Downloading: Hiding User Privacy in Location Based Services Through Clustering
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR) | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

To prevent Server Overload, Your Article PDF will be Downloaded in Next Seconds

Hiding User Privacy in Location Based Services Through Clustering

Nilam V. Khandade, Snehal Nargundi

Abstract: Current age is a smartphone age, and so it use for surfing and browsing over internet is increasing and becoming popular. But most of the mobile users search some location specific queries which needs user location as input along with user query. All the smartphones these days are having an inbuilt location aware system known as Global positioning System. So in order to user any gps service, GPS user have to compromise all private information to the LBS server related to his information. While firing the location specific query to the serve,. It also sends some privacy information along with that query. LBS server stores this privacy information in database at and can make use of this user information as a money making business. But this is not a confidential way to share our private information at sever. Malicious servers may collaborate with third party users and thus compromise user information to malicious users. So the proposed system makes use of a clustering technique to hide all users location from LBS and still get the benefit of LBS service. This clustering method hide user location from LBS server and avoid sharing of privacy information with server. A user shares the information to the ip address or another user who has already compromised his/her location to the server and so other users at same location may get the benefit of it as there is no need of sending each and every uses location to LBS directly.Here we have changed the architecture of LBS server Module.

Keywords: Mobile networks, location-based services, location privacy, Bayesian inference attacks, epidemic models