k-obstacle Based Anonymity Trajectory(k-oATY) Methods to Protect the User’s k-trajectories in Continuous Query Processing 


Vol. 14,  No. 6, pp. 379-385, Jun.  2025
https://doi.org/10.3745/TKIPS.2025.14.6.379


PDF
  Abstract

Most smartphone users have options that must be agreed upon when installing or using the application. In particular, the number of cases requiring the location of users is gradually increasing. The reason why the service provider(server) requests location information from the user is that it aims to provide a quick and accurate service to the user. However, when analyzing the user’s behavioral patterns over time, it is very likely to include sensitive personal information. In particular, when grasping the building or place where they stayed (shopping malls, clubs, etc.), the user’s trajectory can expect not only behavioral patterns but also interests. Therefore, this paper propose a k-obstacle based anonymity trajectory(k-oATY) method that can protect the user’s trajectory. Through experiments, it was proved that the proposed method has a higher probability of protecting individual location information than the existing method.

  Statistics


  Cite this article

[IEEE Style]

S. D. Hee, "k-obstacle Based Anonymity Trajectory(k-oATY) Methods to Protect the User’s k-trajectories in Continuous Query Processing," The Transactions of the Korea Information Processing Society, vol. 14, no. 6, pp. 379-385, 2025. DOI: https://doi.org/10.3745/TKIPS.2025.14.6.379.

[ACM Style]

Song Doo Hee. 2025. k-obstacle Based Anonymity Trajectory(k-oATY) Methods to Protect the User’s k-trajectories in Continuous Query Processing. The Transactions of the Korea Information Processing Society, 14, 6, (2025), 379-385. DOI: https://doi.org/10.3745/TKIPS.2025.14.6.379.