Research Article

Batching Location Cloaking Techniques for Location Privacy and Safety Protection

Figure 1

Traditional architecture of an LBS.