Views: 153 , Downloads: 108 | CTR: 71 % | Weekly Popularity: ⮙2
Review Papers | Computer Science & Engineering | India | Volume 5 Issue 2, February 2016
Clients Location Hiding in Geosocial Recommendation Applications
Khadke Shriram Bhanudasrao, Mahadik Pravin B.
Customer's Location Hiding In FourSquare is one of the Geosocial application in which lots of communities interrelate with their surrounding surroundings through their friends and their recommendations. With respect to security issues Geosocial application can simply misused, for instance to follow the user or target them for home invasions. In this way giving the protection to the Geosocial application is the research issue, existing system provides location protection without including vulnerability into the question results or depending on strong assumptions about server security. In existing systems the user send message to the another user is of greater size, in this way the expenses of the server database is increases on existing system. In this manner in the proposed system which provides the security to the user's location as well as uses compression calculation to compress and decompress the message so that that the message recovery the reality of the situation will become obvious eventually lesser than the previous system . By using our proposed system cost of the server database will decrease and the time required for transmitting the message is also decreases. The system encrypts the message for the security purpose. The proposed system provides security and improves the execution of the Geosocial application. The proposed system also uses keyed tags and arbitrary tags which adjust the protection and execution of the system. The keyed tag provides strong protection and irregular tags give security and high effectiveness to the system.
Keywords: Mobile location-based services, security, privacy
Edition: Volume 5 Issue 2, February 2016
Pages: 61 - 64
How to Cite this Article?
Khadke Shriram Bhanudasrao, Mahadik Pravin B., "Clients Location Hiding in Geosocial Recommendation Applications", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV153112, Volume 5 Issue 2, February 2016, 61 - 64
153 PDF Views | 108 PDF Downloads
Similar Articles with Keyword 'Mobile location-based services'
Views: 174 , Downloads: 99 | CTR: 57 % | Weekly Popularity: ⮙5
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1486 - 1489Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System
Digvijay A. Patil, Yogesh B. Gurav
Views: 144 , Downloads: 104 | CTR: 72 % | Weekly Popularity: ⮙4
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 3033 - 3035A Survey on Security and Privacy Based Location Based Recompense Scheme
Prema. S. Patil Wankhede, M. K Kodmelwar
Views: 153 , Downloads: 108 | CTR: 71 % | Weekly Popularity: ⮙2
Review Papers, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016
Pages: 61 - 64Clients Location Hiding in Geosocial Recommendation Applications
Khadke Shriram Bhanudasrao, Mahadik Pravin B.
Views: 137 , Downloads: 116 | CTR: 85 % | Weekly Popularity: ⮙3
Review Papers, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016
Pages: 1030 - 1035Functional Context Awareness: Measuring and Utilizing the Context Dependency of Mobile Usage
Swati S. Gore, Prachi A. Joshi
Views: 157 , Downloads: 123 | CTR: 78 % | Weekly Popularity: ⮙2
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 9, September 2016
Pages: 709 - 713Secured Location-Based Rewarding System Using Digital Signature (SLBRDS)
Rubina Ashfaque Shah, Dr. Rahat Khan
Similar Articles with Keyword 'security'
Views: 36 , Downloads: 29 | CTR: 81 % | Weekly Popularity: ⮙15
Research Paper, Computer Science & Engineering, Sri Lanka, Volume 10 Issue 4, April 2021
Pages: 139 - 144Analysis onto the Evolving Cyber-Attack Trends during COVID-19 Pandemic
Senthuran Nallainathan
Views: 47 , Downloads: 40 | CTR: 85 %
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2786 - 2790Survey: Detection Schemes Against Selective Forwarding Attack
Harpal Singh, Vaibhav Pandey
Views: 49 , Downloads: 40 | CTR: 82 % | Weekly Popularity: ⮙1
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1380 - 1382A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar, Purnima Selokar
Views: 165 , Downloads: 40 | CTR: 24 %
Research Paper, Computer Science & Engineering, China, Volume 9 Issue 4, April 2020
Pages: 1544 - 1554Recent Developments on Probabilistic Graphical Model Applied in Data Analysis
Kan'Sam Nadjak, Guisheng Yin
Views: 48 , Downloads: 46 | CTR: 96 % | Weekly Popularity: ⮙3
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2406 - 2408Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar
Similar Articles with Keyword 'privacy'
Views: 40 , Downloads: 32 | CTR: 80 % | Weekly Popularity: ⮙2
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2267 - 2274Two Accounts of Solitude in Online Communal Networks
Alla Venu Gopal, G. Srinivasa Reddy
Views: 166 , Downloads: 88 | CTR: 53 % | Weekly Popularity: ⮙4
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015
Pages: 823 - 826Survey Paper on Users Location Hiding In Geosocial Recommendation Applications
Mayura Phadnis, Kanchan Varpe
Views: 134 , Downloads: 92 | CTR: 69 % | Weekly Popularity: ⮙4
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1253 - 1257Implementation Details of Anonymization of Sensitive Labels in Collaborative Data Publishing
Vandhana V
Views: 129 , Downloads: 98 | CTR: 76 % | Weekly Popularity: ⮙2
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2383 - 2384Location Based Query Processing For Providing Privacy to Exploit Service Similarity: A Survey
Prerana Deokar, Praveen Barapatre
Views: 124 , Downloads: 98 | CTR: 79 % | Weekly Popularity: ⮙3
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 1587 - 1591Layers of Internet Privacy
Amit Dabas, Ashish Kumar Sharma