A Trajectory Privacy Protection Scheme Based on the Replacement of Stay Points
Abstract
1. Introduction
- First, this paper proposes a stay point extraction algorithm that identifies users’ stay points by setting distance and time thresholds based on the sliding window principle.
- Then, this paper proposes a location perturbation algorithm based on the vector indistinguishability mechanism and introduces distinct protection strategies for ordinary stay points and long-duration stay points, respectively.
- Finally, the perturbed trajectory is adjusted by generating a certain number of location points near the replacement points to maintain the temporal continuity and integrity of the trajectory.
2. Preliminary Section
2.1. Trajectory Semantics Related
2.2. Differential Privacy Related
3. Trajectory Privacy Protection Scheme
3.1. Overview
3.2. Symbols
3.3. Detail
3.3.1. Extract Stay Points
| Algorithm 1: Extract Stay Points |
| Input: TR, , |
| Output: SPset |
| 1. SPset = 2. 3. while : 4. 5. 6. while and : 7. sp.append() 8. r 9. if 10. Compute sp.x,sp.y,sp.t 11. SPset.append(sp) 12. 13. return SPset |
3.3.2. Perturb Stay Points
Perturb Ordinary Stay Points
| Algorithm 2: Location perturbation |
| Input: sp, , k, , |
| Output: PTset |
| 1. PTset= 2. 3. 4. 5. for to k do 6. 7. 8. 9. 10. 11. end for 12. return PTset |
Perturb Long-Duration Stay Points
| Algorithm 3: Hot Stay Area Detection |
| Input: SPset, , , |
| Output: Hot-stay Area Set H |
| 1. filter S by time window T to obtain St 2. Perform spatial clustering on S using K-means clustering 3. For each cluster C: 4. Compute density d=|C|/Cluster area), 5. Calculate average stay time 6. if d ≥, ≥, then C is a Hot Stay Area and append C to H 7. return H |
| Algorithm 4: Location perturbation for long-duration stay points |
| Input: sp, , k, , , |
| Output: PTset |
| 1. PTset= 2. 3. 4. 5. for to k do 6. 7. 8. 9. 10. if in : 11. 12. else: 13. k = k + 1 14. end for 15. return PTset |
3.3.3. Reconstruction Trajectory
3.4. Privacy Budget Allocation
3.5. Complexity Analysis
4. Experimental Section
4.1. Experimental Environment
4.2. Dataset
4.3. Experimental Results and Analysis
4.3.1. Impact of Time and Distance Thresholds on the Number of Stay Points
4.3.2. Privacy Quality
4.3.3. Data Utility
4.3.4. Average Recognition Rate Experiment
4.3.5. Sensitivity Analysis of β
4.3.6. Ablation Analysis
5. Limitations and Future Work
6. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Jin, F.; Hua, W.; Francia, M.; Chao, P.; Orlowska, M.E.; Zhou, X. A Survey and Experimental Study on Privacy-Preserving Trajectory Data Publishing. IEEE Trans. Knowl. Data Eng. 2023, 35, 5577–5596. [Google Scholar] [CrossRef]
- Cheng, W.; Wen, R.; Huang, H.; Miao, W.; Wang, C. OPTDP: Towards optimal personalized trajectory differential privacy for trajectory data publishing. Neurocomputing 2022, 472, 201–211. [Google Scholar] [CrossRef]
- Schlegel, R.; Chow, C.-Y.; Huang, Q.; Wong, D.S. User-Defined Privacy Grid System for Continuous Location-Based Services. IEEE Trans. Mob. Comput. 2015, 14, 2158–2172. [Google Scholar] [CrossRef]
- Wang, Y.; Li, M.; Luo, S.; Xin, Y.; Zhu, H.; Chen, Y.; Yang, G.; Yang, Y. LRM: A Location Recombination Mechanism for Achieving Trajectory k-Anonymity Privacy Protection. IEEE Access 2019, 7, 182886–182905. [Google Scholar] [CrossRef]
- Xu, Y.X.; Xu, Y.Y.; Xu, Z.Q. Trajectory Protection with Individual Semantic Utility under Local Differential Privacy. IEEE Internet Things J. 2025, 1. [Google Scholar] [CrossRef]
- Sweeney, L. k-Anonymity: A Model for Protecting Privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 2002, 10, 557–570. [Google Scholar] [CrossRef]
- Bayardo, R.J.; Agrawal, R. Data privacy through optimal k-anonymization. In Proceedings of the 21st International Conference on Data Engineering (ICDE’05), Tokyo, Japan, 5–8 April 2005; pp. 217–228. [Google Scholar] [CrossRef]
- Gangarde, R.; Sharma, A.; Pawar, A.; Joshi, R.; Gonge, S. Privacy Preservation in Online Social Networks Using Multiple-Graph-Properties-Based Clustering to Ensure k-Anonymity, l-Diversity, and t-Closeness. Electronics 2021, 10, 2877. [Google Scholar] [CrossRef]
