2020
DOI: 10.1109/access.2020.3030038
|View full text |Cite
|
Sign up to set email alerts
|

A Semantic-Based Approach for Privacy-Preserving in Trajectory Publishing

Abstract: The increasing abundance of data in the trajectories of personal movement opens up new opportunities for analyzing and mining human mobility. But the inherent personal information in the data raises the privacy concern. In this paper, the trajectories are not simply considered as a sequence of the coordinates in Euclidean space, they combine the semantics-aware information with the background knowledge of underlying map for the location points. A novel approach is then proposed to conceal the actually visited … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(9 citation statements)
references
References 28 publications
(40 reference statements)
0
9
0
Order By: Relevance
“…find new position with Dis(D, L e+k ′ ) � dis k (13) end for (14) trajectory. e measurement of similarity can not only be conducted in time and space, but also in the trajectory shape.…”
Section: Experiments and Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…find new position with Dis(D, L e+k ′ ) � dis k (13) end for (14) trajectory. e measurement of similarity can not only be conducted in time and space, but also in the trajectory shape.…”
Section: Experiments and Analysismentioning
confidence: 99%
“…STDP in reference [13] selected a POI in sensitive areas containing k − 1 POI points which are similar to the sensitive points. SBA in reference [14] selected the same type of POI based on the classification tree of POI in the cloaking region. e availability of each scheme is measured by trajectory location distance, trajectory shape distance, and trajectory distance.…”
Section: Usability Comparisonmentioning
confidence: 99%
See 1 more Smart Citation
“…As the threat of semantic attacks to privacy becomes more and more serious, the methods to enhance the protection of personal semantic privacy also attract the attention of academic circles. To enhance semantic privacy level with physical constrain, Ye et al in [26] considered roadnetwork semantic information to choose anonymous location for anonymization. Combining the semantics-aware information with the background semantic knowledge of the underlying map, a novel approach is proposed to anonymization and thus conceal the visited places.…”
Section: Related Workmentioning
confidence: 99%
“…Second, semantic information brings a new challenge to the anonymity set. While exploiting the feature that semantic information can reflect the deeper implicit content of transactions can improve the accuracy of the model, it also creates new challenges for privacy protection [26,27]. Semantic information can help an attacker to identify the true location in an anonymous set although anonymity has been achieved.…”
Section: Introductionmentioning
confidence: 99%