Research Article

Batching Location Cloaking Techniques for Location Privacy and Safety Protection

Algorithm 3

Top-down cloaking batching algorithm (TD).
Data: set U
Result: A set of cloaking regions for every user in U
(1) all cells in the network area;
(2)if then
(3)repeat
(4)  l a user from U with the largest θ. If many, chooses the one with the largest K, ();
(5)  ;
(6)  repeat
(7)   ;
(8)   ;
(9)   for do
(10)    c from with a probability cell’s occupancy;
(11)    if then
(12)     if then
(13)      ;
(14)      ;
(15)     end
(16)    end
(17)   end
(18)   if then
(19)    
(20)   end
(21)  until or (Emax = 0);
(22)  Set for user l and for every other user u in having and ;
(23)  Update set U removing those users whose cloaking region is ;
(24)until ;
(25)end