Computing With Spatial Trajectories 2011
DOI: 10.1007/978-1-4614-1629-6_4
|View full text |Cite
|
Sign up to set email alerts
|

Privacy of Spatial Trajectories

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2012
2012
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 27 publications
(22 citation statements)
references
References 24 publications
0
22
0
Order By: Relevance
“…Various methods of user privacy preservation of spatial trajectory computation have been proposed [11], but most of them do not meet our need, consistent user identities. There are two methods, spatial cloaking and dummy locations/trajectories, has the feature of consistent user identities and are introduced in this subsection.…”
Section: B Privacy Preservation Of Spatial Trajectoriesmentioning
confidence: 99%
“…Various methods of user privacy preservation of spatial trajectory computation have been proposed [11], but most of them do not meet our need, consistent user identities. There are two methods, spatial cloaking and dummy locations/trajectories, has the feature of consistent user identities and are introduced in this subsection.…”
Section: B Privacy Preservation Of Spatial Trajectoriesmentioning
confidence: 99%
“…Therefore, tracking data are stored without any reference to a user's identification. There are various anonymisers (Chow and Mokbel 2011). This paper uses the K-anonymity program , which is trusted third party software often used on tracking data (Chow and Mokbel 2011).…”
Section: Validation Using Crowd-sourced Trajectory Miningmentioning
confidence: 99%
“…There are various anonymisers (Chow and Mokbel 2011). This paper uses the K-anonymity program , which is trusted third party software often used on tracking data (Chow and Mokbel 2011). The data are stored in centralized systems or on decentralized peer devices (Ghinita, Kalnis, and Skiadopoulos 2007).…”
Section: Validation Using Crowd-sourced Trajectory Miningmentioning
confidence: 99%
“…Let the dimensionality of each location point be l, that is, x i , y j ∈ R l . Table maintained during DTW computation between X = (2, 3), (3,5), (4,5), (3,4), (5,5) and Y = (2, 4), (3,4), (4,3), (3,5) , where d(, ) represents the squared Euclidean distance…”
Section: A Trajectory Similarity Measuresmentioning
confidence: 99%
“…The outsourcing of trajectory data, however, is a double-edged sword. An obvious concern is that it can seriously offense personal privacy [4], as the involved spatiotemporal data may reveal, either explicitly or by inference, many kinds of individual sensitive information such as home address, health condition, religious preference and political attitude. Therefore, instead of outsourcing trajectory data to the cloud directly, they should be processed appropriately to preserve the privacy of individuals.…”
Section: Introductionmentioning
confidence: 99%