International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 125 | Views: 300

Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 1, January 2015 | Popularity: 6.4 / 10


     

Survey Paper on Location Privacy Preserving and Finding Optimal Meeting Location using Secured Homomorphism

Ritesh Thakur, Vilas Shelke


Abstract: Equipped with progressive smartphones and mobile devices, today's extremely interconnected urban population is more and more addicted to these gadgets to prepare and set up their daily lives. These applications usually suppose current (or preferred) locations of individual users or a bunch of users to produce the required service, that jeopardizes their privacy, users don't essentially wish to reveal their current (or preferred) locations to the service supplier or to different, presumably untrusted, users. During this paper, we tend to propose privacy-preserving algorithms for deciding Associate in Nursing best meeting location for a bunch of users. we tend to perform a radical privacy analysis by formally quantifying privacy-loss of the projected approaches. so as to check the performance of our algorithms during a real readying, we tend to implement and take a look at their execution potency on Nokia smartphones. By means that of a targeted user-study, we tend to plan to get Associate in nursing insight into the privacy-awareness of users in location based mostly services and also the usability of the projected solutions.


Keywords: privacy, Mobile application, oblivious computation


Edition: Volume 4 Issue 1, January 2015


Pages: 339 - 343



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Ritesh Thakur, Vilas Shelke, "Survey Paper on Location Privacy Preserving and Finding Optimal Meeting Location using Secured Homomorphism", International Journal of Science and Research (IJSR), Volume 4 Issue 1, January 2015, pp. 339-343, https://www.ijsr.net/getabstract.php?paperid=SUB1527, DOI: https://www.doi.org/10.21275/SUB1527



Similar Articles

Downloads: 5 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024

Pages: 516 - 519

I-Vote Android Application for Internet-Voting

Rahul Kumar, Hima Saxena, Dr. Suman Sharma

Share this Article

Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Downloads: 0

Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023

Pages: 581 - 585

Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security

R. Vidhya, R. Sathya

Share this Article

Downloads: 1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2267 - 2274

Two Accounts of Solitude in Online Communal Networks

Alla Venu Gopal, G. Srinivasa Reddy

Share this Article

Downloads: 1

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021

Pages: 1126 - 1129

Privacy Preserving Utility Verification of Data Published

Madhushree M

Share this Article
Top