Research Article

Batching Location Cloaking Techniques for Location Privacy and Safety Protection

Algorithm 2

Bottom-up cloaking batching algorithm (BU).
Data: set U
Result: A set of cloaking regions for every user u in U satisfying its respective and
(1) chooses a user with the highest K from U (denoted as ). If there are many of them, chooses one with the highest θ in U;
(2) call Algorithm 1 (l, );
(3)repeat
(4)if () then
(5)  for do
(6)    if and ;
(7)   Remove u from U only if was set as ;
(8)  end
(9)end
(10)c from with a probability inversely distance (, ) ’s occupancy;
(11);
(12)until ;