International Journal of Applied Information Systems (IJAIS)
Mobile cloud computing has invoked a new era of mobile world. The rapid growth of the mobile cloud computing has given rises to many new security issues. The well known spatial cloaking technique based on k-anonymity concept is using in mobile devices for privacy preserved location based services. To avoid the difficulties of the cloaked region management in mobile device, existing device based spatial cloaking is transferred to cloud based spatial cloaking. It is ensure more involvement of the cloud to reduce the burden of mobile device.