Evaluation of LOCX for location-basedsocial applications (LBSAS) while preserving user locationprivacy

M.Vamsi Krishna, Ch. Sandeep

Abstract


Geo-social applications function on fine-grain, time-stamped location information. For existing services with negligible solitude mechanisms, this data can be used to deduce a user’s detailed activities, or to path and forecast the user’s every day movements. The confront, then, is to intend mechanisms that powerfully guard user privacy with no give up the correctness of the system, or making brawny assumptions about the sanctuary or dependability of the application servers. More particularly, we objective geo-social applications, and presume that servers and any mediators can be conciliation and, therefore, are untrusted. To edge maltreatment, our ambition is to border convenience of location information from global visibility to a user’s communal surround.


References


M. Motani, V. Srinivasan, and P. S. Nuggehalli, “Peoplenet: engineering a wireless virtual social network,” in Proc. of MobiCom, 2005.

M. Hendrickson, “The state of location-based social networking,” 2008.

P. Mohan, V. N. Padmanabhan, and R. Ramjee, “Nericell: rich monitoring of road and traffic conditions using mobile smartphones,” in Proc. of SenSys, 2008.

G. Ananthanarayanan, V. N. Padmanabhan, L. Ravindranath, and C. A. Thekkath, “Combine: leveraging the power of wireless peers through collaborative downloading,” in Proc. of MobiSys, 2007.

M. Siegler, “Foodspotting is a location-based game that will make your mouth water,” http://techcrunch.com/2010/03/04/foodspotting/.

http://www.scvngr.com.

B. Schilit, J. Hong, and M. Gruteser, “Wireless location privacy protection,” Computer, vol. 36, no. 12, pp. 135–137, 2003.

F. Grace, “Stalker Victims Should Check For GPS,” Feb. 2003, www.cbsnews.com.

DailyNews, “How cell phone helped cops nail key murder suspect secret ’pings’ that gave bouncer away,” Mar. 2006.

“Police: Thieves robbed homes based on facebook, social media sites,” WMUR News, September 2010, http://www.wmur.com/r/24943582/detail.html.

M. Gruteser and D. Grunwald, “Anonymous usage of location-based services through spatial and temporal cloaking,” in Proc. of Mobisys, 2003.

M. F. Mokbel, C.-Y. Chow, and W. G. Aref, “The new casper: A privacyaware location-based database server,” in ICDE, 2007.

B. Gedik and L. Liu, “Location privacy in mobile systems: A personalized anonymization model,” in Proc. of ICDCS, 2005.

T. Jiang, H. J. Wang, and Y.-C. Hu, “Preserving location privacy in wireless lans,” in Proc. of MobiSys, 2007.

P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias, “Preventing location-based identity inference in anonymous spatial queries,” TKDE, 2007.


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.