajectory privacy
As one of the most important information in location-based services (LBS),the trajectory privacy for smart devices users has gained increasingly popularity over recent years.To address this problem,(k−1) dummy trajectories to achieve trajectory k-anonymity with comprehensively considering side infor...
| Published in: | Tongxin xuebao |
|---|---|
| Main Authors: | , , , , , |
| Format: | Article |
| Language: | Chinese |
| Published: |
Editorial Department of Journal on Communications
2015-12-01
|
| Subjects: | |
| Online Access: | http://www.joconline.com.cn/thesisDetails#10.11959/j.issn.1000-436x.2015320 |
| _version_ | 1850046721343619072 |
|---|---|
| author | Feng-hua LI Cui ZHANG Ben NIU Hui LI Jia-feng HUA Guo-zhen SHI |
| author_facet | Feng-hua LI Cui ZHANG Ben NIU Hui LI Jia-feng HUA Guo-zhen SHI |
| author_sort | Feng-hua LI |
| collection | DOAJ |
| container_title | Tongxin xuebao |
| description | As one of the most important information in location-based services (LBS),the trajectory privacy for smart devices users has gained increasingly popularity over recent years.To address this problem,(k−1) dummy trajectories to achieve trajectory k-anonymity with comprehensively considering side information were generated,user's mobility pattern and the trajectory similarity etc.Without relying on the trusted third party,the scheme could provide trajectory k-anonymity against adversaries with side information by generating (k−1) realistic dummy trajectories.The evaluation results indicate its effectiveness and efficiency. |
| format | Article |
| id | doaj-art-b621237c9d994bfbab7676f7dee3fc74 |
| institution | Directory of Open Access Journals |
| issn | 1000-436X |
| language | zho |
| publishDate | 2015-12-01 |
| publisher | Editorial Department of Journal on Communications |
| record_format | Article |
| spelling | doaj-art-b621237c9d994bfbab7676f7dee3fc742025-08-20T00:28:50ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2015-12-013611412359697151Efficient scheme for user's trajectory privacyFeng-hua LICui ZHANGBen NIUHui LIJia-feng HUAGuo-zhen SHIAs one of the most important information in location-based services (LBS),the trajectory privacy for smart devices users has gained increasingly popularity over recent years.To address this problem,(k−1) dummy trajectories to achieve trajectory k-anonymity with comprehensively considering side information were generated,user's mobility pattern and the trajectory similarity etc.Without relying on the trusted third party,the scheme could provide trajectory k-anonymity against adversaries with side information by generating (k−1) realistic dummy trajectories.The evaluation results indicate its effectiveness and efficiency.http://www.joconline.com.cn/thesisDetails#10.11959/j.issn.1000-436x.2015320wireless network security;location-based services;location privacy;trajectory privacy |
| spellingShingle | Feng-hua LI Cui ZHANG Ben NIU Hui LI Jia-feng HUA Guo-zhen SHI Efficient scheme for user's trajectory privacy wireless network security;location-based services;location privacy;trajectory privacy |
| title | Efficient scheme for user's trajectory privacy |
| title_full | Efficient scheme for user's trajectory privacy |
| title_fullStr | Efficient scheme for user's trajectory privacy |
| title_full_unstemmed | Efficient scheme for user's trajectory privacy |
| title_short | Efficient scheme for user's trajectory privacy |
| title_sort | efficient scheme for user s trajectory privacy |
| topic | wireless network security;location-based services;location privacy;trajectory privacy |
| url | http://www.joconline.com.cn/thesisDetails#10.11959/j.issn.1000-436x.2015320 |
| work_keys_str_mv | AT fenghuali efficientschemeforuserstrajectoryprivacy AT cuizhang efficientschemeforuserstrajectoryprivacy AT benniu efficientschemeforuserstrajectoryprivacy AT huili efficientschemeforuserstrajectoryprivacy AT jiafenghua efficientschemeforuserstrajectoryprivacy AT guozhenshi efficientschemeforuserstrajectoryprivacy |
