Trajectory Anonymity for Privacy in Location

Abstract

 The rapid development of location based services i.e. Navigation has enabled tracking of user more ever before and the tracking has increased. These technologies provide the services based on the geographical location of the current user. However, the personal location information generated by such technologies is at risk of d unless protection capabilities are built into the design of such technology. These concerns may ultimately prevent society from achieving the benefits from these technologies available to customer. The -based industry is that corporations will own and control location and other information about individual customer. Tracking technology is continuously expanding and providing the services based on the social needs. In this paper, we have designed and implemented an approach for protecting privacy in based services that anonymized the Data Set of the trajectories with k anonymization. After k anonymization, each possible location sample of each trajectory is further anonymized using the space and time grouping. The major goal of this paper is to create a system that takes the input data set of the trajectories and creates anonymized version of this data set. This Privacy protection technique will help to protect the whole ntation is done in C language and tested on GPS trajectory dataset (Microsoft Research Asia) Geolife project on 64 bit dual core 2.0 GHz with 2GB RAM over a Ubunt

Authors and Affiliations

Neha

Keywords

Related Articles

MULTI-MODEL BIOMETRICS AUTHENTICATION FRAMEWORK

Authentication is the process to conform the truth of an attribute claimed by real entity. Biometric technology is widely useful for the process of authentication. Today, biometric is becoming a key aspect in a multitud...

 Verilog Implementation, Synthesis & Physical Design of MOD 16 Counter

 In this paper, MOD 16 up counter has been implemented using Cadence front end tools. Verilog RTL has been used for writing the code of counter. The functionality of counter has been tested by writing the testbench...

 Tri-State DC-DC Buck Converter with Efficient Conversion Ratio

In modern electronic applications the requirement of step down dc-dc conversion is much more. To estimate this process this dc-dc buck converter is implemented with perfect duty cycles as a proposed work. The converter...

 Flow of a Jeffrey Fluid between Finite Deformable Porous Layers

 The flow of a Jeffrey fluid between a thin deformable porous layers is investigated. The governing equations are solved in the free flow and porous flow regions. The expressions for the velocity field and deformat...

COMPARISON OF ROUTING PROTOCOLS USED IN WIRELESS SENSOR NETWORKS

Wireless Sensor Networks are used in number of applications due to technological advancements. As WSNs are made up of tiny sensor nodes and moreover these nodes are battery operated devices, so it became very easy to...

Download PDF file
  • EP ID EP164180
  • DOI -
  • Views 72
  • Downloads 0

How To Cite

Neha (30).  Trajectory Anonymity for Privacy in Location. International Journal of Engineering Sciences & Research Technology, 2(1), 81-88. https://europub.co.uk/articles/-A-164180