A user’s trajectory can be maliciously monitored by adversaries when they share the positions in location-aware social networking applications which require users to update their own locations continuously. An adversary infers user’s locations from the trajectories, and gleans user’s private information through them via location-aware social networking applications and public available geographic data. In this paper, we propose a user proprietary obfuscate system to suit situations for position sharing and location privacy preserving in location-aware social network. Users transform the public available geographic data into personal obfuscate region maps with pre-defined profile to prevent the location leaking in stationary status. Our obfuscation with size restricted regions method tunes user’s transformed locations fitting into natural movement and prevents unreasonable snapshot locations been recorded in the trajectory.
 Pew Research Center (2014) Social Networking Fact Sheet. http://www.pewinternet.org/fact-sheets/social-networking-fact-sheet/
 Wernke, M., Durr, F. and Rothermel, K. (2012) PShare: Position Sharing for Location Privacy Based on Multi-Secret Sharing. IEEE International Conference on Pervasive Computing and Communications, Lugano, 19-23 March 2012, 153-161. http://dx.doi.org/10.1109/PerCom.2012.6199862
 Cho, E., Myers, S.A. and Leskovec, J. (2011) Friendship and Mobility: User Movement in Location-Based Social Networks. Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Diego, 21-24 August 2011, 1082-1090. http://dx.doi.org/10.1145/2020408.2020579
 Krumm, J. (2007) Inference Attacks on Location Tracks. Proceedings of the 5th International Conference on Pervasive Computing, Toronto, 13-16 May 2007, 127-143. http://dx.doi.org/10.1007/978-3-540-72037-9_8
 Jain, A.K. and Shanbhag, D. (2012) Addressing Security and Privacy Risks in Mobile Applications. IT Professional, 14, 28-33. http://dx.doi.org/10.1109/MITP.2012.72
 Ball, J. (2014) Angry Birds and “Leaky” Phone Apps Targeted by NSA and GCHQ for User Data. http://www.theguardian.com/world/2014/jan/27/nsa-gchq-smartphone-app-angry-birds-personal-data
 Wernke, M., Skvortsov, P., Durr, F. and Rothermel, K. (2014) A Classification of Location Privacy Attacks and Approaches. Personal and Ubiquitous Computing, 18, 163-175. http://dx.doi.org/10.1007/s00779-012-0633-z
 Mokbel, M.F., Chow, C.Y. and Aref, W.G. (2006) The New Casper: Query Proc-essing for Location Services without Compromising Privacy. Proceedings of the 32nd International Conference on Very Large Data Bases, Seoul, 12-15 September 2006, 763-774.
 Xue, M., Kalnix, P. and Pung, H.K. (2009) Location Diversity: Enhanced Privacy Protection in Location Based Services. Proceedings of the 4th International Symposium on Location and Context Awareness, LoCA’09, 70-87. http://dx.doi.org/10.1007/978-3-642-01721-6_5
 Bamba, B., Liu, L., Pesti, P. and Wang, T. (2008) Supporting Anonymous Location Queries in Mobile Environments with Privacy Grid. Proceedings of the 17th International Conference on World Wide Web, Beijing, 21-25 April 2008, 237-246. http://dx.doi.org/10.1145/1367497.1367531
 Ghinita, G., Damiani, M.L. and Silvestri, C. (2009) Preventing Velocity-Based Linkage Attacks in Location-Aware Applications. Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, Seattle, 4-6 November 2009, 246-255. http://dx.doi.org/10.1145/1653771.1653807
 Wei, W., Xu, F. and Li, Q. (2012) MobiShare: Flexible Privacy-Preserving Location Sharing in Mobile Online Social Networks. 2012 Proceedings IEEE INFOCOM, Orlando, 25-30 March 2012, 2616-2620. http://dx.doi.org/10.1145/1367497.1367531
 Cheng, W.C. and Aritsugi, M. (2014) A User Sensitive Privacy-Preserving Location Sharing System in Mobile Social Networks. Procedia Computer Science, 35, 1692-1701. http://dx.doi.org/10.1016/j.procs.2014.08.262