Research Article

Extended Privacy in Crowdsourced Location-Based Services Using Mobile Cloud Computing

Table 4

Data captured by the adversary.

Quasi-identifiersSensitive data
Cloaking regionLocationQueryTrue sender?

CR1Location 1Query 1
Location 2
Location 3

CR2Location 4Query 2
Location 5
Location 6

refers to an anonymized Boolean value (true or false).