Research Article
An Improved Privacy-Preserving Framework for Location-Based Services Based on Double Cloaking Regions with Supplementary Information Constraints
Figure 3
Two mechanisms of generating cloaking region.
(a) Cloaking region is formed by randomly matching the number of queries |
(b) Cloaking region is formed according to the closest number of query |