Reference Hub1
Privacy-Preserving Spatial Trajectory Prediction Based on a Novel Matrix Representation

Privacy-Preserving Spatial Trajectory Prediction Based on a Novel Matrix Representation

Wen-Chen Hu, Naima Kaabouch, Hung-Jen Yang, S. Hossein Mousavinezhad
Copyright: © 2014 |Volume: 5 |Issue: 1 |Pages: 23
ISSN: 1947-9158|EISSN: 1947-9166|EISBN13: 9781466654518|DOI: 10.4018/ijhcr.2014010105
Cite Article Cite Article

MLA

Hu, Wen-Chen, et al. "Privacy-Preserving Spatial Trajectory Prediction Based on a Novel Matrix Representation." IJHCR vol.5, no.1 2014: pp.56-78. http://doi.org/10.4018/ijhcr.2014010105

APA

Hu, W., Kaabouch, N., Yang, H., & Mousavinezhad, S. H. (2014). Privacy-Preserving Spatial Trajectory Prediction Based on a Novel Matrix Representation. International Journal of Handheld Computing Research (IJHCR), 5(1), 56-78. http://doi.org/10.4018/ijhcr.2014010105

Chicago

Hu, Wen-Chen, et al. "Privacy-Preserving Spatial Trajectory Prediction Based on a Novel Matrix Representation," International Journal of Handheld Computing Research (IJHCR) 5, no.1: 56-78. http://doi.org/10.4018/ijhcr.2014010105

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Since the introduction of iPhone in 2007, smartphones have become very popular (e.g., the number of worldwide smartphone sales has surpassed the number of PC sales in 2011). The feature of high mobility and small size of smartphones has created many applications that are not possible or inconvenient for PCs and servers, even laptops. Location-based services (LBS), one of mobile applications, have attracted a great attention recently. This research proposes a location-based service, which predicts a spatial trajectory based on the current and previous trajectories by using a novel matrix representation. Spatial trajectory prediction can be used in a variety of purposes such as travel recommendations and traffic control and planning, but at the same time, just like most location-based services, the user privacy concern is a major issue. Without rigorous privacy protection, users would be reluctant to use the service. The proposed method is simple but effective and user privacy is rigorously preserved at the same time because the trajectory prediction is performed at the user-side. Additionally, this research is not only useful but also pedagogical because it involves a variety of topics like (i) mobile computing, (ii) mobile security, and (iii) human behavior recognition.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.