Strong Location and Data Privacy with User Unlinkability In Geo Location Based Services
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2017, Vol 5, Issue 1
Abstract
Increasing smart phone usage in the world apple and android providing lots of apps for mobile users. Geosocial applications provide location services to provide social interface to the physical world. Due to lack of privacy protection these systems are misused. in this project key challenges are strong location privacy, location and user unlink ability, location data privacy .we present LocX Improves location privacy eliminating uncertainty in query results and server security. Efficient distance-preserving coordinate transformations are applied to all location data shared with the server.in this new system server is unable to see actual location data. Finally proposed technique is Effective in terms of computation, bandwidth.
Authors and Affiliations
Kosireddi Veeramani Swathi| M-tech Student Scholar , Dept of CSE, Kakinada Institute Of Engineering & Technology Yanam Road, Korangi -533461 E.G.Dist (A.P), P. Arun Patnaik| Associate Professor Dept of CSE, Kakinada Institute Of Engineering & Technology Yanam Road, Korangi -533461 E.G.Dist (A.P)
Habitual Test Packet Generation And Fault Localization
Networks are getting larger and more complex, yet administrators rely on rudimentary tools such as and to debug problems. We propose an automated and systematic approach for testing and debugging networks called “A...
A Novel Three-Port Converters For Solar Power System
The conventional three-port power converters with bridge rectifiers are inefficient and may not be practical for the low-voltage micro generators. This paper presents an efficient ac-to-dc power converter that avoids...
A Novel Control Scheme for a Stand-Alone Wind Energy Conversion System
This work presents control plot for a remain solitary wind vitality change framework. Vitality is the thought to be the essential contribution for improvement. At present attributable to the exhaustion of accessible o...
The data stored in cloud environment can be accessed from anywhere and at anytime and by anyone. Many techniques effectively provide the security for cloud storage data. During transmission of data in cloud environme...
Novel Techniques In Detecting Reputation based Attacks And Effectively Identify Trustworthy Cloud Services
The very dynamic, distributed, and non-transparent nature of cloud administrations make the trust administration in cloud situations a noteworthy test. Customers' criticism is a decent source to evaluate the general...