2021
DOI: 10.1007/s10922-021-09617-5
|View full text |Cite
|
Sign up to set email alerts
|

Personalized Privacy-Preserving Publication of Trajectory Data by Generalization and Distortion of Moving Points

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(2 citation statements)
references
References 43 publications
0
2
0
Order By: Relevance
“…This method uses location generalization and local differential privacy technology, which can not only protect trajectory privacy but also maintain the strong correlation between adjacent spatiotemporal nodes in the trajectory. Mahdavifar et al 18 proposed a trajectory data publishing scheme. Firstly, each trajectory is assigned a privacy level according to the privacy protection requirements of its moving objects, then all trajectories are divided into a set of clusters based on a greedy strategy, the trajectories of the clusters are anonymized, and the data is finally released.…”
Section: Related Workmentioning
confidence: 99%
“…This method uses location generalization and local differential privacy technology, which can not only protect trajectory privacy but also maintain the strong correlation between adjacent spatiotemporal nodes in the trajectory. Mahdavifar et al 18 proposed a trajectory data publishing scheme. Firstly, each trajectory is assigned a privacy level according to the privacy protection requirements of its moving objects, then all trajectories are divided into a set of clusters based on a greedy strategy, the trajectories of the clusters are anonymized, and the data is finally released.…”
Section: Related Workmentioning
confidence: 99%
“…These technologies have many benefits such as processing and collecting large-scale datasets in order to identify hidden knowledge [189]. Although these technologies have many benefits, individual and group privacy issues of various kinds can emanate from data processing [190][191][192][193]. Hence, these technologies are adopting many privacy-preserving solutions to address this group privacy problem [194][195][196].…”
Section: Group Privacy Preservation In Different Computing Paradigmsmentioning
confidence: 99%