- Kifer, D. Attacks on privacy and de Finetti’s theorem. In Proceedings of the 2009 ACM SIGMOD International Conference on Management of Data, Providence, RI, USA, 29 June–2 July 2009; Association for Computing Machinery: New York, NY, USA, 2009. [Google Scholar] [CrossRef]
- Dwork, C. Differential privacy. In Proceedings of the International Colloquium on Automata, Languages, and Programming, Venice, Italy, 10–14 July 2006; pp. 1–12. [Google Scholar] [CrossRef]
- Andrés, M.E.; Bordenabe, N.E.; Chatzikokolakis, K.; Palamidessi, C. Geo-indistinguishability: Differential privacy for location-based systems. In Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, Berlin, Germany, 4–8 November 2013; Association for Computing Machinery: New York, NY, USA, 2013. [Google Scholar] [CrossRef]
- Gui, R.; Gui, X.; Zhang, X. A trajectory privacy protection method based on the replacement of points of interest in hotspot regions. Comput. Secur. 2024, 150, 104279. [Google Scholar] [CrossRef]
- Xing, L.; Li, B.; Liu, L.; Huang, Y.; Wu, H.; Ma, H.; Zhang, X. Trajectory privacy protection method based on sensitive semantic location replacement. Comput. Netw. 2024, 250, 110562. [Google Scholar] [CrossRef]
- Min, M.; Wang, W.; Xiao, L.; Xiao, Y.; Han, Z. Reinforcement learning-based sensitive semantic location privacy protection for VANETs. China Commun. 2021, 18, 244–260. [Google Scholar] [CrossRef]
- He, D.; Zhang, J.; Xu, L.; Liu, Y.; Ye, X. DRL-UPPS: User Trajectory Privacy Protection Strategy Based on Deep Reinforcement Learning in Mobile Crowdsensing. IEEE Trans. Comput. Soc. Syst. 2025, 12, 4241–4253. [Google Scholar] [CrossRef]
- Dai, Y.; Shao, J.; Wei, C.; Zhang, D.; Shen, H.T. Personalized semantic trajectory privacy preservation through trajectory reconstruction. World Wide Web 2018, 21, 875–914. [Google Scholar] [CrossRef]
- Zhang, W.; Xie, Z.; Maradapu, A.V.S.; Zia, Q.; He, Z.; Yin, G. A Local Differential Privacy Trajectory Protection Method Based on Temporal and Spatial Restrictions for Staying Detection. Tsinghua Sci. Technol. 2024, 29, 617–633. [Google Scholar] [CrossRef]
- Zheng, Z.; Li, Z.; Li, J.; Jiang, H.; Li, T.; Guo, B. Utility-aware and Privacy-preserving Trajectory Synthesis Model that Resists Social Relationship Privacy Attacks. ACM Trans. Intell. Syst. Technol. 2022, 13, 1–28. [Google Scholar] [CrossRef]
- Liu, P.; Wu, D.; Shen, Z.; Wang, H.; Liu, K. Personalized trajectory privacy data publishing scheme based on differential privacy. Internet Things 2024, 25, 101074. [Google Scholar] [CrossRef]
- Wu, W.; Gong, J. Improved on Qiu’s schemes to resist long-term observation attacks with semantic attributes of location. In Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design (CSCWD), Tianjin, China, 8–10 May 2024; pp. 2388–2393. [Google Scholar] [CrossRef]
- Zhao, Y.; Chen, J. Vector-Indistinguishability: Location Dependency Based Privacy Protection for Successive Location Data. IEEE Trans. Comput. 2024, 73, 970–979. [Google Scholar] [CrossRef]
- McSherry, F.D. Privacy integrated queries: An extensible platform for privacy-preserving data analysis. In Proceedings of the 2009 ACM SIGMOD International Conference on Management of Data, Providence, RI, USA, 29 June–2 July 2009; Association for Computing Machinery: New York, NY, USA, 2009; pp. 19–30. [Google Scholar] [CrossRef]
- Zheng, Y.; Zhang, L.; Xie, X.; Ma, W.-Y. Mining interesting locations and travel sequences from GPS trajectories. In Proceedings of the 18th international Conference on World Wide Web, Madrid, Spain, 20–24 April 2009; Association for Computing Machinery: New York, NY, USA, 2009. [Google Scholar] [CrossRef]
- Zheng, Y.; Xie, X.; Ma, W.-Y. GeoLife: A Collaborative Social Networking Service among User, Location and Trajectory. IEEE Data Eng. Bull. 2010, 33, 32–39. Available online: https://api.semanticscholar.org/CorpusID:3219429 (accessed on 10 January 2025).
