International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064




Downloads: 111

M.Tech / M.E / PhD Thesis | Information Technology | India | Volume 4 Issue 6, June 2015


Hiding User Privacy in Location Based Services Through Clustering

Nilam V. Khandade, Snehal Nargundi


Abstract: Current age is a smartphone age, and so it use for surfing and browsing over internet is increasing and becoming popular. But most of the mobile users search some location specific queries which needs user location as input along with user query. All the smartphones these days are having an inbuilt location aware system known as Global positioning System. So in order to user any gps service, GPS user have to compromise all private information to the LBS server related to his information. While firing the location specific query to the serve,. It also sends some privacy information along with that query. LBS server stores this privacy information in database at and can make use of this user information as a money making business. But this is not a confidential way to share our private information at sever. Malicious servers may collaborate with third party users and thus compromise user information to malicious users. So the proposed system makes use of a clustering technique to hide all users location from LBS and still get the benefit of LBS service. This clustering method hide user location from LBS server and avoid sharing of privacy information with server. A user shares the information to the ip address or another user who has already compromised his/her location to the server and so other users at same location may get the benefit of it as there is no need of sending each and every uses location to LBS directly. Here we have changed the architecture of LBS server Module.


Keywords: Mobile networks, location-based services, location privacy, Bayesian inference attacks, epidemic models


Edition: Volume 4 Issue 6, June 2015,


Pages: 2923 - 2928


How to Cite this Article?

Nilam V. Khandade, Snehal Nargundi, "Hiding User Privacy in Location Based Services Through Clustering", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=SUB156134, Volume 4 Issue 6, June 2015, 2923 - 2928

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Mobile'

Downloads: 0

Survey Paper, Information Technology, Iraq, Volume 10 Issue 7, July 2021

Pages: 1341 - 1348

Proposed Model to Identify the Influencing Students' Behavioral Intention to Use Mobile Learning: A Perspective from a Different Countries Case Study

Zainab Dalaf Katheeth, Bashar Dheyaa Noor, Ammar Dheyaa Noor

Share this Article

Downloads: 0

Research Paper, Information Technology, United States of America, Volume 11 Issue 1, January 2022

Pages: 364 - 370

Evaluating the State of Healthcare and Innovations through Mhealth before & Post COVID-19 Era and the Obstacles to its Development

Wessam Soliman

Share this Article

Similar Articles with Keyword 'networks'

Downloads: 97

Survey Paper, Information Technology, India, Volume 4 Issue 5, May 2015

Pages: 2568 - 2570

Survey on NMS Supporting Network Elements implementing Heterogeneous Protocols

Sheik Nousheen Taj, Dr. Sagar B M

Share this Article

Downloads: 101

Research Paper, Information Technology, United States of America, Volume 9 Issue 7, July 2020

Pages: 946 - 948

Retail Business Operations Transformation by 5G

Dhanesh Thatikonda

Share this Article

Similar Articles with Keyword 'services'

Downloads: 39

Research Paper, Information Technology, Nigeria, Volume 4 Issue 4, April 2015

Pages: 264 - 267

Nigerian Cashless Banking Policy: A Multi-Aspectual View of Trust Issues Affecting the Adoption of E-Commerce and Other Technology Tools

Abdul-Hamid A.Kaduna; Mu'azu A. A. Kaduna; Hayatu M. Kaduna

Share this Article

Downloads: 101

Research Paper, Information Technology, Nigeria, Volume 3 Issue 6, June 2014

Pages: 2412 - 2418

An Investigation into the Use of Information Services by Farmers among Agricultural Research Institutes in North Central Zone of Nigeria

Nwogu I. Lucky, Uzokwe Chuka Christian, Olaifa Taye Paul

Share this Article

Similar Articles with Keyword 'location'

Downloads: 4

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 10 Issue 10, October 2021

Pages: 955 - 961

Fake Text Identification using Feature Extraction

Peketi Yamini

Share this Article

Downloads: 57

Research Paper, Information Technology, Malaysia, Volume 10 Issue 1, January 2021

Pages: 889 - 896

Usage of Predictive Analytics during COVID-19 Pandemic to Support Administrative Decision Making in Health Care

Fatimetou Zahra Mohamed Mahmoud, Noor Azizah Mohamadali

Share this Article

Similar Articles with Keyword 'privacy'

Downloads: 2

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 91 - 93

A Scalable Two-Phase Bottom-Up Specialization Prospective for Data Anonymization Using Map Reduce on Cloud

Dilipprasad.E, Ajay.R, K. Durairaj

Share this Article

Downloads: 3 | Monthly Hits: ⮙1

Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 174 - 178

Android Notes using Finger Print Authentication

Vaibhav Garg, Siddharth Yadav, Rishabh Kamal

Share this Article

Similar Articles with Keyword 'Bayesian'

Downloads: 107

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 2073 - 2076

Healthcare Insurance Fraud Detection Leveraging Big Data Analytics

Prajna Dora, Dr. G. Hari Sekharan

Share this Article

Downloads: 112

Research Paper, Information Technology, India, Volume 5 Issue 5, May 2016

Pages: 1242 - 1252

Image Denoising Using Standard BP Algorithm

T. Uma Mageswari

Share this Article

Similar Articles with Keyword 'inference'

Downloads: 106

Survey Paper, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 2230 - 2233

A Control Mechanism for Enforcing Inference Usability of XML Documents

Smita Chaudhari, Rakesh Rajani

Share this Article

Downloads: 128

Research Paper, Information Technology, India, Volume 2 Issue 5, May 2013

Pages: 170 - 172

Applications of Knowledge Base Research Methods in Undergraduate Studies-A Case study of Madawalabu University Business School

Sreepada Hegde, Vijayalaxmi Hegde

Share this Article

Similar Articles with Keyword 'attacks'

Downloads: 4 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Student Project, Information Technology, India, Volume 10 Issue 12, December 2021

Pages: 695 - 698

Intrusion Detection using Machine Learning Techniques

Akshay Kaushik, Varun Goel

Share this Article

Downloads: 7

Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 307 - 310

CCTV Cameras Hacking and Prevention Techniques

Preeti Rana

Share this Article

Similar Articles with Keyword 'epidemic'

Downloads: 123

Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 1118 - 1122

Predicting Relative Risk for Diabetes Mellitus Using Association Rule Summarization in EMR

R. Sangeetha, M. Vivekanantha Moorthy

Share this Article

Downloads: 138

Research Paper, Information Technology, India, Volume 4 Issue 11, November 2015

Pages: 600 - 606

Improving Healthcare Management System using Efficient Geo-Spatial Data Analysis ? An Approach using QGIS

Vishal Pandey, Tanveen Singh Bharaj, Umang Hans

Share this Article

Similar Articles with Keyword 'models'

Downloads: 0

Survey Paper, Information Technology, Iraq, Volume 10 Issue 7, July 2021

Pages: 1341 - 1348

Proposed Model to Identify the Influencing Students' Behavioral Intention to Use Mobile Learning: A Perspective from a Different Countries Case Study

Zainab Dalaf Katheeth, Bashar Dheyaa Noor, Ammar Dheyaa Noor

Share this Article

Downloads: 87

Informative Article, Information Technology, Nigeria, Volume 2 Issue 4, April 2013

Pages: 468 - 473

A Superficial Expos of Data Warehousing: An Intrinsic Component of Modern Day Business Intelligence

Oyerinde, O.D, Adekunle, A. Y, Ebiesuwa, O.O

Share this Article
Top