Research Article
A Privacy-Preserving Trajectory Publication Method Based on Secure Start-Points and End-Points
Algorithm 1
The generation of secure start- and end-points.
| Input: user’s trajectory dataset U. number of blocks ; | | Output: a set of secure points SL. | (1) | Divide the user activity area into ; | (2) | ; / time periods/ | (3) | Get all points from U and partition them into different blocks; | (4) | for i 1 to do | (5) | ts timestamps of all the points in ; | (6) | if (!isempty (ts)) | (7) | Partition timestamps in ts into different time period of TPS and obtain the set ; | (8) | Sort by the number of timestamps within each time period in ascending order; | (9) | in ; | (10) | end if | (11) | if (isempty (ts)) | (12) | Mark as an unreachable area; | (13) | continue; | (14) | end if | (15) | within ; | (16) | end for | (17) | return ; |
|