Version 1
: Received: 9 October 2024 / Approved: 9 October 2024 / Online: 10 October 2024 (10:22:39 CEST)
How to cite:
Xing, P.; Huang, M.; Zhu, L.; Wu, Y. Hierarchical Temporal Semantic Tree Based Trajectory Privacy Protection Scheme over LBSNs. Preprints2024, 2024100727. https://doi.org/10.20944/preprints202410.0727.v1
Xing, P.; Huang, M.; Zhu, L.; Wu, Y. Hierarchical Temporal Semantic Tree Based Trajectory Privacy Protection Scheme over LBSNs. Preprints 2024, 2024100727. https://doi.org/10.20944/preprints202410.0727.v1
Xing, P.; Huang, M.; Zhu, L.; Wu, Y. Hierarchical Temporal Semantic Tree Based Trajectory Privacy Protection Scheme over LBSNs. Preprints2024, 2024100727. https://doi.org/10.20944/preprints202410.0727.v1
APA Style
Xing, P., Huang, M., Zhu, L., & Wu, Y. (2024). Hierarchical Temporal Semantic Tree Based Trajectory Privacy Protection Scheme over LBSNs. Preprints. https://doi.org/10.20944/preprints202410.0727.v1
Chicago/Turabian Style
Xing, P., Liang Zhu and Yuanyuan Wu. 2024 "Hierarchical Temporal Semantic Tree Based Trajectory Privacy Protection Scheme over LBSNs" Preprints. https://doi.org/10.20944/preprints202410.0727.v1
Abstract
Most of the existing trajectory privacy protection methods provide a unified degree of privacy protection for data, and most of the methods mainly focus on the spatial and temporal dimensions of trajectory data, with little consideration of the semantic information of the location. To address these issues, we propose a hierarchical temporal semantic tree-based personalized trajectory privacy protection (HTST-PTPP) scheme, which mainly constructs a hierarchical temporal semantic tree by considering semantic categories and residence time. Then, quantifies the privacy protection requirements of each location, divides the privacy level, and uses differential privacy technology to realize personalized trajectory privacy protection. Finally, experiments are carried out on two real data sets. The experimental results show that our HTST-PTPP scheme has good performance in data availability and privacy protection.
Computer Science and Mathematics, Security Systems
Copyright:
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.