IFTS: A Location Privacy Protection Method Based on Initial and Final Trajectory Segments

Jiuyun Xu, Lele Liu, Ruru Zhang, Jin Xie, Qiang Duan, Leyi Shi

Research output: Contribution to journalArticlepeer-review

6 Scopus citations


Privacy protection problem is one of the most concerning issues related to Location-Based Services (LBS) in our daily life. Privacy protection of LBS often requires anonymizing customer's trajectory data. Currently available methods for trajectory anonymity often assume an entire trajectory as one anonymous unit, which may lead to low anonymity efficiency due to the massive amount of trajectory data, especially for customers travel through a long road. Considering people's routine activities, the starting and ending locations of a trip often uncover the user's request intent, which may lead to exposure of user privacy. In order to address the problem of inefficient trajectory anonymity, we propose a location privacy protection method that is based on the initial and final trajectory segmentation (IFTS) in this paper. In the IFTS method, the road network structure is first transformed into an edge cluster model based on its location type. Then, the user trajectory is divided to segments according to the temporal sequence of the ingress and egress nodes. The initial and final trajectory segments are identified and divided into equivalence classes, which then are used for constructing a trajectory graph and the corresponding k-Anonymous set. Our experimental results show that the proposed method can reduce the anonymous area, improve anonymity efficiency, and enhance trajectory data utilization compared to the existing methods for trajectory anonymity.

Original languageEnglish (US)
Article number9328113
Pages (from-to)18112-18122
Number of pages11
JournalIEEE Access
StatePublished - 2021

All Science Journal Classification (ASJC) codes

  • General Computer Science
  • General Materials Science
  • General Engineering


Dive into the research topics of 'IFTS: A Location Privacy Protection Method Based on Initial and Final Trajectory Segments'. Together they form a unique fingerprint.

Cite this