Privacy - Preserving Reputation with Content Protecting Location Based Queries
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 6
Abstract
Abstract: Privacy based Context-aware systems based on location open up new possibilities to users and data servers in terms of acquiring custom services by gathering context information, especially in systems where thehigh mobility of users increases their usability. Location-based applications utilize the positioning capabilities of a mobile device to determine the current location of a user, and customize query results to include neighbouring points of interests. However, location knowledge is often perceived as personal information. One of the immediate issues hindering the wide acceptance of location-based applications is the lack of appropriate methodologies that offer fine grain privacy controls to a user without vastly affecting the usability ofthe service. In this paper, novel approach is proposed as a solution to one of the location-based query problems through Privacy preserving based Context Reputation System. The Solution of the System is as Follows, a user wants to query a database of location data, known as Points of Interest (POIs) with respect of protecting their location Information against data leakage. Similarly the owner of the location data, that is, the location server, does not want to simply distribute its data to all users. The location server desires to have some control over its data, since the data is its asset, hence security mechanism named as shared Authority is employed against data sharing also data is reputed based on the reputation mechanism . The solution is efficient and practical in many scenarios. By implementing the solution, it is possible to access the efficiency of the protocol and proposed introducing a security model and analysing the security and reputation of the context of protocol will improvethe performance of the system.
Authors and Affiliations
Dr. S. Sujatha (HOD), , N. Premalatha (M. Phil scholar)
Visual Cryptography Implementation with Key Sharing For Effective Phishing Detection Process
The advent of the internet, various online attacks has been increased and among them the most popular attack is phishing. Phishing is an attempt by an individual or a group to get personal, confidential information such...
Twin Key Implementation in Aes
Abstract: In February 2001, NIST announced that a draft of the Federal Information Processing Standard (FIPS) was available for public review and comment. Finally, AES was published as FIPS 197 in the Federal Regis...
[b]Approaches in Key Management Schemes in Mobile Ad-Hoc Networks: A Review [/b]
Abstract: MANET (Mobile Ad hoc Network) is a convenient infrastructure-less contact web that is often susceptible to assorted assaults. Countless critical management schemes for MANETs are given to fix assorted protectio...
Classified Ave Rage Precision For Capturing User Search Intention For Multiattributes
Due to the tremendous increase in use of internet surfing user may not get the most accurate search result which they preferred for their queries to clarify their known uncertain information. Such search engine may not o...
Multicast and Unicast Communication in Vehicular Network Using IPv6.
Now a days the research is going on in Vehicular ad-hoc network to make a city as Smart city for the driver and passengers to navigate and to obtain relevant information and avoid the traffic accident. In the proposed sy...