SECURE PRIVACY PRESERVING TECHNIQUES IN SMART PHONES : A REVIEW

Journal Title: Elysium Journal of Engineering Research and Management - Year 2016, Vol 4, Issue 6

Abstract

The context aware applications are blooming with increasing the popularity of smartphones with sensors, these sensor applications arises the privacy is the major challenging issue because users can easily access these applications. It provides the secure scheme for context aware applications and also identifies the location of unauthorized person by using a Time Homogenous Markov Model. First, we design the privacy of context aware application by using the smart phone sensors such as GPS and fingerprint sensor, then the sensor information that provide secure communication for the smart phone users. Our second method focuses to identify the location of unauthorized user by using the Time Homogenous Markov Model, which identifies the exact location of fake user. Our context aware applications work both with and without internet which is achieving the frequent pattern generation technique. Finally, this method compares the utility and privacy with the Mask IT, naïve fake and efficient fake.

Authors and Affiliations

Malinipriya M, Tharics P, Senthil Kumar M

Keywords

Related Articles

ENHANCING LOAD SHARING (ELShare) METHOD IN MOBILE CLOUD COMPUTING ENVIRONMENT

With uptrend of smartphones and an increasing number of services are provided by cloud computing. In mobile cloud computing (MCCs), a mobile user is integrated with a cloud server through a network gate...

A SURVEY ON DATA PARTITIONING AND CLUSTER ENSEMBLE TECHNIQUES

Data mining methods are used to discover the knowledge from the databases. Association rule mining, classification and clustering techniques are applied for the knowledge discovery process. The dat...

AN EFFICIENT INFORMATION RETRIEVAL (EIR) ALGORITHM FOR PRIVACY PRESERVATION IN WEB SEARCH

Internet is occupied largely by the web search engines, to find and access a data. They pose a serious risk of privacy breach over the users. Thus, personalized search engines become the need for facing the privacy chall...

An Efficient Ant Colony Optimization (ACO) for Dynamic Optimal Power Flow in Active Distribution Networks

Renewable Distributed Generations (DG) with high penetration becomes the requirement for Active Distribution Networks (ADN). In the proposed work, the Dynamic Optimal Power Flow output can be improved with the help of An...

SECURITY THREATS AND BENEFITS OF CLOUD COMPUTING TRANSITIONING TO A NEW WAY OF DOING BUSINESS

: Cloud computing provides a new environment that enables organizations to leverage emerging technologies that address growing business challenges and to position their companies to be more competitive in a cost-effecti...

Download PDF file
  • EP ID EP369979
  • DOI -
  • Views 97
  • Downloads 0

How To Cite

Malinipriya M, Tharics P, Senthil Kumar M (2016). SECURE PRIVACY PRESERVING TECHNIQUES IN SMART PHONES : A REVIEW. Elysium Journal of Engineering Research and Management, 4(6), -. https://europub.co.uk/articles/-A-369979