SECURE PRIVACY PRESERVING TECHNIQUES IN SMART PHONES : A REVIEW
Journal Title: Elysium Journal of Engineering Research and Management - Year 2016, Vol 4, Issue 6
Abstract
The context aware applications are blooming with increasing the popularity of smartphones with sensors, these sensor applications arises the privacy is the major challenging issue because users can easily access these applications. It provides the secure scheme for context aware applications and also identifies the location of unauthorized person by using a Time Homogenous Markov Model. First, we design the privacy of context aware application by using the smart phone sensors such as GPS and fingerprint sensor, then the sensor information that provide secure communication for the smart phone users. Our second method focuses to identify the location of unauthorized user by using the Time Homogenous Markov Model, which identifies the exact location of fake user. Our context aware applications work both with and without internet which is achieving the frequent pattern generation technique. Finally, this method compares the utility and privacy with the Mask IT, naïve fake and efficient fake.
Authors and Affiliations
Malinipriya M, Tharics P, Senthil Kumar M
ENHANCING LOAD SHARING (ELShare) METHOD IN MOBILE CLOUD COMPUTING ENVIRONMENT
With uptrend of smartphones and an increasing number of services are provided by cloud computing. In mobile cloud computing (MCCs), a mobile user is integrated with a cloud server through a network gate...
A SURVEY ON DATA PARTITIONING AND CLUSTER ENSEMBLE TECHNIQUES
Data mining methods are used to discover the knowledge from the databases. Association rule mining, classification and clustering techniques are applied for the knowledge discovery process. The dat...
AN EFFICIENT INFORMATION RETRIEVAL (EIR) ALGORITHM FOR PRIVACY PRESERVATION IN WEB SEARCH
Internet is occupied largely by the web search engines, to find and access a data. They pose a serious risk of privacy breach over the users. Thus, personalized search engines become the need for facing the privacy chall...
An Efficient Ant Colony Optimization (ACO) for Dynamic Optimal Power Flow in Active Distribution Networks
Renewable Distributed Generations (DG) with high penetration becomes the requirement for Active Distribution Networks (ADN). In the proposed work, the Dynamic Optimal Power Flow output can be improved with the help of An...
SECURITY THREATS AND BENEFITS OF CLOUD COMPUTING TRANSITIONING TO A NEW WAY OF DOING BUSINESS
: Cloud computing provides a new environment that enables organizations to leverage emerging technologies that address growing business challenges and to position their companies to be more competitive in a cost-effecti...