Research Article

Protecting the Moving User’s Locations by Combining Differential Privacy and -Anonymity under Temporal Correlations in Wireless Networks

Algorithm 1

Framework.
Input: , TM,
Output:
1: ;
2: ;
3: ifthen
4:  Construct a special set of this location;
5: else
6:  Go to next timestamps;
7: end if
8: Construct a special location set:
9: Run -anonymity;
10: ;
11: fordo
12:  
13:  ifthen
14:   add
15:   algorithm goes on
16:  else
17:  go to line 11
18:  end if
19: end for
20:  Razor Mechanism;
21:  
22: while Check do
23:  ifthen
24:   algorithm goes on;
25:  else
26:   ;
27:  end if
28: end while
29:  Obtain sensitivity of the special set ;
30:  ;
31:  Releases this region ;
32: end;
33: return Algorithm;
Go to the next timestamps
Algorithm 1