Skip to main content
. 2020 Jun 21;20(12):3519. doi: 10.3390/s20123519

Table 3.

Comparison of methods.

Classification Architectures Privacy Protection Technologies Service Quality and Privacy Protection Computation Overhead
Our method Decentralized Blockchain and k-anonymity Get good privacy protection while also getting high quality of service Medium
Privacy protection architectures Centralized Spatial obfuscation [23,24] The better the privacy protection, the lower the quality of location services Medium
Location perturbations [25,26]
Pseudonym [27] Relying on third parties, third parties have become the biggest performance bottleneck Low
Decentralized Encryption-based technology [39] Usually can’t balance service quality and privacy protection well High
User collaborative-based technology [32] The better the privacy protection, the lower the quality of location services Medium
Paper [29] Multi-server Using social network resources to satisfy the principle of k-anonymity, differential privacy Medium