Research Article

A New Group Location Privacy-Preserving Method Based on Distributed Architecture in LBS

Table 2

Characteristics comparison.

Scheme[3][4][5][6]Ours

MethodDistance sumCenter locationCenter locationCenter locationCenter location

Network resources occupiedLowLowLowHighLow

The size of the service result set

Resistance against the collusion attack between SP and users or ( with or without the special proxy user)

Controllability of the location privacy protectionFine-granularityCoarse-granularityCoarse-granularityCoarse-granularityFine-granularity

Communication modeRing-unicastRing-unicastStar-unicastGroup-broadcastStar-unicast

User stateStaticStatic/dynamicStatic/dynamicStaticStatic/dynamic