Efficient scheme for user's trajectory privacy

As one of the most important information in location-based services (LBS),the trajectory privacy for smart devices users has gained increasingly popularity over recent years.To address this problem,(k−1) dummy trajectories to achieve trajectory k-anonymity with comprehensively considering side infor...

Full description

Bibliographic Details
Published in:Tongxin xuebao
Main Authors: Feng-hua LI, Cui ZHANG, Ben NIU, Hui LI, Jia-feng HUA, Guo-zhen SHI
Format: Article
Language:Chinese
Published: Editorial Department of Journal on Communications 2015-12-01
Subjects:
Online Access:http://www.joconline.com.cn/thesisDetails#10.11959/j.issn.1000-436x.2015320
_version_ 1850046721343619072
author Feng-hua LI
Cui ZHANG
Ben NIU
Hui LI
Jia-feng HUA
Guo-zhen SHI
author_facet Feng-hua LI
Cui ZHANG
Ben NIU
Hui LI
Jia-feng HUA
Guo-zhen SHI
author_sort Feng-hua LI
collection DOAJ
container_title Tongxin xuebao
description As one of the most important information in location-based services (LBS),the trajectory privacy for smart devices users has gained increasingly popularity over recent years.To address this problem,(k−1) dummy trajectories to achieve trajectory k-anonymity with comprehensively considering side information were generated,user's mobility pattern and the trajectory similarity etc.Without relying on the trusted third party,the scheme could provide trajectory k-anonymity against adversaries with side information by generating (k−1) realistic dummy trajectories.The evaluation results indicate its effectiveness and efficiency.
format Article
id doaj-art-b621237c9d994bfbab7676f7dee3fc74
institution Directory of Open Access Journals
issn 1000-436X
language zho
publishDate 2015-12-01
publisher Editorial Department of Journal on Communications
record_format Article
spelling doaj-art-b621237c9d994bfbab7676f7dee3fc742025-08-20T00:28:50ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2015-12-013611412359697151Efficient scheme for user's trajectory privacyFeng-hua LICui ZHANGBen NIUHui LIJia-feng HUAGuo-zhen SHIAs one of the most important information in location-based services (LBS),the trajectory privacy for smart devices users has gained increasingly popularity over recent years.To address this problem,(k−1) dummy trajectories to achieve trajectory k-anonymity with comprehensively considering side information were generated,user's mobility pattern and the trajectory similarity etc.Without relying on the trusted third party,the scheme could provide trajectory k-anonymity against adversaries with side information by generating (k−1) realistic dummy trajectories.The evaluation results indicate its effectiveness and efficiency.http://www.joconline.com.cn/thesisDetails#10.11959/j.issn.1000-436x.2015320wireless network security;location-based services;location privacy;trajectory privacy
spellingShingle Feng-hua LI
Cui ZHANG
Ben NIU
Hui LI
Jia-feng HUA
Guo-zhen SHI
Efficient scheme for user's trajectory privacy
wireless network security;location-based services;location privacy;trajectory privacy
title Efficient scheme for user's trajectory privacy
title_full Efficient scheme for user's trajectory privacy
title_fullStr Efficient scheme for user's trajectory privacy
title_full_unstemmed Efficient scheme for user's trajectory privacy
title_short Efficient scheme for user's trajectory privacy
title_sort efficient scheme for user s trajectory privacy
topic wireless network security;location-based services;location privacy;trajectory privacy
url http://www.joconline.com.cn/thesisDetails#10.11959/j.issn.1000-436x.2015320
work_keys_str_mv AT fenghuali efficientschemeforuserstrajectoryprivacy
AT cuizhang efficientschemeforuserstrajectoryprivacy
AT benniu efficientschemeforuserstrajectoryprivacy
AT huili efficientschemeforuserstrajectoryprivacy
AT jiafenghua efficientschemeforuserstrajectoryprivacy
AT guozhenshi efficientschemeforuserstrajectoryprivacy