Research Article
Batching Location Cloaking Techniques for Location Privacy and Safety Protection
Algorithm 1
Computing Cloaking Region for a user u.
| Data: user u, m | | Result: A Cloaking Region () for user u satisfying | (1) | i 0; | (2) | ; | (3) | for i m do | (4) | 2 cells at random with equal probability from ; | (5) | C only if C has the highest entropy; | (6) | i i + 1; | (7) | end | (8) | Select cells from with a probability ; | (9) | Return ; |
|