Research Article
Protecting Check-In Data Privacy in Blockchain Transactions with Preserving High Trajectory Pattern Utility
Figure 1
User trajectory set and anonymous trajectory.
(a) A set of user history trajectory |
(b) The random method is used to protect the sensitive check-in in the trajectory |
(c) This experiment is used to protect the sensitive check-in in the trajectory |