Open Access   Article Go Back

A Combined Location-Privacy Protective Transportable Representation

C.Thangamalar 1 , C. Pradhap2

Section:Research Paper, Product Type: Journal Paper
Volume-3 , Issue-11 , Page no. 105-112, Nov-2015

Online published on Nov 30, 2015

Copyright © C.Thangamalar , C. Pradhap . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: C.Thangamalar , C. Pradhap , “A Combined Location-Privacy Protective Transportable Representation,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.11, pp.105-112, 2015.

MLA Style Citation: C.Thangamalar , C. Pradhap "A Combined Location-Privacy Protective Transportable Representation." International Journal of Computer Sciences and Engineering 3.11 (2015): 105-112.

APA Style Citation: C.Thangamalar , C. Pradhap , (2015). A Combined Location-Privacy Protective Transportable Representation. International Journal of Computer Sciences and Engineering, 3(11), 105-112.

BibTex Style Citation:
@article{Pradhap_2015,
author = {C.Thangamalar , C. Pradhap },
title = {A Combined Location-Privacy Protective Transportable Representation},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {11 2015},
volume = {3},
Issue = {11},
month = {11},
year = {2015},
issn = {2347-2693},
pages = {105-112},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=746},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=746
TI - A Combined Location-Privacy Protective Transportable Representation
T2 - International Journal of Computer Sciences and Engineering
AU - C.Thangamalar , C. Pradhap
PY - 2015
DA - 2015/11/30
PB - IJCSE, Indore, INDIA
SP - 105-112
IS - 11
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2257 2182 downloads 2289 downloads
  
  
           

Abstract

Location-aware smart phones support different location-based administrations (LBSs): customers question the LBS server and learn on the fly about their surroundings. However, such inquiries give away private information, enabling the LBS to distinguish and track users. We address this issue by proposing the first, to the best of our knowledge, user-communitarian insurance safeguarding approach on the other hand LBSs. Our solution, MobiCrowd, is basic to implement, it does not require evolving the LBS server architecture, and it does not expect third party privacy-insurance servers; still, MobiCrowd significantly improves customer location-privacy. The pickup stems from the joint effort of MobiCrowd-ready versatile devices: they keep their content information in a buffer, until it expires, and they pass it to other customers seeking such information. Essentially, the LBS does not need to be contacted unless all the communitarian peers in the vicinity need the looked for information. Hence, the customer can refund covered up from the server, unless it absolutely needs to expose herself through a query. Our results show that MobiCrowd hides a high part of location-based queries, along these lines significantly enhancing customer location-privacy. To study the impacts of different parameters, such as the joint effort level and contact rate between versatile users, we create a scourge model. Our simulations with genuine versatility datasets corroborate our model-based findings. Finally, our execution of MobiCrowd on Nokia platforms indicates that it is lightweight and the joint effort fetched is negligible.

Key-Words / Index Term

Data Privacy, Location Privacy, Mobicrowd, Wireless Communication

References

[1] Tianqing Zhu ; Sch. of Inf. Technol., Deakin Univ., Melbourne, VIC, Australia ; Ping Xiong ; Gang Li ; Wanlei Zhou, “Correlated Differential Privacy: Hiding Information in Non-IID Data Set”, Published in: Information Forensics and Security, IEEE Transactions on (Volume:10 , Issue: 2 ) Page(s): 229 – 242 Date of Publication : 06 November 2014.
[2] Zhang Kun ; Shandong Provincial Key Lab. of Network Based Intell. Comput., Univ. of Jinan, Jinan, China ; Abraham, A. ; Shi Yuliang, “Data Combination Privacy Preservation Adjusting Mechanism for Software as a Service”, Published in: Systems, Man, and Cybernetics (SMC), 2013 IEEE International Conference on Date of Conference: 13-16 Oct. 2013 Page(s): 2007 – 2012.
[3] Pan Yang ; Sch. of Electron. & Inf. Eng., Xi'an Jiaotong Univ., Xi'an, China ; Xiaolin Gui ; Feng Tian ; Jing Yao, “A Privacy-Preserving Data Obfuscation Scheme Used in Data Statistics and Data Mining”, Published in: High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing (HPCC_EUC), 2013 IEEE 10th International Conference on Date of Conference: 13-15 Nov. 2013.
[4] Shokri, R. ; LCA, EPFL, Lausanne, Switzerland ; Papadimitratos, P. ; Theodorakopoulos, G. ; Hubaux, J.-P., “Collaborative Location Privacy”, Published in: Mobile Adhoc and Sensor Systems (MASS), 2011 IEEE 8th International Conference on Date of Conference: 17-22 Oct. 2011 Page(s): 500 – 509.
[5] Zeyu Zheng ; Dept. of Comput. Sci., City Univ. of Hong Kong, Hong Kong, China ; Jianping Wang ; Jin Wang, “A Study of Network Throughput Gain in Optical-Wireless (FiWi) Networks Subject to Peer-to-Peer Communications”, Published in: Communications, 2009. ICC '09. IEEE International Conference on Date of Conference: 14-18 June 2009 Page(s): 1 – 6.
[6] Deicke, F. ; Fraunhofer IPMS, Dresden, Germany ; Fisher, W. ; Faulwasser, M., “Optical wireless communication to eco-system”, Published in: Future Network & Mobile Summit (FutureNetw), 2012 Date of Conference: 4-6 July 2012 Page(s): 1 – 8.
[7] Ying, Yun ; University of Shanghai for Science and Technology, Shanghai 200093 China ; Shuguang, Dai ; Ping'an, Mu ; Tianfa, Su, “A Duplex Wireless Audio Communication System”, Published in: Electronic Measurement and Instruments, 2007. ICEMI '07. 8th International Conference on Date of Conference: Aug. 16 2007-July 18 2007 Page(s): 2-150 - 2-153.
[8] Hagem, R.M. ; Centre for Wireless Monitoring & Applic., Griffith Univ., Brisbane, QLD, Australia ; Thiel, D.V. ; O'Keefe, S.G. ; Fickenscher, T., “Optical wireless communication for real time swimmers feedback: A review”, Published in: Communications and Information Technologies (ISCIT), 2012 International Symposium on Date of Conference: 2-5 Oct. 2012 Page(s): 1080 – 1085.
[9] Jose, J. ; Dept. Inf. Technol., Karunya Univ., Coimbatore, India ; Princy, M. ; Jose, J., “PEPPDA: Power efficient privacy preserving data aggregation for wireless sensor networks”, Published in: Emerging Trends in Computing, Communication and Nanotechnology (ICE-CCN), 2013 International Conference on Date of Conference: 25-26 March 2013 Page(s): 330 – 336.
[10] Perera, C. ; Open Univ., Milton Keynes, UK ; Ranjan, R. ; Lizhe Wang, “End-to-End Privacy for Open Big Data Markets”, Published in: Cloud Computing, IEEE (Volume:2 , Issue: 4 ) Page(s): 44 – 53.
[11] Jian Wang ; Coll. of Inf. Sci. & Technol., Donghua Univ., Shanghai, China ; Yongcheng Luo ; Yan Zhao ; Jiajin Le, “A Survey on Privacy Preserving Data Mining”, Published in: Database Technology and Applications, 2009 First International Workshop on Date of Conference: 25-26 April 2009 Page(s): 111 – 114.