Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Preventing location disclosure attacks through generating dummy trajectories
Xiangyu LIU, Jinmei CHEN, Xiufeng XIA, Manish Singh, Chuanyu ZONG, Rui ZHU
Journal of Computer Applications    2020, 40 (2): 479-485.   DOI: 10.11772/j.issn.1001-9081.2019081612
Abstract315)   HTML1)    PDF (836KB)(285)       Save

In order to solve the problem of trajectory privacy leakage caused by the collection of numerous trajectory information of moving objects, a dummy trajectory-based trajectory privacy protection algorithm was proposed. In this algorithm, considering the user’s locations under disclosure, a heuristic rule was designed based on the comprehensive measure of trajectory similarity and location diversity to select the dummy trajectories, so that the generated dummy trajectories were able to effectively hide the real trajectory and sensitive locations. Besides, the trajectory directed graph strategy and the grid-based map strategy were proposed to optimize the execution efficiency of the algorithm. Experimental results on real trajectory datasets demonstrate that the proposed algorithm can effectively protect the real trajectory with high data utility.

Table and Figures | Reference | Related Articles | Metrics