Tongxin xuebao (Dec 2015)
Efficient scheme for user's trajectory privacy
Abstract
As one of the most important information in location-based services (LBS),the trajectory privacy for smart devices users has gained increasingly popularity over recent years.To address this problem,(k−1) dummy trajectories to achieve trajectory k-anonymity with comprehensively considering side information were generated,user's mobility pattern and the trajectory similarity etc.Without relying on the trusted third party,the scheme could provide trajectory k-anonymity against adversaries with side information by generating (k−1) realistic dummy trajectories.The evaluation results indicate its effectiveness and efficiency.