International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 111 | Views: 193

Review Papers | Computer Science & Engineering | India | Volume 5 Issue 2, February 2016


Clients Location Hiding in Geosocial Recommendation Applications

Khadke Shriram Bhanudasrao | Mahadik Pravin B.


Abstract: Customer's Location Hiding In FourSquare is one of the Geosocial application in which lots of communities interrelate with their surrounding surroundings through their friends and their recommendations. With respect to security issues Geosocial application can simply misused, for instance to follow the user or target them for home invasions. In this way giving the protection to the Geosocial application is the research issue, existing system provides location protection without including vulnerability into the question results or depending on strong assumptions about server security. In existing systems the user send message to the another user is of greater size, in this way the expenses of the server database is increases on existing system. In this manner in the proposed system which provides the security to the user's location as well as uses compression calculation to compress and decompress the message so that that the message recovery the reality of the situation will become obvious eventually lesser than the previous system. By using our proposed system cost of the server database will decrease and the time required for transmitting the message is also decreases. The system encrypts the message for the security purpose. The proposed system provides security and improves the execution of the Geosocial application. The proposed system also uses keyed tags and arbitrary tags which adjust the protection and execution of the system. The keyed tag provides strong protection and irregular tags give security and high effectiveness to the system.


Keywords: Mobile location-based services, security, privacy


Edition: Volume 5 Issue 2, February 2016,


Pages: 61 - 64


How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link


Verification Code will appear in 2 Seconds ... Wait

Top