Volume- 3
Issue- 1
Year- 2015
Prof. Yogesh S. Amle , Prof. Dr. Santosh S. Lomate , Prof. Rajesh A. Auti
There is need to secure mobile phones locations by privacy frame work which utilizes K optimal principles. This improves the location position and tracking ability of Cell phones. Most of the time quality of service cannot be provided because K no. of users may not be available at the time of request. This motivates to create dummy requests at real time, to assure K principle. Another motivation is to split additional load that occurs on Location Based Services (LBS) for adding Anonymization Server (AS) in between Mobile Station (MS) and LBS. To find out nearby location like banks, hotels etc. An algorithm that process mobile request using K secrecy with variety of considerations and different parameters like real world traffic volume data and dummy mobile users generated practically by mobile objects generator to achieve K optimal principle. By this temporal clocking problem solved as there is no waiting request.
[1]http://www.google.com/latitude/intro.html.
[2]R. Agrawal and E. Wimmers. A Framework for Expressing and Combining Preferences. In Proceedings of the ACM International Conference on Management of Data, SIGMOD, 2000.
[3]Federal Communications Commission http://www. fcc.gov/cgb/consumerfacts/wireless911 srvc.html.
[4]S. Mascetti, C. Bettini, D. Freni, X. Wang. Spatial Generalization Algorithms for LBS Privacy Preservation. Journal of Location Based Services ISSN I748- 9725/ISSN 1748-9733, 2007.
[5]Leon Stenneth Phillip S. Yu Ouri Wolfson,Phillip S. Yu, Ouri Wolfson, “Mobile Systems Location Privacy: “MobiPriv” A Robust K Anonymous System”. 2010 IEEE 6th Intemational Conference on Wireless and Mobile Computing, Networking and Communications.
[6]Lui, From Data Privacy to Location Privacy: Models and Algorithms. VLDB, 2007.
[7]F. Liu, K. Hua, Y. Cai. Query I-Diveristy in Location Based Services. International Conference on Mobile Data Management, 2009.
[8]M. Grusteser and D. Grunwald. Anonymous usage of loyu67ujcation based services through spatial and temporal cloaking. ACM/USENIX MobiSys, 2003.
[9]H. Kido, Y. Yanagisawa, T. Satoh. An Anonymous Communication Technique using Dummies for Location Based Services. Second International Conference on Pervasive Services, 2005.
[10] C. Chow, M. Mokbel, X. Liu. A peer to Peer Spatial Cloaking Algorithm for Anonymous Location Based Services. ACM GIS, 2006. www.tran sitgenie.com
Bachelor of Engineering in Information Technology, Student, EESCOET, Aurangabad, Maharashtra, India
No. of Downloads: 6 | No. of Views: 1076
Prashant Tryambak Mhetre, Kedar Jyotiba Devkar, Amol Dattatraya Bhagat, Pramod Shivaji Patil, Kuldeep B. Vayadande.
March 2015 - Vol 3, Issue 2