Efficient k-ATY Method to Protect the User’s Trajectory in Continuous Queries


KIPS Transactions on Computer and Communication Systems, Vol. 10, No. 8, pp. 231-234, Aug. 2021
https://doi.org/10.3745/KTCCS.2021.10.8.231,   PDF Download:
Keywords: Continuous Queries, information protection, trajectory, K-anonymity
Abstract

Various problems arise as applications using locations increase. In order to solve this problem, related works are being conducted to protect the location of users. A fundamental reason for this problem is that users must provide their location information to the service provider (server) to receive the service. To improve these problems, there are works such as generating cloaking regions or generating dummies around them. However, if a user periodically asks the server for queries, the user's trajectory may be exposed by time zone. To improve this problem, in this paper, we propose a k-Anonymity Trajectory (k-ATY) technique that can improve the exposure probability of the trajectory even if the user requests continuous queries. Experimental results demonstrated the superiority of the proposed technique.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
S. D. Hee, "Efficient k-ATY Method to Protect the User’s Trajectory in Continuous Queries," KIPS Transactions on Computer and Communication Systems, vol. 10, no. 8, pp. 231-234, 2021. DOI: https://doi.org/10.3745/KTCCS.2021.10.8.231.

[ACM Style]
Song Doo Hee. 2021. Efficient k-ATY Method to Protect the User’s Trajectory in Continuous Queries. KIPS Transactions on Computer and Communication Systems, 10, 8, (2021), 231-234. DOI: https://doi.org/10.3745/KTCCS.2021.10.8.231.