Research Article

A Privacy-Preserving Trajectory Publication Method Based on Secure Start-Points and End-Points

Algorithm 3

Accessibility correction algorithm.
Input: uncorrected trajectory , Position transfer threshold V, user’s trajectory dataset U;
Output: dummy trajectory that meets the requirements
(1);
(2)for i 1 to length () do
(3)if
(4) count++;
(5)end if
(6)end for
(7)if
(8)for i 1 to mark do
(9);
(10)end for
(11)for i mark to length () do
(12);
(13)end for
(14)for i 1 to length () do
(15)if
(16)  count++;
(17)end if
(18)end for
(19)if
(20)Delete and back to Algorithm 2
(21)end if
(22)else
(23)return
(24)end if