CFP last date
20 May 2024
Reseach Article

Improved the Location Privacy Preserving Method in Location based Services using Modified Bloom Filter

by Sandeep Yadav, Nirmal Gaud
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 154 - Number 11
Year of Publication: 2016
Authors: Sandeep Yadav, Nirmal Gaud
10.5120/ijca2016912207

Sandeep Yadav, Nirmal Gaud . Improved the Location Privacy Preserving Method in Location based Services using Modified Bloom Filter. International Journal of Computer Applications. 154, 11 ( Nov 2016), 31-36. DOI=10.5120/ijca2016912207

@article{ 10.5120/ijca2016912207,
author = { Sandeep Yadav, Nirmal Gaud },
title = { Improved the Location Privacy Preserving Method in Location based Services using Modified Bloom Filter },
journal = { International Journal of Computer Applications },
issue_date = { Nov 2016 },
volume = { 154 },
number = { 11 },
month = { Nov },
year = { 2016 },
issn = { 0975-8887 },
pages = { 31-36 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume154/number11/26537-2016912207/ },
doi = { 10.5120/ijca2016912207 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:00:00.222666+05:30
%A Sandeep Yadav
%A Nirmal Gaud
%T Improved the Location Privacy Preserving Method in Location based Services using Modified Bloom Filter
%J International Journal of Computer Applications
%@ 0975-8887
%V 154
%N 11
%P 31-36
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The increasing technology of smart device used GPS based service for the positing of location. The location of user and server disclose the actual position of location. The actual location of position faced a problem of threats. The privacy of real position of server and user is major issue in GPS enabled smart devices. In this paper proposed location privacy preservation algorithm using improved bloom filter. Bloom filter is basically data structure and map the single bit information. The proposed method based on two basic processing feature of GPS area of interest (AOI) and position of interest (POI). The proposed algorithm validated the real location of privacy preservation. The proposed algorithm preserves location privacy at low computational and communication cost.

