SlideShare a Scribd company logo
1 of 3
Download to read offline
Lochana Gaulkar Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 3, ( Part -1) March 2015, pp.74-76
www.ijera.com 74 | P a g e
A Survey of Privacy-Preserving Algorithms for Finding meeting
point in Mobile Adhoc Network
Lochana Gaulkar, Vaishali Katkar
Department of Computer Science and Engineering G.H Raisoni Institute of Engineering and Technology for
Women Nagpur, India
Assistant Professor, Department of Computer Science and Engineering G.H Raisoni Institute of Engineering and
Technology for Women Nagpur, India
Abstract
Location privacy in Location Based Services (LBS) is the capability to protect the connection between user’s
identity, uncertainty sources, servers and database, thereby restraining an impending attacker from conveniently
linking users of LBS to convinced locations. Smart Phones have become most important gadget for maintaining
the daily activities, highly interconnected urban population is also increasingly dependent on these gadgets to
regulate and schedule their daily lives. These applications often depend on current location of user or a class of
user. Use of Smart Mapping technology is also increasing in large area; this system provides an easy attainable
online platform that can be used for accessing many services. This survey paper projects the privacy-preserving
algorithm to find the most favorable meeting location for a class of users. GSM calculates the location of all
users.
Keywords— Location Privacy, Global System for Mobile Communication (GSM)
I. INTRODUCTION
Location-based services (LBS) are a general
category of computer program-level services that
use location data to control features; these Services
comprise applications that depend on the particular
user location to offer a service/information that is
applicable to the user at that location. For providing
services and information to the user, LBS commonly
use mobile devices with positioning proficiency. LBS
can also be used for private or specialized purposes.
LBS is an information service and has a number of
uses in social networking today as an entertainment
service, which is accessible with mobile
devices through the mobile network and which uses
information on the geographical location of the
mobile device. This has become more and more
important with the development of the Smartphone
and tablet markets. LBS are used in a large range of
contexts, such as health, indoor object
explore, entertainment, work, personal life, etc, it
also consist of services to determine a location of a
person or object, such as discovering the nearby
banking cash machine or the whereabouts of a friend
or employee. LBS include load tracking and vehicle
tracking services [1]. Two prominent features of
location-based services are location check-ins and
sharing location. By checking into a location, users
can share their prevailing location with family and
friends or access location-specific services from
third-party providers.
The ability to restrict other parties from learning
one’s present or past location is location privacy.
Generally, Location Based Service (LBS) gives an
information service about the physical location of a
user [9].
The remaining paper is organized as follows:
Section II describes the related work. Section III
presents the proposed work. Section IV describes the
proposed solution of the system. Lastly section V
presents the conclusion.
II. RELATED WORK
Igor Bilogrevic, Murtuza Jadliwala [1] proposed
privacy-preserving algorithms for determining an
optimal meeting location for a class of users. They
perform a thorough privacy valuation by formally
computing privacy-loss of the proposed approaches.
They deal with the privacy issue in LSBSs by
focusing on a explicit problem called Fair Rendez-
Vous Point(FRVP) problem. Given a set of user
location preferences, this FRVP problem is to find
out a location among the proposed ones such that the
greatest distance between this location and all other
users’ locations is minimized.
Rinku Dewri and Ramakrishna Thurimella [2]
proposed a user-centric location based service
architecture where a user can examine the blow of
location inaccuracy on the service by deciding the
geo coordinates to use in a query. They construct a
search application based on user-centric location-
based service architecture where a user can detect the
impact of position inaccuracy on the service
