A Review on Protecting Location Privacy for Task Allocation in Mobile Cloud Computing

P. Susila, D. Shravani

Abstract


Cloud computing has extensively been observed as the next-generation calculating example which provides limitless cloud resources to finale users in anon request manner. The amusing cloud resources in cloud figuring can be subjugated to upsurge, augment, and improve abilities of mobile devices, important to the thought of mobile cloud computing(MCC).We recommend a basis that affords explanations to the beyond contests, where together position concealment and package equality are measured. In our outline, the CCP only has contact to sanitized location data of mobile servers rendering to differential privacy (DP).Mean while each mobile server is pledged to a cellular service provider(CSP) with which it previously has a faith association, the CSP can assimilate mobile server position and standing information, and delivers the data to the CCP in deafening form according to DP. To produce the deafening mobile server data, we acclimate the Private Spatial Decomposition (PSD) method and paradigm a new assembly called Reputation-based PSD (R-PSD).


References


J. Schiller, A. Voisard, Location-Based Services, Amsterdam, The Netherlands:Elsevier, 2004.

M. Spreitzer, M. Theimer, "Providing location information in a ubiquitous computing environment" in Mobile Computing, New York, NY, USA:Springer-Verlag, pp. 397-423, 1996.

T. Choudhury et al., "The mobile sensing platform: An embedded activity recognition system", IEEE Pervasive Comput., vol. 7, no. 2, pp. 32-41, Apr./Jun. 2008.

S. B. Eisenman, E. Miluzzo, N. D. Lane, R. A. Peterson, G.-S. Ahn, A. T. Campbell, "BikeNet: A mobile sensing system for cyclist experience mapping", ACM Trans. Sensor Netw., vol. 6, no. 1, pp. 6, Dec. 2009.

F. Alt, A. S. Shirazi, A. Schmidt, U. Kramer, Z. Nawaz, "Location-based crowdsourcing: Extending crowdsourcing to the real world", Proc. 6th Nordic Conf. Human-Comput. Interact. Extending Boundaries, pp. 13-22, 2010.

A. R. Khan, M. Othman, S. A. Madani, S. U. Khan, "A survey of mobile cloud computing application models", IEEE Commun. Surveys Tuts., vol. 16, no. 1, pp. 393-413, Feb. 2014.

S. Abolfazli, Z. Sanaei, E. Ahmed, A. Gani, R. Buyya, "Cloud-based augmentation for mobile devices: Motivation taxonomies and open challenges", IEEE Commun. Surveys Tuts., vol. 16, no. 1, pp. 337-368, Feb. 2014.

N. Fernando, S. W. Loke, W. Rahayu, "Dynamic mobile cloud computing: Ad hoc and opportunistic job sharing", Proc. 4th IEEE Int. Conf. Utility Cloud Comput. (UCC), pp. 281-286, Dec. 2011.

G. Huerta-Canepa, D. Lee, "A virtual cloud computing provider for mobile devices", Proc. 1st ACM Workshop Mobile Cloud Comput. Services Social Netw. Beyond, pp. 6, 2010.

E. E. Marinelli, "Hyrax: Cloud computing on mobile devices using MapReduce", 2009.

I. Krontiris, F. C. Freiling, T. Dimitriou, "Location privacy in urban sensing networks: Research chall enges and directions [Security and Privacy in Emerging Wireless Networks]", IEEE Wireless Commun., vol. 17, no. 5, pp. 30-35, Oct. 2010.

J. W. S. Brown, O. Ohrimenko, R. Tamassia, "Haze: Privacy-preserving real-time traffic statistics", Proc. 21st ACM SIGSPATIAL Int. Conf. Adv. Geograph. Inf. Syst., pp. 540-543, 2013.

M. Duckham, L. Kulik, "A formal model of obfuscation and negotiation for location privacy" in Pervasive Computing, New York, NY, USA:Springer-Verlag, pp. 152-170, 2005.

R. Shokri, G. The odorakopoulos, C. Troncoso, J.-P. Hubaux, J.-Y. L. Boudec, "Protecting location privacy: Optimal strategy against localization attacks", Proc. ACM Conf. Comput. Commun. Secur., pp. 617-627, 2012.

M. L. Yiu, G. Ghinita, C. S. Jensen, P. Kalnis, "Enabling search services on outsourced private spatial data", VLDB J., vol. 19, no. 3, pp. 363-384, Jun. 2010.


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.