Downloads: 111 | Views: 287
Review Papers | Computer Science & Engineering | India | Volume 5 Issue 2, February 2016 | Popularity: 6.9 / 10
Clients Location Hiding in Geosocial Recommendation Applications
Khadke Shriram Bhanudasrao, Mahadik Pravin B.
Abstract: Customer's Location Hiding In FourSquare is one of the Geosocial application in which lots of communities interrelate with their surrounding surroundings through their friends and their recommendations. With respect to security issues Geosocial application can simply misused, for instance to follow the user or target them for home invasions. In this way giving the protection to the Geosocial application is the research issue, existing system provides location protection without including vulnerability into the question results or depending on strong assumptions about server security. In existing systems the user send message to the another user is of greater size, in this way the expenses of the server database is increases on existing system. In this manner in the proposed system which provides the security to the user's location as well as uses compression calculation to compress and decompress the message so that that the message recovery the reality of the situation will become obvious eventually lesser than the previous system. By using our proposed system cost of the server database will decrease and the time required for transmitting the message is also decreases. The system encrypts the message for the security purpose. The proposed system provides security and improves the execution of the Geosocial application. The proposed system also uses keyed tags and arbitrary tags which adjust the protection and execution of the system. The keyed tag provides strong protection and irregular tags give security and high effectiveness to the system.
Keywords: Mobile location-based services, security, privacy
Edition: Volume 5 Issue 2, February 2016
Pages: 61 - 64
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 5 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024
Pages: 516 - 519I-Vote Android Application for Internet-Voting
Rahul Kumar, Hima Saxena, Dr. Suman Sharma
Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 991 - 995A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
M. Meena, A. Komathi
Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2246 - 2249Packet Analysis with Network Intrusion Detection System
Rashmi Hebbar, Mohan K
Downloads: 0
Student Project, Computer Science & Engineering, India, Volume 11 Issue 1, January 2022
Pages: 455 - 459Real World IoT Applications in Daily Domain
Eega Vivek Reddy, J Bala Krishna, Huzaifa Saad
Downloads: 0
Survey Paper, Computer Science & Engineering, India, Volume 11 Issue 7, July 2022
Pages: 1023 - 1029A Survey and High-Level Design on Human Activity Recognition
Abhishikat Kumar Soni, Dhruv Agrawal, Md. Ahmed Ali, Dr. B. G. Prasad