accuracy.
RESEARCH ARTICLE OPEN ACCESS
Lochana Gaulkar Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 3, ( Part -1) March 2015, pp.74-76
www.ijera.com 75 | P a g e
Jing Liu, Zechao Li, Jinhui Tang [3] authors
focus on the personalized tag recommendation task
and try to recognize user-preferred, geo-location-
specific as well as semantically significant tags for a
photo by leveraging rich contexts of the unreservedly
existing community-contributed photos. For users
and geo-locations, they have different privileged tags
assigned to a photo, and recommend a subspace
learning method to individually expose the both types
of preferences.
Linke Guo, Chi Zhang [4] proposes a privacy-
preserving revocable content sharing scheme in
geosocial networks. Proposed scheme allows mobile
users to share their encrypted location-based contents
on an untrusted server without revealing genuine
location information, and further enables other
mobile users who physically check in at the particular
location to search and decrypt the content if they
have the equivalent attributes.
Muhammad Ridhwan Ahmad Fuad and Micheal
Drieberg [5] presents the expansion of the remote
vehicle tracking system which accommodate the
Global System for Mobile Communications (GSM)
Modem and Google Map.
Wei Xin, Cong Tang, TaoYang [6] uses LocSafe
method, a “missed-connections” service is used
which grantees based on RFID technology, in order
to verify an encounter sharing between users in the
past. LocSafe is composed of three parts: RFID Tags,
LE Collectors, and social service provider.
They use RFID technology to detect encounters,
and use attribute-based encryption and broadcast
encryption to create conviction and defend users,
privacy. We estimate LocSafe by a study of “missed-
connections “troubles and study of system
implementation.
Wei Li, Wei Jiao, Guangye Li [7] Location-
Based Service(LBS) combined with mobile devices
and internet become more and more trendy, and are
widely used in traffic navigation, intelligent logistics
and the point of interest query. However, most users
worry about their privacy when using the LBS
because they should provide their precise location
and query content to the undependable server. This
paper analyses the query association attack model for
the constant query in mobile LBS.
Jianliang Xu, Xueyan Tang [8] identifies and
addresses three new issues concerning location
cloaking approach. First, study the demonstration of
cloaking regions and illustrate that a circular region
normally leads to a small result size for region-based
queries. Second, extend a mobility-aware location
cloaking technique to oppose trace analysis attacks.
Two cloaking algorithms, explicitly MaxAccu_Cloak
and MinComm_Cloak, are intended based on
different performance objectives. Finally, develop an
competent polynomial algorithm for evaluating
circular-region-based kNN queries.
Hanunah Othman, Habibah Hashim, Jamalul-lail
Ab Manan [9] studies modern schemes deliberate to
present location privacy and anonymity to LBS users.
The main idea is to decipher current practical
problem by proposing a latest framework of LBS
Middleware called Trusted Anonymizer (TA) secured
by Trusted Computing (TC) technologies.
Leone C. Monticone, Richard E. Snow [10]
provides an analysis of the case where the MRs
operate in or above circular service areas on the
surface of a spherical Earth. The analysis provides an
accurate and competent way, which is less complex
than performing the calculations on the sphere, to
compute true minimum distance ratios. The method
uses stereographic projection to convert the original
minimization problem into a simpler problem of
minimizing a ratio of Euclidean distances, which is
expressed as a function of a single real variable, over
the boundaries of discs (i.e., circles) in the complex
plane.
V. N. Sahare, Y. Raut, Dr. M.V.Sarode[11]
proposed a system which will find out the relative
position between several vehicles by using Great
Circle Algorithm. The enhancement in VANET
connectivity is made by road side unit which will
supervise all the vehicle information and detect the
failure vehicle and calculate the detail of the vehicles
that get affected by the failure vehicle and multicast
alert packet to well-known vehicles. This will avoid
the broadcasting difficulty.
III. PROPOSED WORK
This proposed system will hide the location of
users by using stealth geo-synchronization. Great
