Research Article

Batching Location Cloaking Techniques for Location Privacy and Safety Protection

Algorithm 1

Computing Cloaking Region for a user u.
Data: user u, m
Result: A Cloaking Region () for user u satisfying
(1)i 0;
(2);
(3)for i m do
(4) 2 cells at random with equal probability from ;
(5) C only if C has the highest entropy;
(6)i i + 1;
(7)end
(8) Select cells from with a probability ;
(9)Return ;