Open Access   Article Go Back

Efficient Analysis of Differential Query Services in Mobile Crowd and Its Location Privacy

K.Vetrikodi 1 , V.Geetha 2

Section:Review Paper, Product Type: Journal Paper
Volume-3 , Issue-8 , Page no. 168-175, Aug-2015

Online published on Aug 31, 2015

Copyright © K.Vetrikodi , V.Geetha . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: K.Vetrikodi , V.Geetha, “Efficient Analysis of Differential Query Services in Mobile Crowd and Its Location Privacy,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.8, pp.168-175, 2015.

MLA Style Citation: K.Vetrikodi , V.Geetha "Efficient Analysis of Differential Query Services in Mobile Crowd and Its Location Privacy." International Journal of Computer Sciences and Engineering 3.8 (2015): 168-175.

APA Style Citation: K.Vetrikodi , V.Geetha, (2015). Efficient Analysis of Differential Query Services in Mobile Crowd and Its Location Privacy. International Journal of Computer Sciences and Engineering, 3(8), 168-175.

BibTex Style Citation:
@article{_2015,
author = {K.Vetrikodi , V.Geetha},
title = {Efficient Analysis of Differential Query Services in Mobile Crowd and Its Location Privacy},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {8 2015},
volume = {3},
Issue = {8},
month = {8},
year = {2015},
issn = {2347-2693},
pages = {168-175},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=629},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=629
TI - Efficient Analysis of Differential Query Services in Mobile Crowd and Its Location Privacy
T2 - International Journal of Computer Sciences and Engineering
AU - K.Vetrikodi , V.Geetha
PY - 2015
DA - 2015/08/31
PB - IJCSE, Indore, INDIA
SP - 168-175
IS - 8
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2527 2346 downloads 2337 downloads
  
  
           

Abstract

The quick progresses of versatile gadgets also, situating advancements has driven to the thrive of Area Based Administrations (LBS), in that people need to enjoy remote organizations all over the place like in hotels, colleges, etc. LBS, the branch of PC program level organizations utilized in different fields also, support, the application are broadly grouped as Maps also, Navigation, Data service, Tracking service, Social networking, Games, Vehicular navigation also, Advertising etc. Presently a days, LBSs attract millions of versatile customers on the other hand illustration incorporate POI finders such as Type, which help the customers to find the next POI such as bars on the other hand cinemas, also, enrich the given information. In any case amid this communication, Security also, Security of individual range data (of LBSs users) is getting to be an increasingly critical issue on the other hand future. So concerning it (privacy) as a critical issue, examines a few assurance protecting range issues on the other hand vehicular (mobile) customers (since information of a vehicle’s range can result in leakage of delicate information). Area assurance on the other hand versatile customers is mainly determined into two levels such as internally by a gadget on the other hand externally by structures also, kind of systems with which the gadget interrelates. Users wish to keep up the vehicle’s data is known just to those legally authorized to have access to them also, recrucial obscure to anybody unauthorized. Thus the reason also, commitment of this paper is to examined about different assurance also, challenges issues in LBSs expanding in future that have not been published in the any relook journal so far.

