Research Article
Protecting Check-In Data Privacy in Blockchain Transactions with Preserving High Trajectory Pattern Utility
Algorithm 5
The dummy location selection algorithm.
Input: generalized location type quantity array S, real sensitive location , privacy protection threshold k, location queue L; | Output: generalized location candidate array . | 1. Initialize []=0, i[1|S|]; | 2. while lens ()<k-1 do | 3. for each location type &&<= S [] do | 4. if lens ()==0 then | 5. Select the location furthest from the real sensitive location from the generalized locations in and add it to ; | 6. else | 7. Select the location with the maximum Score in and add it to ; | 8. Return ; |
|