2021
DOI: 10.1109/access.2021.3052169
|View full text |Cite
|
Sign up to set email alerts
|

IFTS: A Location Privacy Protection Method Based on Initial and Final Trajectory Segments

Abstract: Privacy protection problem is one of the most concerning issues related to Location-Based Services (LBS) in our daily life. Privacy protection of LBS often requires anonymizing customer's trajectory data. Currently available methods for trajectory anonymity often assume an entire trajectory as one anonymous unit, which may lead to low anonymity efficiency due to the massive amount of trajectory data, especially for customers travel through a long road. Considering people's routine activities, the starting and … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(1 citation statement)
references
References 28 publications
0
1
0
Order By: Relevance
“…Mobile edge nodes installed in each LAN gather and aggregate essential or non-malicious local updates during the edge aggregation phase because each global aggregation uses network connection and cloud computing resources. Once the edge aggregated models have been delivered to the cloud server for global aggregation, delay associated with high concurrent access to the server is avoided, and the utilization of the computing resources of the mobile edge nodes is rationalized to relieve the load on the cloud [12]. The main contributions of this paper are as follows:…”
Section: Introductionmentioning
confidence: 99%
“…Mobile edge nodes installed in each LAN gather and aggregate essential or non-malicious local updates during the edge aggregation phase because each global aggregation uses network connection and cloud computing resources. Once the edge aggregated models have been delivered to the cloud server for global aggregation, delay associated with high concurrent access to the server is avoided, and the utilization of the computing resources of the mobile edge nodes is rationalized to relieve the load on the cloud [12]. The main contributions of this paper are as follows:…”
Section: Introductionmentioning
confidence: 99%