2020
DOI: 10.1088/1757-899x/768/7/072025
|View full text |Cite
|
Sign up to set email alerts
|

False Trajectory Privacy Protection Scheme Based on Location Service

Abstract: When the user applies for a location continuous query service, the user location privacy may be revealed due to different types of trajectory identification. A false trajectory privacy protection scheme is proposed, which uses the real-time generation of similar trajectories to protect the user’s personal location privacy. The false location set is established by initial anonymous location selection, similar trajectory location calculation and generated location selection. The false location is used to form a … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 14 publications
0
2
0
Order By: Relevance
“…Zhang [ 20 ] proposed the algorithm, which constructs a dummy location set by randomly selecting probabilistic similarity offset locations under guaranteed semantic distinction, improved security of location privacy, avoiding background knowledge attacks, edge information attacks, and homogeneity attacks to some extent. Yang [ 21 ] generated similar trajectories in real-time by the angle and distance between real trajectory points during continuous query service, which can also prevent edge information attacks when protecting user trajectories. Guo [ 22 ] introduced a new query privacy algorithm for continuous querying of location-based services that consider users with similar directions, speeds, and the same transmission patterns for anonymization, thus protecting users’ privacy throughout the query cycle.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Zhang [ 20 ] proposed the algorithm, which constructs a dummy location set by randomly selecting probabilistic similarity offset locations under guaranteed semantic distinction, improved security of location privacy, avoiding background knowledge attacks, edge information attacks, and homogeneity attacks to some extent. Yang [ 21 ] generated similar trajectories in real-time by the angle and distance between real trajectory points during continuous query service, which can also prevent edge information attacks when protecting user trajectories. Guo [ 22 ] introduced a new query privacy algorithm for continuous querying of location-based services that consider users with similar directions, speeds, and the same transmission patterns for anonymization, thus protecting users’ privacy throughout the query cycle.…”
Section: Introductionmentioning
confidence: 99%
“…Spatial similarity [21] Spatial similarity Sim spa (p i , p j ) refers to the degree of geographic closeness between two points. In our method, we calculate spatial similarity by employing the Euclidean distance:…”
mentioning
confidence: 99%