Privacy - Preserving Reputation with Content Protecting Location Based Queries
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 6
Abstract
Abstract: Privacy based Context-aware systems based on location open up new possibilities to users and data servers in terms of acquiring custom services by gathering context information, especially in systems where thehigh mobility of users increases their usability. Location-based applications utilize the positioning capabilities of a mobile device to determine the current location of a user, and customize query results to include neighbouring points of interests. However, location knowledge is often perceived as personal information. One of the immediate issues hindering the wide acceptance of location-based applications is the lack of appropriate methodologies that offer fine grain privacy controls to a user without vastly affecting the usability ofthe service. In this paper, novel approach is proposed as a solution to one of the location-based query problems through Privacy preserving based Context Reputation System. The Solution of the System is as Follows, a user wants to query a database of location data, known as Points of Interest (POIs) with respect of protecting their location Information against data leakage. Similarly the owner of the location data, that is, the location server, does not want to simply distribute its data to all users. The location server desires to have some control over its data, since the data is its asset, hence security mechanism named as shared Authority is employed against data sharing also data is reputed based on the reputation mechanism . The solution is efficient and practical in many scenarios. By implementing the solution, it is possible to access the efficiency of the protocol and proposed introducing a security model and analysing the security and reputation of the context of protocol will improvethe performance of the system.
Authors and Affiliations
Dr. S. Sujatha (HOD), , N. Premalatha (M. Phil scholar)
An Intelligent Approach to Information Retrieval System Using Enhanced DIG and FP-Tree Techniques
Abstract: Information retrieval is the process of retrieving all the relevant documents that satisfies the user query from large corpora. It is aimed to provide the relevant information and documents that matches the use...
Trust Based Secure Payment Scheme for Multi-hop Wireless Networks
In this paper we propose a secure payment scheme called, trust based micro payment scheme for multihop wireless networks.This micro payment scheme enhances the cooperation of nodes and fairness of the network. Each node...
Reduce the False Positive and False Negative from Real Trafficwith Intrusion Detection in Zigbee Wireless Networks
Abstract: Denial-of-Service attack in particular is a threat to zigbee wireless networks. It is an attack in whichthe primary goal is to deny the legitimate users access to the resources. A node is prevented from r...
A Study on Quality of Service for Computer Networks
This paper presents some of the basic concepts of Quality of Service. The major research areas of Quality of Service for Computer Networks are represented. The paper also correlates and compares few of the curren...
A Review on Semantic Approach using Nearest Neighbor Search
Abstract: Information retrieval (IR) of acquiring information sources relevant to an information sources from a group or unit. Ontology in IR field is used to represent an official domain description in addition a semant...