Trajectory Privacy in Participatory Sensing using K-anonymity
Journal Title: International journal of Emerging Trends in Science and Technology - Year 2015, Vol 2, Issue 7
Abstract
Development of mobile communication, applications represents a challenge for both conceptually and technically so the basic requirements of LBS (location-based services) are numerous. Complex task is to provide user with added value to location information. Previously using Trajectory privacy-preserving framework user’s location is preserved using various techniques, but the locations of users trajectories may not sensitive all the time. Even mix-zones are regions where users movement cannot be track by any applications. In this paper mobile users will reveal their location to database services in a periodic or ondemand manner. K-anonymity preserving management of location information by developing efficient and scalable system-level facilities for protecting the location privacy through ensuring location k-anonymity. In the context of LBSs and mobile clients, location k-anonymity refers to the k-anonymity usage of location information. A subject is considered location k-anonymous if and only if the location information sent from a mobile client to an LBS is indistinguishable from the location information of at least k -1 other mobile clients. New spatial cloaking techniques based on real or historical user trajectory is designed to protect user location trajectories and also satisfy the users’ specified k-anonymity level.
Authors and Affiliations
Sampada Sarodaya
Seismic Performance for Fixed Base and Base Isolated Reinforced Concrete Structure
The base isolation systems are gaining large attention as a mean to protect structure form seismic hazard. It is a suitable technology for earthquake resistant design of variety of structure like buildings, bridges, airp...
(Thinking about Rabindranath Tagore's education)
johUnzukFk VSxksj orZeku Hkkjr ds “kSf{kd iqj:RFkku ds lcls cM+s iSxEcj FksA mUgksaus viuh “kSf{kd l aLFkkvksa es a ,sl s “kSf{kd iz;ksx fd;s ftUgksaus mUgs a vkn”kZ dk ltho izrhd cuk fn;kA V Sxksj us 1901 bZ0 esa ^”kkfU...
Fusion of Sclera and Periocular Features for Biometric System
This paper proposes the biometric verification system based on ocular features. We form the multimodal biometric system considering two recent biometric traits in ocular region- sclera region and periocular region. For f...
Soldier Tracking and Health Indication System Using Arm Processor
In present time world, border security is an important factor in any nation’s security. The national security mainly depends on army, navy, air-force. The army soldiers are played the one of the important and vital roles...
The Case Study of Optimization of DG System in Jamnagar District
This research work is present in Indian energy sector, however, has constraints of resources, capital, technology and environment raising issues of energy security. The traditional electrical power system model in the Gu...