A survey of the fusion of traditional data security technology and blockchain

Y Xu, G Xu, Y Liu, Y Liu, M Shen - Expert Systems with Applications, 2024 - Elsevier
Blockchain is a new distributed infrastructure and computing paradigm, which has been
widely used in various fields. For example, utilizing a chain data structure to verify and …

Privacy in trajectory micro-data publishing: a survey

M Fiore, P Katsikouli, E Zavou, M Cunche… - Transactions on Data …, 2020 - orbit.dtu.dk
We survey the literature on the privacy of trajectory micro-data, ie, spatiotemporal
information about the mobility of individuals, whose collection is becoming increasingly …

Anonymizing nyc taxi data: Does it matter?

M Douriez, H Doraiswamy, J Freire… - 2016 IEEE international …, 2016 - ieeexplore.ieee.org
The widespread use of location-based services has led to an increasing availability of
trajectory data from urban environments. These data carry rich information that are useful for …

Local suppression and splitting techniques for privacy preserving publication of trajectories

M Terrovitis, G Poulis, N Mamoulis… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
We study the problem of preserving user privacy in the publication of location sequences.
Consider a database of trajectories, corresponding to movements of people, captured by …

[HTML][HTML] Time will not tell: Temporal approaches for privacy-preserving trajectory publishing

A Brauer, V Mäkinen, L Ruotsalainen… - … , Environment and Urban …, 2024 - Elsevier
Fine-granular spatio-temporal trajectories, ie, time-stamped sequences of locations, play a
pivotal role in transport and urban analytics. However, sharing or publishing trajectory data …

Privacy-aware and AI techniques for healthcare based on k-anonymity model in internet of things

AK Sangaiah, A Javadpour, F Ja'fari… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
The government and industry have given the recent development of the Internet of Things in
the healthcare sector significant respect. Health service providers retain data gathered from …

Hiding mobile traffic fingerprints with glove

M Gramaglia, M Fiore - Proceedings of the 11th ACM Conference on …, 2015 - dl.acm.org
Preservation of user privacy is paramount in the publication of datasets that contain fine-
grained information about individuals. The problem is especially critical in the case of mobile …

A fast perturbation algorithm using tree structure for privacy preserving utility mining

U Yun, J Kim - Expert Systems with Applications, 2015 - Elsevier
As one of the important approaches in privacy preserving data mining, privacy preserving
utility mining has been studied to find more meaningful results while database privacy is …

Novel trajectory privacy-preserving method based on clustering using differential privacy

X Zhao, D Pi, J Chen - Expert Systems with Applications, 2020 - Elsevier
With the development of location-aware technology, a large amount of location data of users
is collected by the trajectory database. If these trajectory data are directly used for data …

Anonymizing trajectory data for passenger flow analysis

M Ghasemzadeh, BCM Fung, R Chen… - … research part C: emerging …, 2014 - Elsevier
The increasing use of location-aware devices provides many opportunities for analyzing and
mining human mobility. The trajectory of a person can be represented as a sequence of …