Research Article

A Privacy-Preserving Trajectory Publication Method Based on Secure Start-Points and End-Points

Algorithm 2

Bidirectional dummy trajectory generation algorithm.
Input: user’s trajectory dataset U, secure points set ST, ED, trajectory , anonymous parameter k, trajectory movement direction tolerance e, utility loss rate ;
Output: dummy trajectory .
(1)for i 1 to length (ST) do
(2)for j 1 to length (U) do
(3)if ;
(4)  ;
(5)end if
(6)end for
(7)end for
(8)Get based on the same method as shown in lines 1–7;
(9)
(10)for i 1 to length ()
(11)if
(12)  Delete from ;
(13)end if
(14)end for
(15)Handle based on the same method as shown in lines 10–14;
(16)while True
(17)Randomly select , from and ;
(18)for i 1 to length() do
(19)for j 1 to length() do
(20)  if
(21)   mark = i;
(22)   break;
(23)  end if
(24)end for
(25)end for
(26)end while
(27)for i 1 to mark do
(28);
(29)end for
(30)for i mark to length () do
(31);
(32)end for
(33)if
(34) Record Utility Loss and back to line 1
(35)end if
(36)return