Research Article
Multilevel Privacy Controlling Scheme to Protect Behavior Pattern in Smart IoT Environment
Algorithm 5
Location-based privacy algorithm
Input: real location, sets of and , probabilities of query in . | Output: set of fake-locations | 1. All cells sort on based probabilities of their query | 2. Select fake of users among which user is right before and user right after in stored list. | 3. for (; ; ) do | 4. develop a set which consist of and , additional cells are randomly chosen from users ; | 5. Calculates the normalized probability for every cell in the set. | 6. | 7. End | 8. Output max ; |
|