Research Article

Protecting Check-In Data Privacy in Blockchain Transactions with Preserving High Trajectory Pattern Utility

Figure 1

User trajectory set and anonymous trajectory.
(a) A set of user history trajectory
(b) The random method is used to protect the sensitive check-in in the trajectory
(c) This experiment is used to protect the sensitive check-in in the trajectory