Client's Location Hiding in Geosocial Recommendation Applications
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Review Papers | Computer Science & Engineering | India | Volume 5 Issue 2, February 2016

Client's Location Hiding in Geosocial Recommendation Applications

Khadke Shriram Bhanudasrao, Mahadik Pravin B.

Customer's Location Hiding In FourSquare is one of the Geosocial application in which lots of communities interrelate with their surrounding surroundings through their friends and their recommendations. With respect to security issues Geosocial application can simply misused, for instance to follow the user or target them for home invasions. In this way giving the protection to the Geosocial application is the research issue, existing system provides location protection without including vulnerability into the question results or depending on strong assumptions about server security. In existing systems the user send message to the another user is of greater size, in this way the expenses of the server database is increases on existing system. In this manner in the proposed system which provides the security to the user's location as well as uses compression calculation to compress and decompress the message so that that the message recovery the reality of the situation will become obvious eventually lesser than the previous system . By using our proposed system cost of the server database will decrease and the time required for transmitting the message is also decreases. The system encrypts the message for the security purpose. The proposed system provides security and improves the execution of the Geosocial application. The proposed system also uses keyed tags and arbitrary tags which adjust the protection and execution of the system. The keyed tag provides strong protection and irregular tags give security and high effectiveness to the system.

Keywords: Mobile location-based services, security, privacy

Edition: Volume 5 Issue 2, February 2016

Pages: 61 - 64

Share this Article

How to Cite this Article?

Khadke Shriram Bhanudasrao, Mahadik Pravin B., "Client's Location Hiding in Geosocial Recommendation Applications", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV153112, Volume 5 Issue 2, February 2016, 61 - 64

99 PDF Views | 63 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Mobile location-based services'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1486 - 1489

Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System

Digvijay A. Patil, Yogesh B. Gurav

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016

Pages: 61 - 64

Client's Location Hiding in Geosocial Recommendation Applications

Khadke Shriram Bhanudasrao, Mahadik Pravin B.

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 3033 - 3035

A Survey on Security and Privacy Based Location Based Recompense Scheme

Prema. S. Patil Wankhede, M. K Kodmelwar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 9, September 2016

Pages: 709 - 713

Secured Location-Based Rewarding System Using Digital Signature (SLBRDS)

Rubina Ashfaque Shah, Dr. Rahat Khan

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016

Pages: 1030 - 1035

Functional Context Awareness: Measuring and Utilizing the Context Dependency of Mobile Usage

Swati S. Gore, Prachi A. Joshi

Share this Article

Similar Articles with Keyword 'security'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Research Paper, Computer Science & Engineering, China, Volume 9 Issue 4, April 2020

Pages: 1544 - 1554

Recent Developments on Probabilistic Graphical Model Applied in Data Analysis

Kan'Sam Nadjak, Guisheng Yin

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2067 - 2068

An Analysis of Mobile Applications Security; Issue and Aspects from the User's Perspective

Ashish A Kulkarni, Dr. Shivaji R. Madan

Share this Article

Similar Articles with Keyword 'privacy'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2267 - 2274

Two Accounts of Solitude in Online Communal Networks

Alla Venu Gopal, G. Srinivasa Reddy

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 823 - 826

Survey Paper on User's Location Hiding In Geosocial Recommendation Applications

Mayura Phadnis, Kanchan Varpe

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1486 - 1489

Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System

Digvijay A. Patil, Yogesh B. Gurav

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1028 - 1031

Secure and Efficient Item Information Retrieval in Cloud Computing

Dr. Shameem Akther, Tahseen Begum

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1330 - 1335

Efficient Image Encryption EIE - Compression System Using Haar Wavelets Using Matlab

Kavita, Anil Vadhwa

Share this Article
Top