Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao https://doi.org/10.1...arrow_drop_down
image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
https://doi.org/10.1007/978-3-...
Part of book or chapter of book . 2017 . Peer-reviewed
License: Springer TDM
Data sources: Crossref
DBLP
Conference object . 2023
Data sources: DBLP
versions View all 2 versions
addClaim

Privacy Preservation for Trajectory Data Publishing and Heuristic Approach

Authors: Nattapon Harnsamut; Juggapong Natwichai;

Privacy Preservation for Trajectory Data Publishing and Heuristic Approach

Abstract

With the increasing of location-aware devices, it is easy to collect the trajectory of a person which can be represented as a sequence of visited locations with regard to timestamps. The trajectory data publishing can be useful in real-life applications, such as location-based advertising, traffic management, and geo-marketing. However, the trajectory data publishing also poses privacy threats especially when an adversary has the target user’s background knowledge, i.e. partial trajectory information. In general, data transformation is needed to ensure privacy preservation before data releases. Not only the privacy has to be preserved, but also the data quality issue must be addressed, i.e. the impact on data quality after the transformation should be minimized. In this paper, we focus on maintaining the data quality in the scenarios which the generalization technique is applied to transform the trajectory data. We propose a heuristic approach to preserve the privacy based on the LKC-privacy model. Subsequently, our proposed algorithm is validated with thorough experiments. From the results, the proposed algorithm is highly efficient, and the effectiveness of the proposed work can be achieved particularly when the value of K is high and the value of C and L are low.

Related Organizations
  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    2
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
2
Average
Average
Average
Upload OA version
Are you the author of this publication? Upload your Open Access version to Zenodo!
It’s fast and easy, just two clicks!