Research Article
Location Privacy Protection Scheme for LBS in IoT
Algorithm 2
The G-V anonymity algorithm.
| Input: The user set to be anonymous , the Voronoi diagram of the road network, , | | Output: The anonymous set AS | | 1. ; //Sending anonymous request from users | | 2. ; //The server received information from users | | 3. ; //Sending data to the anonymous module | | 4. ; //The anonymous module accepts users’ data | | 5. int ; //Max represents the size of the character set | | 6. int ; //count represents the number of times the character appears | | 7. struct trieNode //The next array represents the type of each character | | 8. for //Building the prefix tree | | 9. { | | 10. if | | 11. ; //Initializing root node | | 12. else | | 13. ; //Insert the Geohash code into the prefix tree | | 14. } | | 15. while //Traverse the prefix tree | | 16. { | | 17. if | | 18. { | | 19. ; | | 20. ; | | 21. } | | 22. if | | 23. { | | 24. ; //The node is none. Assigning a new node | | 25. ; | | 26. } | | 27. } | | 28. while //Querying strings with the same prefix | | 29. { | | 30. if | | 31. return 0; | | 32. else | | 33. {; | | 34. return ; //Number of users with the same prefix | | 35. } | | 36. } | | 37. | | 38. if | | 39. ; | | 40. else | | 41. { | | 42. ; //Generating dummy | | 43. ; | | 44. } | | 45. return AS; //Anonymous success |
|