Research Article
A Privacy-Preserving Trajectory Publication Method Based on Secure Start-Points and End-Points
Algorithm 3
Accessibility correction algorithm.
| Input: uncorrected trajectory , Position transfer threshold V, user’s trajectory dataset U; | | Output: dummy trajectory that meets the requirements | (1) | ; | (2) | for i 1 to length () do | (3) | if | (4) | count++; | (5) | end if | (6) | end for | (7) | if | (8) | for i 1 to mark do | (9) | ; | (10) | end for | (11) | for i mark to length () do | (12) | ; | (13) | end for | (14) | for i 1 to length () do | (15) | if | (16) | count++; | (17) | end if | (18) | end for | (19) | if | (20) | Delete and back to Algorithm 2 | (21) | end if | (22) | else | (23) | return | (24) | end if |
|