circle algorithm will be use for calculating the
distance between multiple geo-locations. Then by
using polygon centroid calculation, central point will
be determined. This system will provide the central
location which will be approximately same for all
users by considering user preferences; it will also
provide privacy about users location.
Figure 1: Proposed system process diagram
Lochana Gaulkar Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 3, ( Part -1) March 2015, pp.74-76
www.ijera.com 76 | P a g e
Above figure shows the overall working
process of proposed system. This process includes
multiple stages of execution. As per shown consider a
condition there are five users in group planning to
meet in centrally preferred location then one user
from all will become master user and after which all
user will share their location with master user and
master user will execute the process. After execution
system will calculate the central location by
calculating the centroid of the polygon created by the
user’s connection. Once system get the central
location it will ask user about his preferred location
and after this using Google mapping API system will
find out the nearest location selected by the user and
once it found system will inform all user about final
meeting location and if user wants he can view the
travelling path to the location.
IV. PROPOSED SOLUTION
From the idea of the proposed system we are
clear with two outcomes. These two outcomes are
discussed below.
1) Provide central feasible location
Central feasible location will be calculated by
using great circle algorithm and polygon centroid
calculation. Then by using Google map API users
location will be track.
2) Provide privacy to all users
Privacy can be provided by using stealth geo-
synchronization.
V. CONCLUSION
The proposed system will provide a location
based service. This system will provide the central
location or the location which is nearer to all users by
using great circle algorithm and users location will be
determined by using Google map API and GSM.
Location privacy is the capability to prevent new
parties from learning one’s present or past location.
Generally, Location Based Service (LBS) gives an
information service about the physical location of a
user. Proposed system will also provide privacy
about user’s location.
REFERENCES
[1] Igor Bilogrevic, Murtuza Jadliwala, Vishal
Joneja,“ Privacy-Preserving Optimal
Meeting Location Determination on Mobile
Devices”, IEEE Transactions on Information
Forensics and Security , Vol. 9, NO. 7,2014.
[2] Rinku Dewri and Ramakrishna Thurimella,
“Exploiting Service Similarity in Location
Based Search Queries, “IEEE Transaction
on Parallel and Distributed, February 2014.
[3] Jing Liu, Zechao Li, Jinhui Tang,
“Personalized Geo-Specific Tag
Recommendation for Photos on Social
Websites”, IEEE Transaction on
Multimedia, Vol. 16, NO. 3, April 2014.
[4] Linke Guo, Chi Zhang, “Privacy-Preserving
Revocable Content Sharing in Geosocial
Networks”, IEEE Conference on
Communication and Network Security,2013.
[5] Muhammad Ridhwan Ahmad Fuad and
Micheal Drieberg, “Remote Vehicle
Tracking System using GSM Modem and
Google Map”, IEEE Conference on
Sustainable Utilization and Development in
Engineering and Technology, 2013 .
[6] Wei Li, Wei Jiao, Guangye Li, “A
LOCATION PRIVACY PRESERVING
ALGORITHM FOR MOBILE LBS”, IEEE
CCIS, 2012.
[7] Wei Xin, Cong Tang, Tao Yang,Hui Ping
sun, Zhong Chen, “Towards-Privacy
Preserving RFID-Based Location Based
Services”,IEEE International Conference on
Fuzzy System and Knowledge Discovery,
2012.
[8] Jianliang Xu, Xueyan Tang, “Privacy-
Conscious Location-Based Queries in
Mobile Environments”, IEEE Transactions
on Parallel and Distributed Systems , VOL.
21, NO. 3, MARCH 2010
[9] Hanunah Othman, Habibah Hashim,
Jamalul-lail Ab Manan, “Privacy
Preservation in Location-Based Services
(LBS) Through Trusted Computing
Technology”, IEEE International Conference
on Communication, December 2009.
[10] Leone C. Monticone, Richard E. Snow,
“Minimizing Great-Circle Distance Ratios
of Undesired and Desired Signal Paths on a
Spherical Earth”, IEEE Transaction on
vehicular technology, Vol. 58, NO. 9,
November 2009.
[11] V. N. Sahare, Y. Raut, Dr. M.V.Sarode,
“Early Alert System Using Relative
Positioning in Vehicular Ad-hoc Network”,
International Conference on Magnetics,
Machines & Drives (AICERA-2014
iCMMD).

