A Survey on Security and Privacy Based Location Based Recompense Scheme
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 144 , Downloads: 104 | CTR: 72 % | Weekly Popularity: ⮙4

Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014

A Survey on Security and Privacy Based Location Based Recompense Scheme

Prema. S. Patil Wankhede, M. K Kodmelwar

The creation of mobile devices has directed the mobile advertising to flow in the past few years. Developing as a new type of mobile advertising, mobile location-based services have elaborate intense considerationin recent times. Inappropriately, existing mobile location-based services have a lot of limitations and rise many concerns, particularly about system security and user. In this paper, we put forward a new location based rewarding system, where mobile users can gather location-based tokens from token distributors, and then redeem their collected tokens at token collectors for beneficial rewards. Tokens act as real-world currency. The token distributors and collectors can be any marketable entities or merchants that request to interest customers through such a promotion system, such as cafs, stores. We develop a security and privacy responsive location-based rewarding protocol for the system, and show the inclusiveness and reliability of the procedure. Moreover, we show that the system is robust to several attacks and mobile users confidentiality can be well protected in the period in-between. We finally implement the structure and performance extensive experimentations to validate the system productivity in terms of working out, announcement

Keywords: Mobile location based services, confidentiality, and security

Edition: Volume 3 Issue 11, November 2014

Pages: 3033 - 3035

Share this Article

How to Cite this Article?

Prema. S. Patil Wankhede, M. K Kodmelwar, "A Survey on Security and Privacy Based Location Based Recompense Scheme", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=OCT141386, Volume 3 Issue 11, November 2014, 3033 - 3035

144 PDF Views | 104 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Mobile location based services'

Views: 144 , Downloads: 104 | CTR: 72 % | Weekly Popularity: ⮙4

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 3033 - 3035

A Survey on Security and Privacy Based Location Based Recompense Scheme

Prema. S. Patil Wankhede, M. K Kodmelwar

Share this Article

Views: 157 , Downloads: 123 | CTR: 78 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 9, September 2016

Pages: 709 - 713

Secured Location-Based Rewarding System Using Digital Signature (SLBRDS)

Rubina Ashfaque Shah, Dr. Rahat Khan

Share this Article

Views: 167 , Downloads: 138 | CTR: 83 % | Weekly Popularity: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016

Pages: 1072 - 1077

Secured Location-Based Rewarding System by using the user Digital Signature (SLBRDS)

Rubina Ashfaque Shah, Dr. Rahat Khan

Share this Article

Similar Articles with Keyword 'confidentiality'

Views: 137 , Downloads: 99 | CTR: 72 % | Weekly Popularity: ⮙1

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2457 - 2460

Privacy Preserved Encrypted Cloud Data Access

Anes P. A., Neethu Francis

Share this Article

Views: 151 , Downloads: 100 | CTR: 66 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1709 - 1712

A Business Framework for Securing Data Storage over Cloud Environment using ECC Crypto System

Nara Venkata Surendra Reddy, DLS Reddy

Share this Article

Views: 127 , Downloads: 101 | CTR: 80 % | Weekly Popularity: ⮙4

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1812 - 1814

A Survey on Deduplication Scheme in Cloud Storage

Deepa.D, Revathi.M

Share this Article

Views: 142 , Downloads: 102 | CTR: 72 % | Weekly Popularity: ⮙4

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2457 - 2462

Erection Trusted and Effective Request Services in the Cloud with RASP Data Perturbation

Rashmi Kadu, Sonali Patil

Share this Article

Views: 131 , Downloads: 103 | CTR: 79 % | Weekly Popularity: ⮙4

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1478 - 1481

A Secure Protocol for SMS Mobile Banking

Amol B. Jawanjal, R. B. Joshi

Share this Article

Similar Articles with Keyword 'security'

Views: 37 , Downloads: 30 | CTR: 81 % | Weekly Popularity: ⮙16

Research Paper, Computer Science & Engineering, Sri Lanka, Volume 10 Issue 4, April 2021

Pages: 139 - 144

Analysis onto the Evolving Cyber-Attack Trends during COVID-19 Pandemic

Senthuran Nallainathan

Share this Article

Views: 47 , Downloads: 40 | CTR: 85 %

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Views: 49 , Downloads: 40 | CTR: 82 % | Weekly Popularity: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Views: 165 , Downloads: 40 | CTR: 24 %

Research Paper, Computer Science & Engineering, China, Volume 9 Issue 4, April 2020

Pages: 1544 - 1554

Recent Developments on Probabilistic Graphical Model Applied in Data Analysis

Kan'Sam Nadjak, Guisheng Yin

Share this Article

Views: 48 , Downloads: 46 | CTR: 96 % | Weekly Popularity: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article
Top