References
  1. Paarijaat Adyta, Viktor Redeye, Matthew Lentz, Elaine Shi, Bobby Bhattacharjee and Peter Druschel “Encore: Private, Context-based Communication for Mobile Social Apps”, International conference on Mobile systems, applications, and services, 2014, Pp 135-148.
  2. Rasa Khan, Shams Zeroed, Mad Mineral Hague and Raga Has an “OTIT: Towards Secure Provenance Modeling for Location Proofs”, Information, computer and communications security, 2014, Pp 87-98.
  3. Shunning Lu and Goofing Sheen “A Novel Safe File Sharing Method Based on Cloud Storage Structure in DHT Networks”, International Journal of Security and Its Applications, 2015, Pp 189-200.
  4. Fang Xia, Li Liu, Jibe Li, Xinhua Ma and Athanasius V. Vasilakos “Socially-Aware Networking: A Survey”, IEEE, 2013, Pp 1-18.
  5. Vassar Raychoudhury, Japanning Cao, Mohan Kumar and Daring Zhang “Middleware for pervasive computing: A survey”, journal Pervasive and Mobile Computing, 2013, Pp 1-24.
  6. Asher Najaflou, Beerhouse Javari, Fang Xia, Laurence T. Yang and Mohammad S. Obadiah “Safety Challenges and Solutions in Mobile Social Networks”, IEEE, 2013, Pp 1-21.
  7. Dong Chen and Guerin Chang “A Survey on Security Issues of M2M Communications in Cyber-Physical Systems”, KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2012, Pp 24-45.
  8. Lei Xian, Member, Aveng Yin, Athanasius V. Vasilakos and Single Lu “Managing RFID Data: Challenges, Opportunities and Solutions”, IEEE, 2014, Pp 1-18.
  9. Santali Patel, Dr Vijay Kumar B P, Somali Singh and Rashique Jamal “A Survey on Authentication Techniques for Wireless Sensor Networks”, International Journal of Applied Engineering Research, 2012, Pp 1-4.
  10. Yao Zhen, Ming Li, Wending Lou and Y. Thomas Hour “Location Based Handshake and Private Proximity Test with Location Tags”, IEEE, 2015, Pp 1-14.
  11. Xingjian Chen, Kia Make, Kang Yen and Nike Passion “Xingjian Chen, Kia Make, Kang Yen, and Nike Passion”, IEEE, 2009, Pp 52-73.
  12. Paarijaat Adyta, Bobby Bhattacharjee, Peter Druschel, Viktor Redeye and Matthew Lentz “Brave New World: Privacy Risks for Mobile Users”, Security and privacy in mobile environments, 2014, Pp 1-5.
  13. Rasa Khan and Raga Has an “SecP2PSIP: A Distributed Overlay Architecture for Secure P2PSIP”, ASE, 2014, Pp 1-12.
  14. Keen Sung, Brian Neil Levine and Marc Liberator “Location Privacy without Carrier Cooperation”, IEEE, 2014, Pp 1-10.
  15. Ming-Chin Chuang and Jeng-Farn Lee “TEAM: Trust-Extended Authentication Mechanism for Vehicular Ad Hoc Networks”, IEEE, 2013, Pp 1-10.
  16. Yao Zhen, Ming Li, Wending Lou and Y.Thomas Hour “SHARP: Private Proximity Test and Secure Handshake with Cheat-Proof Location Tags”, Springer Berlin Heidelberg, 2012, Pp 1-18.
  17. Iris A. Jungles and Richard T. Watson “LOCATION-BASED SERVICES”, COMMUNICATIONS OF THE ACM, 2008, Pp 65-70.
  18. Lenin Ravindranath, Jitendra Paddy, Shared Agawam, Retool Mahakam, Ian Obermiller and Shahn Shayandeh “AppInsight: Mobile App Performance Monitoring in the Wild”, USENIX Symposium on Operating Systems Design and Implementation, 2012, Pp 107-120.
  19. Jibe Liu, F. Richard Yu, Chung-Horn Lung and Helen Tang “Optimal Combined Intrusion Detection and Biometric-Based Continuous Authentication in High Security Mobile Ad Hoc Networks”, IEEE, 2009, Pp 806-815.
  20. L. Garc´es-Erice, P.A. Feebler, E.W. Bier sack, G. Purvey-Keller and K.W. Ross “Data Indexing in Peer-to-Peer DHT Networks”, EURECOM, 2003, Pp 1-12
  21. J.A. Powel’s, P. Garbacki, D.H.J. Edema, H.J. Sips “THE BITTORRENT P2P FILE-SHARING SYSTEM: MEASUREMENTS AND ANALYSIS”, IEEE, 2006, Pp 1-6.
  22. Stephen Void, W. Keith Edwards, Mark W. Newman, Rebecca E. Granter and Nicolas Ducheneaut “Share and Share Alike: Exploring the User Interface Affordances of File Sharing”, ACM, 2006, Pp 1-10.
  23. Keith Cheers, Gareth Smith, Keith Mitchell and Nigel Davies “Exploiting Context to Support Social Awareness and Social Navigation”, ACM, 2000, Pp 512-518.
  24. Kay Roomer, Oliver Chasten and Friedman Matter “Middleware Challenges for Wireless Sensor Networks∗” NCCR-MICS, 2001, Pp 1-2.
  25. Don Carney, Our Çetintemel, Mitch Cherniack, Christian Convey, Sang Don Lee, Greg Sideman, Michael Stonebreaker, Newsome Tactful and Stan Sonic “Monitoring Streams – A New Class of Data Management Applications”, VLDB Conference, 2002, Pp 1-12.
  26. Alastair R. Beresford and Frank Stefano “Location Privacy in Pervasive Computing”, IEEE, 2003, Pp 46-55.
Index Terms

Computer Science
Information Sciences

Keywords

LBPS privacy preserving bloom filter Google map