2019
DOI: 10.1109/access.2019.2960008
|View full text |Cite
|
Sign up to set email alerts
|

LRM: A Location Recombination Mechanism for Achieving Trajectory $k$ -Anonymity Privacy Protection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 13 publications
(12 citation statements)
references
References 38 publications
0
11
0
Order By: Relevance
“…These schemes are DLS [ 13 ], EDLS [ 13 ], MOS [ 19 ], K-DLCA [ 20 ], etc. For trajectory privacy protection, Wang et al [ 21 ] construct a probabilistic model based on historical location data. The model calculates the location access probability and location transfer probability.…”
Section: Related Workmentioning
confidence: 99%
“…These schemes are DLS [ 13 ], EDLS [ 13 ], MOS [ 19 ], K-DLCA [ 20 ], etc. For trajectory privacy protection, Wang et al [ 21 ] construct a probabilistic model based on historical location data. The model calculates the location access probability and location transfer probability.…”
Section: Related Workmentioning
confidence: 99%
“…[21] proposed a k-anonymity location privacy scheme based on an auction mechanism. To achieve trajectory k-anonymity privacy protection, [22] proposed Location Recombination Mechanism (LRM) which could generate k-1 fake trajectories similar to base trajectories in terms of geographical features and probabilistic features.…”
Section: Spatial Cloaking Location Privacy Protectionmentioning
confidence: 99%
“…The anonymity mechanism is mainly utilized to generate an anonymous set by means of generalization, bucketization, suppression, etc., so that the indistinguishable pairs in potential secrets reach the anonymity threshold. Researchers have proposed a variety of trajectory anonymity methods to ensure that the published trajectories meet specific threshold requirements [37]- [39]. Different algorithms improve the indistinguishability of protection targets by selecting different aggregation criteria.…”
Section: Related Work a Privacy-preserved Trajectory Data Publismentioning
confidence: 99%