Zhejiang Sci-Tech University
Very often, network users expect to access services relevant to their locations, whilst preserve their privacy without disclose their exact locations. The well-known privacy preserving method is the spatial cloaking technique where exact user locations are blurred into a cloaked region to meet the privacy requirement, e.g. k-anonymity. Most of current solutions are designed with a centralized architecture in mind and rely on a third trustworthy party, i.e. a Location Anonymizing Server (LAS). Unfortunately, these solutions cannot be directly applied to the mobile Peer-To-Peer (P2P) networks where no centralized servers are possible.