Research Article

An Improved Privacy-Preserving Framework for Location-Based Services Based on Double Cloaking Regions with Supplementary Information Constraints

Figure 3

Two mechanisms of generating cloaking region.
(a) Cloaking region is formed by randomly matching the number of queries
(b) Cloaking region is formed according to the closest number of query