More Related Content

What's hot

Mobile Device Application to locate an Interest Point using Google Maps
Mobile Device Application to locate an Interest Point using Google MapsMobile Device Application to locate an Interest Point using Google Maps
Mobile Device Application to locate an Interest Point using Google MapsEditor IJCATR
 
Your Are Your Mobile Phone
Your Are Your Mobile PhoneYour Are Your Mobile Phone
Your Are Your Mobile Phoneguest314c4e
 
IRJET- Next Location Prediction
IRJET-  	  Next Location PredictionIRJET-  	  Next Location Prediction
IRJET- Next Location PredictionIRJET Journal
 
Engfi Gate: An Indoor Guidance System using Marker-based Cyber-Physical Augme...
Engfi Gate: An Indoor Guidance System using Marker-based Cyber-Physical Augme...Engfi Gate: An Indoor Guidance System using Marker-based Cyber-Physical Augme...
Engfi Gate: An Indoor Guidance System using Marker-based Cyber-Physical Augme...IJECEIAES
 
Location Based Services, Change in Profile and Notification
Location Based Services, Change in Profile and Notification Location Based Services, Change in Profile and Notification
Location Based Services, Change in Profile and Notification IRJET Journal
 
Comparative study of user experience on mobile pedestrian navigation between ...
Comparative study of user experience on mobile pedestrian navigation between ...Comparative study of user experience on mobile pedestrian navigation between ...
Comparative study of user experience on mobile pedestrian navigation between ...IJECEIAES
 
Effects of mobility models and nodes distribution on wireless sensors networks
Effects of mobility models and nodes distribution on wireless sensors networksEffects of mobility models and nodes distribution on wireless sensors networks
Effects of mobility models and nodes distribution on wireless sensors networksijasuc
 
Review on Hand Gesture Recognition
Review on Hand Gesture RecognitionReview on Hand Gesture Recognition
Review on Hand Gesture Recognitiondbpublications
 
Semantic open io t service platform technology
Semantic open io t service platform technologySemantic open io t service platform technology
Semantic open io t service platform technologyPoornima E.G.
 
A Survey of Indoor Localization Techniques
A Survey of Indoor Localization TechniquesA Survey of Indoor Localization Techniques
A Survey of Indoor Localization TechniquesIOSR Journals
 
Android application to locate and track mobile phones(aaltm) an implementati...
Android application to locate and track mobile phones(aaltm)  an implementati...Android application to locate and track mobile phones(aaltm)  an implementati...
Android application to locate and track mobile phones(aaltm) an implementati...eSAT Journals
 
Jedrzejczyk
JedrzejczykJedrzejczyk
Jedrzejczykanesah
 
IRJET- Privacy Protection in Interactive Content based Image Retrieval with C...
IRJET- Privacy Protection in Interactive Content based Image Retrieval with C...IRJET- Privacy Protection in Interactive Content based Image Retrieval with C...
IRJET- Privacy Protection in Interactive Content based Image Retrieval with C...IRJET Journal
 
20190725 li chun_lab_intro_v5
20190725 li chun_lab_intro_v520190725 li chun_lab_intro_v5
20190725 li chun_lab_intro_v5俊廷 陳
 
Multi-objective NSGA-II based community detection using dynamical evolution s...
Multi-objective NSGA-II based community detection using dynamical evolution s...Multi-objective NSGA-II based community detection using dynamical evolution s...
Multi-objective NSGA-II based community detection using dynamical evolution s...IJECEIAES
 
Paper id 41201614
Paper id 41201614Paper id 41201614
Paper id 41201614IJRAT
 
Robust trajectory estimation for crowdsourcing based mobile applications
Robust trajectory estimation for crowdsourcing based mobile applicationsRobust trajectory estimation for crowdsourcing based mobile applications
Robust trajectory estimation for crowdsourcing based mobile applicationsNexgen Technology
 

What's hot (19)

