simulation experiments to evaluate the performance
of our algorithm. The simulation results show that
the proposed algorithm outperforms the existing
approach.
ACKNOWLEDGEMENTS
This research was partially supported by the
National Grand Fundamental Research 973 Program
of China under Grant (2013CB329103), Natural
Science Foundation of China grant (61271171,
61571098), China Postdoctoral Science Foundation
(2015M570778), Guangdong Science and
Technology Project (2012B090400031,
2012B090500003, 2012B091000163), and National
Development and Reform Commission Project.
REFERENCES
Li, Y., Yiu, M., 2015. Route-Saver: Leveraging Route
APIs for Accurate and Efficient Query Processing at
Location-Based Services. IEEE transactions on
knowledge and data engineering (TKDE).
Yang, D., Fang, X., Xue, G., 2013. Truthful incentive
mechanisms for k-anonymity location privacy. IEEE
INFOCOM.
Bettini, C., Mascetti, S., Wang, X., Jajodia, S., 2007.
Anonymity in location based services: Towards a
general framework. IEEE International Conference on
Mobile Data Management.
Niu, B., Li, Q., Zhu, X., Cao, G., Li, H., 2014. Achieving
K-anonymity in Privacy Aware Location Based
Services. IEEE INFOCOM.
Zhu, X., Chi, H., Niu. B., 2013. When k-anonymity meets
cache. IEEE GLOBECOM.
Shao, J., Lu, R., Lin, X., 2014. FINE: A Fine-Grained
Privacy-Preserving Location Based Service
Framework for Mobile Devices. IEEE INFOCOM.
Niu, B., Zhu, X., Li, W., et al, 2015. A Personalized Two-
Tier Cloaking Scheme for Privacy-Aware Location-
Based Services. IEEE International Conference on
Computing, Networking and Communications (ICNC).
Lu, R., Lin, X., Shi, Z., et al, 2014. PLAM: A Privacy-
Preserving Framework for Local-Area Mobile Social
Networks. IEEE INFOCOM.
Uchiyama, A., Fujii, S., Maeda, K., et al, 2013. UPL:
opportunistic localization in urban districts. IEEE
Transactions on Mobile Computing, 12(5).
Li, H., Sun, L., Zhu, H., et al, 2014. Achieving Privacy
Preservation in WiFi Fingerprint Based Localization.
IEEE INFOCOM.
Shu, T., Chen, Y., Yang, J., 2014. Multi-lateral Privacy-
Preserving Localization in Pervasive Environments.
IEEE INFOCOM.
Beresford, A., Stajano, F., 2014. Mix Zones: User Privacy
in Location-aware Services. IEEE Conference on
Pervasive Computing and Communications
Workshops.
Chen, Z., Hu, X., Ju, X., et al, 2013. LISA: location
information scrambler for privacy protection on
smartphones. IEEE Conference on Communica -tions
and Network Security.
Feng, Y., Liu, P., Zhang, J., 2012. A Mobile Terminal
Based Trajectory Preserving Strategy for Continuous
Querying LBS Users. IEEE International Conference
on Distributed Computing in Sensor Systems.
Mohammed, N., Fung, B., Debbabi, M., 2009. Walking in
the crowd, Anonymizing trajectory data for pattern
analysis. The 18th ACM Conference on Information
and Knowledge.
Wang, Y., Peng, J., He, L., et al. LBSs Privacy Preserving
for Continuous Query based on Semi-honest Third
Parties. IEEE International Perform -ance Computing
and Communications Conference.
Liao, Y., Hsiao, C., 2011. The improvement of ID-based
remote user authentication scheme using bilinear
pairings. IEEE International Conference on Consumer
Electronics, Communication and Networks.
Niu, B., Zhu, X., Li, Q., Chen, J., Li. H., 2015. A novel
attack to spatial cloaking schemes in location-based
services
. Future Generation Computer Systems.
OPNET. https://www.opnet.com/.