2018
DOI: 10.1504/ijict.2018.094321
|View full text |Cite
|
Sign up to set email alerts
|

Method of trajectory privacy protection based on restraining trajectory in LBS

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…Although numerous location protection methods have been presented over the last ten years, they either lack necessary privacy protection or have too high computational costs with precise mathematical justification. There are several types of methods used to protect location privacy at home and abroad: the first one is suppression method, 3 which is to protect user privacy by suppressing sensitive background information based on a priori knowledge. However, in order to achieve better protection performance, this method needs to delete too much data, which leads to a large amount of data loss and low data availability.…”
Section: Introductionmentioning
confidence: 99%
“…Although numerous location protection methods have been presented over the last ten years, they either lack necessary privacy protection or have too high computational costs with precise mathematical justification. There are several types of methods used to protect location privacy at home and abroad: the first one is suppression method, 3 which is to protect user privacy by suppressing sensitive background information based on a priori knowledge. However, in order to achieve better protection performance, this method needs to delete too much data, which leads to a large amount of data loss and low data availability.…”
Section: Introductionmentioning
confidence: 99%
“…Chen and Deng (2018) proposed a scheme to protect privacy information including location, identity, and domain, while the user can still obtain the required service from a service provider. The privacy protection method based on LBS constraint trajectory proposed by Zhao et al (2018) is to select the non-sensitive location with the maximum probability that the user may stay to replace the sensitive location by inhibiting the release of the sensitive location, so as to prevent the leakage of the sensitive location of the user's trajectory. Besides, both the privacy protection in wireless sensor networks (Khenous et al, 2018;Ozdemir et al, 2014) and the privacy issues in V2G networks (Han and Xiao, 2016) are to improve the service quality of data on the basis of privacy protection.…”
Section: Introductionmentioning
confidence: 99%