A survey on privacy preserving and content protecting location based queries

  • Authors

    • K. Praveen Kumar
    • M. Anitha
    2017-12-31
    https://doi.org/10.14419/ijet.v7i1.5.9144
  • Content based mining, location based services, NN(nearest Neighbour), POI (points of Interest), Valid region (VR)
  • This paper presents a solution to one of the situation-based totally question problems. This downside is printed as follows: (i) a user desires to question a data of area records, referred to as factors Of interest (POI), and doesn't want to reveal his/her vicinity to the server way to privacy concerns; (ii) the proprietor of the state of affairs data, that is, the place server, would not wish to effortlessly distribute its statistics to any or all users. The scenario server needs to personal a few control over its data, since the data is its fine. A location based question resolution that employs 2 protocols that allows a person to privately verify and acquire vicinity statistics. The primary step is for a consumer to in private verify his/her region victimization oblivious switch on a public grid. Oblivious switch accustomed supply the goods a more secure resolution for every parties. the second one step involves a personal information retrieval interplay that retrieves the report with high communication performance. the answer this is gift is economical and realistic in numerous conditions. This paper consists of the effects of a operating example as an example the potency of our protocol.

  • References

    1. [1] D. Lee, B. Zheng, and W.-C. Lee, “Data Management in Location- Dependent Information Services,†IEEE Pervasive Computing, vol. 1, no. 3, pp. 65-72, July-Sept. 2002.

      [2] B. Zheng, J. Xu, and D.L. Lee, “Cache Invalidation and Replacement Strategies for Location-Dependent Data in Mobile Environments,†IEEE Trans. Computers, vol. 15, no. 10, pp. 1141- 1153, Oct. 2002.

      [3] B. Zheng and D.L. Lee, “Processing Location-Dependent Queries in a Multi-Cell Wireless Environment,†Proc.Second ACM Int’l Workshop Data Eng. for Wireless and Mobile Access, 2001.

      [4] B. Zheng, J. Xu, W.-C. Lee, and D.L. Lee, “On Semantic Caching and Query Scheduling for Mobile Nearest-Neighbor Search,†Wireless Networks, vol. 10, no. 6, pp. 653-664, Dec. 2004.

      [5] X. Gao and A. Hurson, “Location Dependent Query Proxy,†Proc.ACM Int’l Symp. Applied Computing, pp. 1120-1124, 2005.

      [6] X. Gao, J. Sustersic, and A.R. Hurson, “Window Query Processingwith Proxy Cache,â€

      [7] T. Padmapriya and V. Saminadan, “Improving Throughput for Downlink Multi user MIMO-LTE Advanced Networks using SINR approximation and Hierarchical CSI feedbackâ€, International Journal of Mobile Design Network and Innovation- Inderscience Publisher, ISSN : 1744-2850 vol. 6, no.1, pp. 14-23, May 2015.

      [8] S.V.Manikanthan and K.srividhya "An Android based secure access control using ARM and cloud computing", Published in: Electronics and Communication Systems (ICECS), 2015 2nd International Conference on 26-27 Feb. 2015,Publisher: IEEE,DOI: 10.1109/ECS.2015.7124833.

      [9] Rajesh, M., and J. M. Gnanasekar. "Path observation-based physical routing protocol for wireless ad hoc networks." International Journal of Wireless and Mobile Computing 11.3 (2016): 244-257.

  • Downloads

  • How to Cite

    Praveen Kumar, K., & Anitha, M. (2017). A survey on privacy preserving and content protecting location based queries. International Journal of Engineering & Technology, 7(1.5), 185-190. https://doi.org/10.14419/ijet.v7i1.5.9144