Clients Location Hiding in Geosocial Recommendation Applications
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 153 , Downloads: 108 | CTR: 71 % | Weekly Popularity: ⮙2

Review Papers | Computer Science & Engineering | India | Volume 5 Issue 2, February 2016

Clients Location Hiding in Geosocial Recommendation Applications

Khadke Shriram Bhanudasrao, Mahadik Pravin B.

Customer's Location Hiding In FourSquare is one of the Geosocial application in which lots of communities interrelate with their surrounding surroundings through their friends and their recommendations. With respect to security issues Geosocial application can simply misused, for instance to follow the user or target them for home invasions. In this way giving the protection to the Geosocial application is the research issue, existing system provides location protection without including vulnerability into the question results or depending on strong assumptions about server security. In existing systems the user send message to the another user is of greater size, in this way the expenses of the server database is increases on existing system. In this manner in the proposed system which provides the security to the user's location as well as uses compression calculation to compress and decompress the message so that that the message recovery the reality of the situation will become obvious eventually lesser than the previous system . By using our proposed system cost of the server database will decrease and the time required for transmitting the message is also decreases. The system encrypts the message for the security purpose. The proposed system provides security and improves the execution of the Geosocial application. The proposed system also uses keyed tags and arbitrary tags which adjust the protection and execution of the system. The keyed tag provides strong protection and irregular tags give security and high effectiveness to the system.

Keywords: Mobile location-based services, security, privacy

Edition: Volume 5 Issue 2, February 2016

Pages: 61 - 64

Share this Article

How to Cite this Article?

Khadke Shriram Bhanudasrao, Mahadik Pravin B., "Clients Location Hiding in Geosocial Recommendation Applications", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV153112, Volume 5 Issue 2, February 2016, 61 - 64

153 PDF Views | 108 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Mobile location-based services'

Views: 174 , Downloads: 99 | CTR: 57 % | Weekly Popularity: ⮙5

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1486 - 1489

Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System

Digvijay A. Patil, Yogesh B. Gurav

Share this Article

Views: 144 , Downloads: 104 | CTR: 72 % | Weekly Popularity: ⮙4

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 3033 - 3035

A Survey on Security and Privacy Based Location Based Recompense Scheme

Prema. S. Patil Wankhede, M. K Kodmelwar

Share this Article

Views: 153 , Downloads: 108 | CTR: 71 % | Weekly Popularity: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016

Pages: 61 - 64

Clients Location Hiding in Geosocial Recommendation Applications

Khadke Shriram Bhanudasrao, Mahadik Pravin B.

Share this Article

Views: 137 , Downloads: 116 | CTR: 85 % | Weekly Popularity: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016

Pages: 1030 - 1035

Functional Context Awareness: Measuring and Utilizing the Context Dependency of Mobile Usage

Swati S. Gore, Prachi A. Joshi

Share this Article

Views: 157 , Downloads: 123 | CTR: 78 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 9, September 2016

Pages: 709 - 713

Secured Location-Based Rewarding System Using Digital Signature (SLBRDS)

Rubina Ashfaque Shah, Dr. Rahat Khan

Share this Article

Similar Articles with Keyword 'security'

Views: 36 , Downloads: 29 | CTR: 81 % | Weekly Popularity: ⮙15

Research Paper, Computer Science & Engineering, Sri Lanka, Volume 10 Issue 4, April 2021

Pages: 139 - 144

Analysis onto the Evolving Cyber-Attack Trends during COVID-19 Pandemic

Senthuran Nallainathan

Share this Article

Views: 47 , Downloads: 40 | CTR: 85 %

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Views: 49 , Downloads: 40 | CTR: 82 % | Weekly Popularity: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Views: 165 , Downloads: 40 | CTR: 24 %

Research Paper, Computer Science & Engineering, China, Volume 9 Issue 4, April 2020

Pages: 1544 - 1554

Recent Developments on Probabilistic Graphical Model Applied in Data Analysis

Kan'Sam Nadjak, Guisheng Yin

Share this Article

Views: 48 , Downloads: 46 | CTR: 96 % | Weekly Popularity: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Similar Articles with Keyword 'privacy'

Views: 40 , Downloads: 32 | CTR: 80 % | Weekly Popularity: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2267 - 2274

Two Accounts of Solitude in Online Communal Networks

Alla Venu Gopal, G. Srinivasa Reddy

Share this Article

Views: 166 , Downloads: 88 | CTR: 53 % | Weekly Popularity: ⮙4

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 823 - 826

Survey Paper on Users Location Hiding In Geosocial Recommendation Applications

Mayura Phadnis, Kanchan Varpe

Share this Article

Views: 134 , Downloads: 92 | CTR: 69 % | Weekly Popularity: ⮙4

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1253 - 1257

Implementation Details of Anonymization of Sensitive Labels in Collaborative Data Publishing

Vandhana V

Share this Article

Views: 129 , Downloads: 98 | CTR: 76 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2383 - 2384

Location Based Query Processing For Providing Privacy to Exploit Service Similarity: A Survey

Prerana Deokar, Praveen Barapatre

Share this Article

Views: 124 , Downloads: 98 | CTR: 79 % | Weekly Popularity: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1587 - 1591

Layers of Internet Privacy

Amit Dabas, Ashish Kumar Sharma

Share this Article
Top