Location Privacy And Geo Based Applications
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 12
Abstract
Using Geo-social networking like Apple's i Groups and Hot Potato, many people communicate with their neighbouring locations through their associates and their suggestions. Without sufficient location protection, however, these systems can be easily misused, in this paper, we introduce, a technique that provides location secrecy without adding complexity into query results. Our idea here is to secure user-specific, coordinate conversion to all location data shared with the server. The associates of a user share this user’s secret key so they can apply the same conversion. This allows all spatial queries to be evaluated correctly by the server, but our privacy mechanisms guarantee that servers are unable to see or infer the actual location data from the transformed data or from the data access.
Authors and Affiliations
Yadlapalli S S Lakshmi Ramani| PG Scholar, Pydah College of Engineering, Kakinada, AP, India, E-mail: ramani95cse@gmail.com, D. Ramesh| Assistant Professor, Pydah College of Engineering, Kakinada, AP, India
Sensorless Speed Control Scheme for Induction Motor Drive Using DC link Measurements
The controlled induction motor drives without mechanical speed sensors at the motor shaft have the attractions of low cost and high reliability. To replace the sensor, the information on the rotor speed is extracted...
A protection PWS system UPS to sum up profiles as per client security prerequisites
Personalized web search has demonstrated its effectiveness in improving the quality of various search services on the Internet. However, evidences show that users’ reluctance to disclose their private information d...
Comparative study of Internet Protocol
In today's generation, most of today's Internet is using IPv4, Now twenty years old. IPv4 is now uploading with the Problem of meeting growing Internet requirements and it is a shortage of IPv4 addresses, which are n...
Proficient Authentication Mechanism for Mobile and Pervasive Computing
Mobile Computing is a technology that allows transmission of data, voice and video via a computer or any other wireless enabled device without having to be connected to a fixed physical link. With today’s technology...
The Methodology To Underrate Routing Incursion In Informatics Networks
The central problem of this type of networks How to efficiently transmit heterogeneous traffic over wireless links?.In the corpulent number of outgrowing viable environment each and everything depends on the other so...