Trajectory privacy protection method based on location obfuscation
In the process of continuous queries,a method of trajectory privacy protection based on location obfuscation was proposed to solve the problem that K-anonymity was difficult to guarantee user privacy in third party architectrue.Firstly,the (G-1) query obfuscation locations through the location predi...
Saved in:
Main Authors: | Shaobo ZHANG, Qin LIU, Guojun WANG |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2018-07-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018119/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Trajectory privacy protection mechanism of obfuscating paths based on vehicles cooperation
by: Ziwen ZHAO, et al.
Published: (2019-08-01) -
Dummy location selection algorithm based on location semantics and query probability
by: Jie WANG, et al.
Published: (2020-03-01) -
KAP:location privacy-preserving approach in location services
by: Yu-hang WANG, et al.
Published: (2014-11-01) -
Privacy enhancing method for dummy-based privacy protection with continuous location-based service queries
by: Hai LIU, et al.
Published: (2016-07-01) -
Efficient scheme for user's trajectory privacy
by: Feng-hua LI, et al.
Published: (2015-12-01)