Skip to main content
Fig 10 | EURASIP Journal on Wireless Communications and Networking

Fig 10

From: Using location semantics to realize personalized road network location privacy protection

Fig 10

a The time spent on user’s location using the user’s location k-disturbance algorithm. As shown in a, line segments with blue solid circles, yellow triangle, and red square represent the time consumed of the first, second, and third query for different k-anonymous requirements, respectively. The first, second, and third cases correspond to the user location status when three kinds of users of the user's location k disturbance algorithm inquiry in chapter 4.2. b The time spent on user’s query target anonymity using the user’s query target k-disturbance algorithm. As shown in b, line segments with blue solid circles, yellow triangle, and red square represent the time consumed of the first, second, and third queries for different k-anonymous requirements, respectively. The first, second, and third cases correspond to the three cases of the user’s query target k-disturbance algorithm in chapter 4.2

Back to article page