NOVEL TECHNIQUES TO SAFEGUARD PRIVACY AND SECURITY ON MOBILE DEVICES THROUGH OPTIMAL ALGORITHMS

Abstract

The rapid proliferation of smart phone technology in urban communities has enabled mobile users to utilize context aware - services on their devices. Today’s highly interconnected urban population is increasingly dependent on these gadgets to organize and plan their daily lives. They often rely on the preferred locations according to their deman ds thus lacking security. In this paper we propose algorithms which provide privacy and security to user contents and requirements. Users may not want to reveal their actual locations to a third party which are not trustworthy. We perform a thorough privac y estimation and optimization for determining an optimal meeting location for a group of users. Our solutions are based on the homomorphic properties of well - known cryptosystems.

Authors and Affiliations

Ruhi Dubey , Garima Singh

Keywords

Related Articles

 SUPPLIER SELECTION PROCESS IN SUPPLY CHAIN MANAGEMENT

 Supplier’s Selection is one among the foremost essential activities of supply chain management. Supplier’s Selection could be an advanced activity involving qualitative and quantitative multi-criteria. A trade-off...

 CHARACTERIZATION OF PEO CONDUCTING POLYMER ELECTROLYTE COMPLEXED WITH KNO3 ALKALI SALT AND NB2O5 NANO-FILLER

 Conducting solid phase polymer electrolyte (SPE) films were synthesized using solution casting technique. In the present study the polyethylene oxide [PEO] complexed with potassium nitrate [KNO3] as alkali salt gr...

 EEG Signals Generation and Its Reconstruction

 — Biomedical signal compression is of increasing interest due to the need of storing or transmitting large amount of multichannel data. Wavelets and wavelet packets have recently emerged as powerful tools for s...

 HAMILTONIAN LACEABILITY IN MIDDLE GRAPHS

 This paper is aimed to discuss Hamiltonian laceability in the context of the Middle graph of a graph. We explore laceability properties of the Middle graph of the Gear graph, Fan graph, Wheel graph, Path and Cycle...

 Vulnerable Security Aspects of Windows

 With the advancement in technology we are having everything available on a single click. Instead of wasting a lot of time while standing in a queue for a task to be done now we just have to open our device and co...

Download PDF file
  • EP ID EP127479
  • DOI -
  • Views 84
  • Downloads 0

How To Cite

Ruhi Dubey, Garima Singh (30). NOVEL TECHNIQUES TO SAFEGUARD PRIVACY AND SECURITY ON MOBILE DEVICES THROUGH OPTIMAL ALGORITHMS. International Journal of Engineering Sciences & Research Technology, 4(6), 1120-1126. https://europub.co.uk/articles/-A-127479