Efficient Scheme for User's Trajectory Privacy

LI Feng-hua,ZHANG Cui,NIU Ben,LI Hui,HUA Jia-feng,SHI Guo-zhen
DOI: https://doi.org/10.11959/j.issn.1000-436x.2015320
2015-01-01
Abstract:As one of the most important information in location-based services (LBS),the trajectory privacy for smart devices users has gained increasingly popularity over recent years.To address this problem,(k−1) dummy trajectories to achieve trajectory k-anonymity with comprehensively considering side information were generated,user's mobility pattern and the trajectory similarity etc.Without relying on the trusted third party,the scheme could provide trajectory k-anonymity against adversaries with side information by generating (k−1) realistic dummy trajectories.The evaluation results indicate its effectiveness and efficiency.
What problem does this paper attempt to address?