A New Dynamic Privacy Grid Mechanism for Location Based Services
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 11
Abstract
Appropriate to the nature of the data being swap over between the user and the server, the common changing of the user’s name provides modest shield for the user’s privacy. A more recent investigation of the mix-zone come near has been applied to road networks. They explore the required number of users to suit the unlink ability assets when there are repeated queries over an interval. This requires watchful control of how many users are limited within the mix-zone, which is complicated to accomplish in practice. The decisive goal of our protocol is to obtain a set (block) of POI records from the LS, which are secure to the user’sposition, lacking compromising the privacy of the user orthe data stored at the server. We also carry in a safety replica and look at the security in the condition of our protocol.
Authors and Affiliations
R. N. D Sudeep, K Vijay Kumar
Issues and Dependencies on Affect Data Models For Assessment of Disorders- A Survey
Analysis of free-form data has always been a challenge. In that, data depicting affects in hidden form and/or in various modes complicates the task of mining to identify and analyze relevant affects from the input. A...
Text Detection On Scene Images Using MSER
Text detection and recognition is one of the difficult tasks in the computer vision community and there is a lot of research going on in recent years. This paper focuses on the problem of text detection and recogniti...
Improved Diversity with Limited Feed back for more than two users
We consider interference cancellation for a system with more than two users when users know each other channels. The goal is to utilize multiple antennas to cancel the interference without sacrificing the diversity or...
A Novel Protocol To Implement The Solution On Mobile And Desktop Machine For Location Based Queries
We put into practice an answer on a desktop machine and a mobile device to measure the competence of our protocol. We also bring in a safety replica and examine the safety in the circumstance of our protocol. At leng...
Nomadic Transmitting Alignment in File Exhaustive Wireless Networks
In this paper, we are attentive in reducing the delay and increasing the period of occurrence in wireless sensor networks for which events occur infrequently. The most of the energy is consumed in such systems when t...