TY - JOUR
T1 - IFTS
T2 - A Location Privacy Protection Method Based on Initial and Final Trajectory Segments
AU - Xu, Jiuyun
AU - Liu, Lele
AU - Zhang, Ruru
AU - Xie, Jin
AU - Duan, Qiang
AU - Shi, Leyi
N1 - Publisher Copyright:
© 2013 IEEE.
PY - 2021
Y1 - 2021
N2 - Privacy protection problem is one of the most concerning issues related to Location-Based Services (LBS) in our daily life. Privacy protection of LBS often requires anonymizing customer's trajectory data. Currently available methods for trajectory anonymity often assume an entire trajectory as one anonymous unit, which may lead to low anonymity efficiency due to the massive amount of trajectory data, especially for customers travel through a long road. Considering people's routine activities, the starting and ending locations of a trip often uncover the user's request intent, which may lead to exposure of user privacy. In order to address the problem of inefficient trajectory anonymity, we propose a location privacy protection method that is based on the initial and final trajectory segmentation (IFTS) in this paper. In the IFTS method, the road network structure is first transformed into an edge cluster model based on its location type. Then, the user trajectory is divided to segments according to the temporal sequence of the ingress and egress nodes. The initial and final trajectory segments are identified and divided into equivalence classes, which then are used for constructing a trajectory graph and the corresponding k-Anonymous set. Our experimental results show that the proposed method can reduce the anonymous area, improve anonymity efficiency, and enhance trajectory data utilization compared to the existing methods for trajectory anonymity.
AB - Privacy protection problem is one of the most concerning issues related to Location-Based Services (LBS) in our daily life. Privacy protection of LBS often requires anonymizing customer's trajectory data. Currently available methods for trajectory anonymity often assume an entire trajectory as one anonymous unit, which may lead to low anonymity efficiency due to the massive amount of trajectory data, especially for customers travel through a long road. Considering people's routine activities, the starting and ending locations of a trip often uncover the user's request intent, which may lead to exposure of user privacy. In order to address the problem of inefficient trajectory anonymity, we propose a location privacy protection method that is based on the initial and final trajectory segmentation (IFTS) in this paper. In the IFTS method, the road network structure is first transformed into an edge cluster model based on its location type. Then, the user trajectory is divided to segments according to the temporal sequence of the ingress and egress nodes. The initial and final trajectory segments are identified and divided into equivalence classes, which then are used for constructing a trajectory graph and the corresponding k-Anonymous set. Our experimental results show that the proposed method can reduce the anonymous area, improve anonymity efficiency, and enhance trajectory data utilization compared to the existing methods for trajectory anonymity.
UR - http://www.scopus.com/inward/record.url?scp=85099730851&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85099730851&partnerID=8YFLogxK
U2 - 10.1109/ACCESS.2021.3052169
DO - 10.1109/ACCESS.2021.3052169
M3 - Article
AN - SCOPUS:85099730851
SN - 2169-3536
VL - 9
SP - 18112
EP - 18122
JO - IEEE Access
JF - IEEE Access
M1 - 9328113
ER -