Mobile Device Application to locate an Interest Point using Google Maps
Mobile Device Application to locate an Interest Point using Google MapsMobile Device Application to locate an Interest Point using Google Maps
Mobile Device Application to locate an Interest Point using Google Maps
 
Your Are Your Mobile Phone
Your Are Your Mobile PhoneYour Are Your Mobile Phone
Your Are Your Mobile Phone
 
P Sweta
P SwetaP Sweta
P Sweta
 
IRJET- Next Location Prediction
IRJET-  	  Next Location PredictionIRJET-  	  Next Location Prediction
IRJET- Next Location Prediction
 
Engfi Gate: An Indoor Guidance System using Marker-based Cyber-Physical Augme...
Engfi Gate: An Indoor Guidance System using Marker-based Cyber-Physical Augme...Engfi Gate: An Indoor Guidance System using Marker-based Cyber-Physical Augme...
Engfi Gate: An Indoor Guidance System using Marker-based Cyber-Physical Augme...
 
Location Based Services, Change in Profile and Notification
Location Based Services, Change in Profile and Notification Location Based Services, Change in Profile and Notification
Location Based Services, Change in Profile and Notification
 
Comparative study of user experience on mobile pedestrian navigation between ...
Comparative study of user experience on mobile pedestrian navigation between ...Comparative study of user experience on mobile pedestrian navigation between ...
Comparative study of user experience on mobile pedestrian navigation between ...
 
Effects of mobility models and nodes distribution on wireless sensors networks
Effects of mobility models and nodes distribution on wireless sensors networksEffects of mobility models and nodes distribution on wireless sensors networks
Effects of mobility models and nodes distribution on wireless sensors networks
 
Review on Hand Gesture Recognition
Review on Hand Gesture RecognitionReview on Hand Gesture Recognition
Review on Hand Gesture Recognition
 
Semantic open io t service platform technology
Semantic open io t service platform technologySemantic open io t service platform technology
Semantic open io t service platform technology
 
A Survey of Indoor Localization Techniques
A Survey of Indoor Localization TechniquesA Survey of Indoor Localization Techniques
A Survey of Indoor Localization Techniques
 
Android application to locate and track mobile phones(aaltm) an implementati...
Android application to locate and track mobile phones(aaltm)  an implementati...Android application to locate and track mobile phones(aaltm)  an implementati...
Android application to locate and track mobile phones(aaltm) an implementati...
 
Jedrzejczyk
JedrzejczykJedrzejczyk
Jedrzejczyk
 
IRJET- Privacy Protection in Interactive Content based Image Retrieval with C...
IRJET- Privacy Protection in Interactive Content based Image Retrieval with C...IRJET- Privacy Protection in Interactive Content based Image Retrieval with C...
IRJET- Privacy Protection in Interactive Content based Image Retrieval with C...
 
20190725 li chun_lab_intro_v5
20190725 li chun_lab_intro_v520190725 li chun_lab_intro_v5
20190725 li chun_lab_intro_v5
 
Multi-objective NSGA-II based community detection using dynamical evolution s...
Multi-objective NSGA-II based community detection using dynamical evolution s...Multi-objective NSGA-II based community detection using dynamical evolution s...
Multi-objective NSGA-II based community detection using dynamical evolution s...
 
Sub1527
Sub1527Sub1527
Sub1527
 
Paper id 41201614
Paper id 41201614Paper id 41201614
Paper id 41201614
 
Robust trajectory estimation for crowdsourcing based mobile applications
Robust trajectory estimation for crowdsourcing based mobile applicationsRobust trajectory estimation for crowdsourcing based mobile applications
Robust trajectory estimation for crowdsourcing based mobile applications
 

Viewers also liked

Reliability Analysis of Slope Stability by Central Point Method
Reliability Analysis of Slope Stability by Central Point MethodReliability Analysis of Slope Stability by Central Point Method
Reliability Analysis of Slope Stability by Central Point MethodIJERA Editor
 
