2022
DOI: 10.1109/tii.2021.3116529
|View full text |Cite
|
Sign up to set email alerts
|

Local Trajectory Privacy Protection in 5G Enabled Industrial Intelligent Logistics

Abstract: The value of trajectory data lies mainly in the spatiotemporal correlation. However, the existing privacy protection methods ignore the spatio-temporal correlation of trajectory data, resulting in a large error in trajectory proportion estimation and Top-K classification. For the privacy of truck trajectory in intelligent logistics, the location and trajectory data perturbation method based on quadtree indexing is proposed, which leverages location generalization and local differential privacy techniques. Our … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 28 publications
(12 citation statements)
references
References 26 publications
0
12
0
Order By: Relevance
“…Numerous experimental results have demonstrated that our proposed scheme significantly outperforms the baseline schemes and can effectively reduce system latency. There still exist some challenges to be addressed, such as security and privacy issues of avatar data migration [45], and energy-efficient decisions for migration [46]. In our future work, we consider using blockchain or other advanced privacy-preserving artificial intelligence algorithms to achieve data security and privacy protection during avatar migration in vehicular metaverses.…”
Section: Discussionmentioning
confidence: 99%
“…Numerous experimental results have demonstrated that our proposed scheme significantly outperforms the baseline schemes and can effectively reduce system latency. There still exist some challenges to be addressed, such as security and privacy issues of avatar data migration [45], and energy-efficient decisions for migration [46]. In our future work, we consider using blockchain or other advanced privacy-preserving artificial intelligence algorithms to achieve data security and privacy protection during avatar migration in vehicular metaverses.…”
Section: Discussionmentioning
confidence: 99%
“…The articles dealing with transportation are all related to the traceability of both parcels and vehicles, in particular concerning various critical issues concerning mainly cyber security [29,30] and the need to integrate different technologies, databases and formats [31,32] even among different countries [33].…”
Section: Topicsmentioning
confidence: 99%
“…Embedded Microprocessors and Edge Computing are cited as promising technologies to perform efficient datapreprocessing combined to 5G: the first through the filtering of relevant information for the specific application and the latter through a decentralized computational model in which data, particularly critical from the most latencysensitive applications, are analyzed directly where they are detected [33,37]. Logistics companies use cloud systems as a platform for storing information [29] and, as highlighted by [5,18,26], Blockchain constitutes one of the most advanced and reliable technology to ensure the data security in distributed, open environments, in accordance to the requirements of 5G networks architectures. Finally, technologies for data analytics such as Machine Learning, Artificial Intelligence, Simulation, and Augmented Reality have been cited in research studies that exploit the 5G network to feed intelligent optimisation systems, able to leverage real-time data from equipment (e.g., drones and AGVs) to provide a timely decision about transportation routes, last-mile delivery, supply chain networks, malfunctioning recovery [21,26,34,36,37,41].…”
Section: Technologiesmentioning
confidence: 99%
“…And a privacy‐level assignment method based on stay points and frequent sub‐trajectories is proposed, which uses differential privacy technology to perturb the location points on the user's trajectory before releasing the trajectory data. Yang et al 17 proposed a location trajectory data perturbation method based on quadtree index. This method uses location generalization and local differential privacy technology, which can not only protect trajectory privacy but also maintain the strong correlation between adjacent spatiotemporal nodes in the trajectory.…”
Section: Related Workmentioning
confidence: 99%