Location Privacy And Geo Based Applications

Abstract

Using Geo-social networking like Apple's i Groups and Hot Potato, many people communicate with their neighbouring locations through their associates and their suggestions. Without sufficient location protection, however, these systems can be easily misused, in this paper, we introduce, a technique that provides location secrecy without adding complexity into query results. Our idea here is to secure user-specific, coordinate conversion to all location data shared with the server. The associates of a user share this user’s secret key so they can apply the same conversion. This allows all spatial queries to be evaluated correctly by the server, but our privacy mechanisms guarantee that servers are unable to see or infer the actual location data from the transformed data or from the data access.

Authors and Affiliations

Yadlapalli S S Lakshmi Ramani| PG Scholar, Pydah College of Engineering, Kakinada, AP, India, E-mail: ramani95cse@gmail.com, D. Ramesh| Assistant Professor, Pydah College of Engineering, Kakinada, AP, India

Keywords

Related Articles

Haze monitoring in wireless systems using ARM7 controller

The overwhelming haze, depicted as a pall of smoke brought about boundless health problems particularly among the elderly, the youthful and children. Haze is a climatic wonder where clean, smoke and different particl...

A New Analysis on Fraud Ranking In Mobile Apps

Fraud in the mobile Application market refers to fake or misleading exercises which have a reason for knocking up the Applications in the popularity list. To be sure, it turns out to be increasingly visit for Applica...

A Systematic Puzzle Approach of Deploying Software For Restricting Dos & DDOS Attacks

In the network denial of service (DoS) and distributed DoS (DDoS) attacks intend to prevent legitimate clients from accessing services are considered a serious hazard to the availability and reliability of the intern...

A New Approach to NCL Selection In DTNS Based On a Probabilistic Selection Metric

The propose of caching technique in wireless ADHOC networks profits by the supposition of existing end-to-end ways amidst mobile nodes, and the way from a supplicant to the information source leftovers unaltered ever...

Establishing a Trust-Worthy Social Authentications

Among the several backup authentication mechanisms, authenticating users with the help of their friends (i.e., trustee-based social authentication) has been shown to be a promising backup authentication mechanism. A...

Download PDF file
  • EP ID EP16692
  • DOI -
  • Views 312
  • Downloads 18

How To Cite

Yadlapalli S S Lakshmi Ramani, D. Ramesh (2015). Location Privacy And Geo Based Applications. International Journal of Science Engineering and Advance Technology, 3(12), 1308-1313. https://europub.co.uk/articles/-A-16692