Research Article

Protecting Check-In Data Privacy in Blockchain Transactions with Preserving High Trajectory Pattern Utility

Algorithm 4

The location assignment based on trajectory pattern algorithm.
Input: privacy protection threshold k, generalized location type set T, trajectory pattern matrix M, sensitive location type , location queue L;
Output: generalized location type quantity array S.
1. Initialize S []=0, [1|T|];
2. S []=min (k-1, L ());
3. While <k-1 do
4.   for each location type Tdo
5.   if <=L () then
6.    ++;
7.    update M based on to change M to;
8.    Calculate;
9.    --;
10. = which maximizes ;
11. M=;
12. Return S.