Research Article
An Approach Based on Customized Robust Cloaked Region for Geographic Location Information Privacy Protection
Algorithm 2
Generate cloaked region using the heuristic method.
| Input: Nearby users’ cloaked regions and customized size constraints Amin and Amax | | Output: The cloaked region for the target user | (1) | Initialize the userMap with the dCellValue; | (2) | Initialize cloaked region M to contain Ccenter only; | (3) | while search for cell c with maximum dCellValue do | (4) | extend M to cell c; | (5) | if S (M) > Amax then | (6) | withdraw M to its previous state and set the dCellValue of c to 0; | (7) | else | (8) | for each cell in M do | (9) | set dCellValue to 0; | (10) | end | (11) | end | (12) | end | (13) | return the cloaked region M |
|