Privacy Preserving Location Proof Updating System

Authors

  • Kumar S. D PG Student, Sathyabama University
  • Jesudoss A Assistant Professor, Faculty of Computing, Sathyabama University
  • Saravanan D Assistant Professor, Faculty of Computing, Sathyabama University

Keywords:

Location-based check, location proof, location confidentiality, fictitious name, collude attack

Abstract

Location-sensitive service broadcasting on user’s mobile devices to discover the current location. A privacy preserving Location proof updating system(APPLAUS),which does not rely on the wide deployement of network infrastructure or the expensive trusted computing module.In APPLAUS, Bluetooth enabled mobile devices in range mutually generate location proofs,which are uploaded to a untrusted location proof. An authorized verifier can query and retrieve location proofs from the server.Moreover,our location proof system guarantees user location privacy from every party.Bluetooth enabled mobile devices in range mutually generate location proofs.CA used to be the bridges between the verifier and the location proof server.

References

M. Li, R. Poovendran, K. Sampigethaya, and L. Huang, “Caravan: Providing Location Privacy for VANET,” Proc. Embedded Security in Cars (ESCAR) Workshop, 2005.

D.Saravanan, Dr.S.Srinivasan, “Data Mining Framework for Video Data”, In the Proc.of International Conference on Recent Advances in Space Technology Services & Climate Change (RSTS&CC-2010), held at Sathyabama University, Chennai, November 13-15, 2010.Pages 196-198

M. Li, K. Sampigethaya, L. Huang, and R. Poovendran, “Swing & Swap: User-Centric Approaches Towards Maximizing Location Privacy,” Proc. Fifth ACM Workshop Privacy in Electronic Soc., 2006.

Y. Li and J. Ren, “Source-Location Privacy Through Dynamic Routing in Wireless Sensor Networks,” Proc. IEEE INFOCOM, 2010.

W. Luo and U. Hengartner, “Proving Your Location Without Giving Up Your Privacy,” Proc. ACM 11th Workshop Mobile Computing Systems and Applications (HotMobile ’10), 2010.

L. Buttya´n, T. Holczer, and I. Vajda, “On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANETs,” Proc. Fourth European Conf. Security and Privacy in Ad-Hoc and Sensor Networks, 2007.

Beresford, A.R., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Computing 3(1), 46–55 (2003)

. Beresford, A., Stajano, F.: Mix Zones: User privacy in location-aware services. In: Proceedings of First IEEE International Workshop on Pervasive Computing and Communication Security (PerSec) 2004, a workshop in PerCom (2004)

D.Saravanan, Dr.S.Srinivasan, “Video Image Retrieval Using Data Mining Techniques “Journal of Computer Applications, Volume V, Issue No.1. Jan-Mar 2012. Pages39-42. ISSN: 0974-1925.

H. Chan, A. Perrig, and D. Song. Random Key Predistribution Schemes for Sensor Networks. In Proceedings of the IEEE Symposium on Research in Security and Privacy, page 197. IEEE Computer Society, May 2003.

A.R. Beresford and F. Stajano, “Location Privacy in Pervasive Computing,” IEEE Security and Privacy, 2003.

Jesudoss A. and Subramaniam, N.P., “A Taxonomy of Authentication Techniques for Web Services”, International Journal of Engineering Research & Technology, Vol. 3, Issue 1, Jan. 2014, pp.271-275.

U. Brandes, “A Faster Algorithm for Betweenness Centrality,” J. Math. Sociology, vol. 25, no. 2, pp. 163-177, 2001.

D.Saravanan, Dr.S.Srinivasan, “ A proposed New Algorithm for Hierarchical Clustering suitable for Video Data mining.”, International journal of Data Mining and Knowledge Engineering”, Volume 3, Number 9, July 2011.Pages 569.

Downloads

Published

2024-02-26

How to Cite

Kumar S., D., Jesudoss, A., & Saravanan, D. (2024). Privacy Preserving Location Proof Updating System. COMPUSOFT: An International Journal of Advanced Computer Technology, 3(03), 668–672. Retrieved from https://ijact.in/index.php/j/article/view/119

Issue

Section

Original Research Article

Similar Articles

1 2 3 4 5 6 > >> 

You may also start an advanced similarity search for this article.