Knn Search with Location and Query Solitude Using Bit Exchanging Method

  • Authors

    • K Suja
    • Dr A. Rengarajan
    2018-09-01
    https://doi.org/10.14419/ijet.v7i3.34.18967
  • Bit Exchange, decryption, encryption, Killer application, KNN
  • In recent years, the need for sharing data containing user details is becoming a huge necessity. Maintaining those data becomes a complex task. In our project, we use a technique called “Bit Exchanging Method†where the data are encrypted so that they can be protected from the adversaries. The updated records needed to be checked often so that they can be used by the encryption techniques. We use a search so called as LBS which a breakthrough concept and technology which offers us an innovative search based on the user current location. They help us to find the user’s nearby pizza shop, restaurant, colleges, or any other service stations. Location based service provides the set of service which provides the geographic location of the user. Our project revolves around the HTML5 Geo Location which is an API used to find the location of the user. We utilize k closest neighbor questions where the portable client inquiries the area based specialist organization about surmised k closest purposes of enthusiasm on the premise of his present area. The installing of situating abilities in cell phones encourages the development of area based administrations which is considered as the following "executioner application" in the remote information advertise. Compared with our existing work, our solutions are efficient and provide secured privacy. Examinations have demonstrated that our answer is proper for KNN inquiries.

     

     
  • References

    1. [1] R. Schlegel, C. Chow, Q. Huang, D. Wong. User-defined privacy grid system for continuous location-based Services. IEEE Transactions on Mobile Computing, (Jan. 2015).

      [2] X. Yi, R. Paulet , E. Bertino, V. Varadharajan. Practical k nearest neighbor queries with location privacy. In Proc. ICDE (2015).

      [3] G. Ghinita, R. Rughinis. An efficient privacy-reserving system for monitoring mobile users: making searchable encryption practical. in Proc. ACM CODASPY (2014).

      [4] Y. Elmehdwi, B. K. Samanthula, W. Jiang. Secure k-nearest neighbor query over encrypted data in outsourced environments. In Proc. ICDE (2014).

      [5] R. Paulet, M. Golam Kaosar, X. Yi, and E. Bertino. Privacy preserving and content-protecting location based queries(2013).

      [6] B. Yao, F. Li, and X. Xiao. Secure nearest neighbor revisited. In Proc. ICDE (2013).

      [7] R. Paulet, M. Golam Kaosar, X. Yi, and E. Bertino. Privacy preserving and content-protecting location based queries. In Proc.ICDE (2012).

      [8] B. Palanisamy and L. Liu. Mobimix: Protecting location privacy with mix-zones over road networks. In Proc. ICDE (2011).

      [9] Haibo Hu, Jianliang Xu, Chushi Ren, and Byron Choi, Processing Private Queries over Untrusted Data Cloud through Privacy Homomorphism, In Proc. ICDE (2011).

      [10] S. Papadopoulos, S. Bakiras, D. Papadias. Nearest neighbor search with strong location privacy. In Proc. VLDB (2010).

      [11] G. Ghinita, P. Kalnis, M. Kantarcioglu, and E. Bertino. Approximate and exact hybrid algorithms for private nearest-neighbor queries with database protection. GeoInformatica 15(14): 699-726, (2010).

      [12] B. Bamba, L. Liu, P. Pesti, and T. Wang. Supporting anonymous location queries in mobile environments with PrivacyGrid. In Proc. WWW (2008).

      [13] G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K.-L. Tan. Private queries in location-based services: Anonymizers are not necessary. In Proc. ACM SIGMOD (2008).

      [14] A. Khoshgozaran and C. Shahabi. Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy. In Proc. SSTD (2007).

      [15] R. Ostrovsky and W. Skeith. A survey of single-database private information retrieval: techniques and applications. In Proc. PKC (2007).

  • Downloads

  • How to Cite

    Suja, K., & A. Rengarajan, D. (2018). Knn Search with Location and Query Solitude Using Bit Exchanging Method. International Journal of Engineering & Technology, 7(3.34), 213-216. https://doi.org/10.14419/ijet.v7i3.34.18967