Key-Words / Index Term

Area Privacy, Area Based Administrations (LBSs), Security

References

[1] Sang Jun Park ; Dept. of Comput. Sci., Indiana Univ.-Purdue Univ., Fort Wayne, IN, USA ; Jin Soung Yoo” Leveraging cloud computing for spatial association mining” Published in: Systems, Man and Cybernetics (SMC), 2014 IEEE International Conference on Date of Conference:5-8 Oct. 2014 Page(s):4152 – 4153.
[2] Wang Yong ; Dept. of Comput. Sci. & Eng., Guilin Univ. of Electron. Technol., Guilin, China ; Zhang Zhe ; Wang Fang” A parallel algorithm of association rules based on cloud computing” Published in:Communications and Networking in China (CHINACOM), 2013 8th International ICST Conference on Date of Conference:14-16 Aug. 2013 Page(s):415 – 419.
[3] Xueyan Huang ; Wireless Signal Process. & Network Lab., Beijing Univ. of Posts & Telecommun., Beijing, China ; Yong Li ; Gang Chuai ; Mugen Peng” Work in progress: Dynamic resource allocation and user association for heterogeneous cloud cellular networks” Published in:Communications and Networking in China (CHINACOM), 2014 9th International Conference on Date of Conference: 14-16 Aug. 2014Page(s):474 – 477.
[4] Zhao-hong Wang ; Dept. of Comput. Sci. & Technol., Weifang Univ., Weifang, China Quantitative Association Rules MiningMethod Based on Trapezium Cloud Model Published in: Database Technology and Applications (DBTA), 2010 2ndInternational Workshop on Date of Conference:27-28 Nov. 2010Page(s):1 – 4.
[5] Zhihui Zhou ; Coll. of Comput. Sci. & Technol., Jilin Univ., Changchun, China ; Guixia Liu ; Lingtao Su ; Lun Yan” CChi: An efficient cloud epistasis test model in human genome wide association studies” Published in: Biomedical Engineering and Informatics (BMEI), 2013 6th International Conference on Date of Conference:16-18 Dec. 2013Page(s):787 – 791.
[6] Sunitha, N.R. ; Dept. of Comput. Sci. &Eng., Siddaganga Inst. of Technol., Tumkur ; Amberker, B.B.” Forward-Secure Proxy Signature Scheme for Multiple Proxy Signers using DSA with Proxy Revocation” Published in:Advance Computing Conference, 2009. IACC 2009. IEEEInternational Date of Conference:6-7 March 2009Page(s):681 – 686.
[7] Jindan Zhang ; Dept. of Electron. Inf., Xianyang Vocational Tech. Coll., Xianyang ; Xu An Wang” Non-transitive Bidirectional Proxy Re-encryption Scheme” Published in: Networking and Digital Society, 2009. ICNDS '09. InternationalConference on (Volume:1 )Date of Conference: 30-31 May 2009 Page(s):213 – 216.
[8] Liu Wen-Yuan ; Yanshan Univ., Qinhuangdao ; Tong Feng ; Luo Yong-An ; Zhang Feng” A Proxy Blind Signature Scheme Based on Elliptic Curve with Proxy Revocation” Published in: Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2007. SNPD 2007. Eighth ACIS International Conference on (Volume:1 )Date of Conference: July 30 2007-Aug. 1 2007Page(s):99 – 104.
[9] Iuon-Chang Lin ; Dept. of Manage. Inf. Syst., Nat. Chung Hsing Univ., Taichung ; Chin-Chen Chang ; Jen-Ho Yang” An Efficient Proxy Signature Scheme for Realizing Generalized Proxy Signing Policy” Published in: Intelligent Information Hiding and Multimedia Signal Processing, 2008. IIHMSP '08 International Conference on Date of Conference:15-17 Aug. 2008 Page(s):1537 – 1540.
[10] Fengying Li ; Dept. of Educ. Inf. Technol., East China Normal Univ., Shanghai, China ; Qingshui Xue ; Jiping Zhang ; Zhenfu Cao” About the security for HW threshold proxy signature scheme with self-certified public key system” Published in:Communications and Networking in China, 2009. ChinaCOM 2009. Fourth International Conference onDate of Conference:26-28 Aug. 2009Page(s):1 – 5
[11] Songqing Chen ; Dept. of Comput. Sci., Coll. of William & Mary, Williamsburg, VA ; Bo Shen ; Wee, S. ; Xiaodong Zhang” Designs of high quality streaming proxy systems” Published in: INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies (Volume:3 ) Date of Conference:7-11 March 2004 Page(s):1512 - 1521 vol.3
[12] Bu Sung Lee ; HP Labs. Singapore, Singapore, Singapore ; Shixing Yan ; Ding Ma ; Guopeng Zhao” Aggregating IaaS Service” Published in:SRII Global Conference (SRII), 2011 Annual Date of Conference:March 29 2011-April 2 2011 Page(s):335 – 338.