Research Article

Protecting Check-In Data Privacy in Blockchain Transactions with Preserving High Trajectory Pattern Utility

Algorithm 1

Check-in privacy protection algorithm based on generalization of check-in location.
Input: sensitive check-in location , privacy protection threshold k;
Output: an anonymous set of locations containing k locations.
1. LAS;
2. T= MC-LTR (,s);
3. L= GLS ();
4. S = LATP ();
5. = DLS ();
6. LAS = ;
7. if(LE<1/k)then
8. Return LAS.
9. else
10. Return .