Mobile Information Systems / 2019 / Article / Tab 2

Research Article

One More Accuracy k-Anonymity Framework for LBS

Table 2

Variables.

SymbolExplanation

The center of the cloaked area in the k-anonymity algorithm
The starting query position of the user
User i
The temporal tolerance
The spatial tolerance
Time spent on
The maximum length of the real route from node A to B
The route from to
The route from to
The whole route from to
The guidance information corresponding to route
The guidance information corresponding to route
The guidance information corresponding to route
The query result sets from LBS corresponding to the query
The query request from the user
The query request message of and equal to
The return result sets from AS for and equal to
The speed on the road
The road denoted by the start node and the end node
Route i
The query collection of k users
The return result sets corresponding to

We are committed to sharing findings related to COVID-19 as quickly as possible. We will be providing unlimited waivers of publication charges for accepted research articles as well as case reports and case series related to COVID-19. Review articles are excluded from this waiver policy. Sign up here as a reviewer to help fast-track new submissions.