Journal of Computer and Communications

Volume 6, Issue 2 (February 2018)

ISSN Print: 2327-5219   ISSN Online: 2327-5227

Google-based Impact Factor: 1.12  Citations  

Trajectory Rotation Privacy Protection Algorithm Based on k Anonymity

HTML  XML Download Download as PDF (Size: 560KB)  PP. 36-47  
DOI: 10.4236/jcc.2018.62004    921 Downloads   1,667 Views  Citations

ABSTRACT

The frequent use of location query services in location-based services will come out a large amount of space-time data related to users. Attackers infer information of location or track based on these rich background knowledge. Therefore, aiming at the problem of trajectory privacy, the context adds instant traffic monitoring based on user behavior patterns, trajectory similarity and other background information. According to the idea of k anonymity, proposed a method combined with traffic condition to protect the trajectory privacy. First, the user randomly selects a time point of the real trajectory to rotate to generate dummy trajectory, and then repeat the above process on the real trajectory and dummy trajectory. Up to the generation of k 1 dummy trajectory, and according to the actual road conditions and trajectory leakage probability, traversing dummy trajectory to adjust. Finally, it is further proved through experiments that the method will be more efficient and protect privacy well.

Share and Cite:

Liu, Z. , Zhao, X. , Dong, Y. and Zhang, B. (2018) Trajectory Rotation Privacy Protection Algorithm Based on k Anonymity. Journal of Computer and Communications, 6, 36-47. doi: 10.4236/jcc.2018.62004.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.