Research Article
Protecting Check-In Data Privacy in Blockchain Transactions with Preserving High Trajectory Pattern Utility
Algorithm 1
Check-in privacy protection algorithm based on generalization of check-in location.
Input: sensitive check-in location , privacy protection threshold k; | Output: an anonymous set of locations containing k locations. | 1. LAS; | 2. T= MC-LTR (,s); | 3. L= GLS (); | 4. S = LATP (); | 5. = DLS (); | 6. LAS = ; | 7. if(LE<1/k)then | 8. Return LAS. | 9. else | 10. Return . |
|