“…In document (Liu, Bai, Wang, & Li, 2016), to protect user identity and location information, Central anonymous serve not only uses information perturbation strategy and space-time location anonymity algorithm, but also considers the balance between QoS and CR. In (Zhang, Wu, Chen, & Chen, 2017), a spatio-temporal anonymity algorithm is proposed to protect users' location privacy by using k-anonymity and pseudo-identity anonymity. In (Wang, Huang, Qin, Wang, & Wu, 2017), a weighted k-anonymity algorithm for adjacency graphs is proposed; this algorithm can not only protect the privacy of the user's location, but also reduce bandwidth.…”