International Journal for Development of Computer Science & Technology (IJDCST)
Voronoi is a way of dividing space into a number of regions. Spatial applications like maps are an example. Location-detection devices such as cellular phones, GPS-like devices and RFID are dependent on Location Based Services (LBS) like maps etc. Malicious attacker may collude with LBS provider to steal users' location information and query logs. For securing these information previous approaches like K-Anonym zing Spatial Region (K-ASR) implementations such as TKA, KAWCR and space twist were used. Unfortunately each of them have their own set of limitations that includes complex query processing algorithms at the server side and have the drawback of tracking user.