- Li, J.; Chen, G. A personalized trajectory privacy protection method. Comput. Secur. 2021, 108, 102323. [Google Scholar] [CrossRef]
- Zhao, X.; Pi, D.; Chen, J. Novel trajectory privacy-preserving method based on clustering using differential privacy. Expert Syst. Appl. 2020, 149, 113241. [Google Scholar] [CrossRef]
- Ji, Y.; Gui, X.; Dai, H.; An, J.; Zhu, H.; Peng, Z.; Lin, X. Trajectory privacy protection based on Sensitive Stay Area replacement in publishing. Math. Probl. Eng. 2022, 2022, 5114584. [Google Scholar] [CrossRef]
- Ye, A.; Zhang, Q.; Diao, Y.; Zhang, J.; Deng, H.; Cheng, B. A Semantic-Based Approach for Privacy-Preserving in Trajectory Publishing. IEEE Access 2020, 8, 184965–184975. [Google Scholar] [CrossRef]











| Method | Privacy Mechanism | Spatial Dependency | Location Semantics | Over Protection | Complexity |
|---|---|---|---|---|---|
| Gui et al. [12] | Differential Privacy | Partial | Yes | Mild | |
| Xing et al. [13] | Differential Privacy | Partial | Yes | Mild | |
| Zhang et al. [17] | Local Differential Privacy | No | No | Mild | |
| Ours | Vector indistinguishability | Full | Yes | Negligible |
| Symbols | Meaning |
|---|---|
| TR | user’s trajectory sequence |
| SPset | set of stay points |
| privacy budget for the directional indistinguishability of ordinary stay points | |
| privacy budget for the distance indistinguishability of ordinary stay points | |
| PTset | set of candidate perturbed points |
| privacy budget for the directional indistinguishability of Long-Duration stay points | |
| privacy budget for the distance indistinguishability of Long-Duration stay points | |
| total privacy budget | |
| privacy budget for long-duration stay points | |
| budget for ordinary stay points | |
| privacy budget allocated to each ordinary stay point | |
| privacy budget allocated to each long-duration stay point |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2026 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license.
Share and Cite
Wu, W.; Li, D. A Trajectory Privacy Protection Scheme Based on the Replacement of Stay Points. Appl. Sci. 2026, 16, 1391. https://doi.org/10.3390/app16031391
Wu W, Li D. A Trajectory Privacy Protection Scheme Based on the Replacement of Stay Points. Applied Sciences. 2026; 16(3):1391. https://doi.org/10.3390/app16031391
Chicago/Turabian StyleWu, Wanqing, and Delong Li. 2026. "A Trajectory Privacy Protection Scheme Based on the Replacement of Stay Points" Applied Sciences 16, no. 3: 1391. https://doi.org/10.3390/app16031391
APA StyleWu, W., & Li, D. (2026). A Trajectory Privacy Protection Scheme Based on the Replacement of Stay Points. Applied Sciences, 16(3), 1391. https://doi.org/10.3390/app16031391

