Research Article

Multilevel Privacy Controlling Scheme to Protect Behavior Pattern in Smart IoT Environment

Algorithm 5

Location-based privacy algorithm
Input: real location, sets of and , probabilities of query in .
Output: set of fake-locations
 1. All cells sort on based probabilities of their query
 2. Select fake of users among which user is right before and user right after in stored list.
 3. for (; ; ) do
 4. develop a set which consist of and , additional cells are randomly chosen from users ;
 5. Calculates the normalized probability for every cell in the set.
 6.
 7. End
 8. Output max ;