AshabëT E Muhamedit A.S.
AshabëT E Muhamedit A.S.AshabëT E Muhamedit A.S.
AshabëT E Muhamedit A.S.guestef339
 
Katalog Rubber Fender Cell
Katalog Rubber Fender CellKatalog Rubber Fender Cell
Katalog Rubber Fender CellGada Bina Usaha
 
Информационные технологии в деятельности психолога практика: повышение квалиф...
Информационные технологии в деятельности психолога практика: повышение квалиф...Информационные технологии в деятельности психолога практика: повышение квалиф...
Информационные технологии в деятельности психолога практика: повышение квалиф...Ilya Perminov
 
Definitief programma Raedelijn 2015-2016
Definitief programma Raedelijn 2015-2016 Definitief programma Raedelijn 2015-2016
Definitief programma Raedelijn 2015-2016 Raedelijn
 
Isotherm Studies for Performance Evaluation of Functionalized Carbon Nanotube...
Isotherm Studies for Performance Evaluation of Functionalized Carbon Nanotube...Isotherm Studies for Performance Evaluation of Functionalized Carbon Nanotube...
Isotherm Studies for Performance Evaluation of Functionalized Carbon Nanotube...IJERA Editor
 
Advocating against the privatization of education: the Chilean experience
Advocating against the privatization of education: the Chilean experienceAdvocating against the privatization of education: the Chilean experience
Advocating against the privatization of education: the Chilean experiencePERIGlobal
 
The Influence Of Infinite Impedance Flanges On The Electromagnetic Field Of A...
The Influence Of Infinite Impedance Flanges On The Electromagnetic Field Of A...The Influence Of Infinite Impedance Flanges On The Electromagnetic Field Of A...
The Influence Of Infinite Impedance Flanges On The Electromagnetic Field Of A...IJERA Editor
 
Innovation, research and development of road equipments
Innovation, research and development of road equipmentsInnovation, research and development of road equipments
Innovation, research and development of road equipmentsguestecb523
 
Discretizing of linear systems with time-delay Using method of Euler’s and Tu...
Discretizing of linear systems with time-delay Using method of Euler’s and Tu...Discretizing of linear systems with time-delay Using method of Euler’s and Tu...
Discretizing of linear systems with time-delay Using method of Euler’s and Tu...IJERA Editor
 
Adomian decomposition Method and Differential Transform Method to solve the H...
Adomian decomposition Method and Differential Transform Method to solve the H...Adomian decomposition Method and Differential Transform Method to solve the H...
Adomian decomposition Method and Differential Transform Method to solve the H...IJERA Editor
 
Neural Network Based Parking via Google Map Guidance
Neural Network Based Parking via Google Map GuidanceNeural Network Based Parking via Google Map Guidance
Neural Network Based Parking via Google Map GuidanceIJERA Editor
 
IN 7 STAPPEN NAAR EEN PRODUCT DAT GEKOCHT WORDT?
IN 7 STAPPEN NAAR EEN PRODUCT DAT GEKOCHT WORDT?IN 7 STAPPEN NAAR EEN PRODUCT DAT GEKOCHT WORDT?
IN 7 STAPPEN NAAR EEN PRODUCT DAT GEKOCHT WORDT?Misha de Sterke
 
Simulation of generalized hybrid model for solar and wind power generation
Simulation of generalized hybrid model for solar and wind power generationSimulation of generalized hybrid model for solar and wind power generation
Simulation of generalized hybrid model for solar and wind power generationIJERA Editor
 

Viewers also liked (15)

Reliability Analysis of Slope Stability by Central Point Method
Reliability Analysis of Slope Stability by Central Point MethodReliability Analysis of Slope Stability by Central Point Method
Reliability Analysis of Slope Stability by Central Point Method
 
AshabëT E Muhamedit A.S.
AshabëT E Muhamedit A.S.AshabëT E Muhamedit A.S.
AshabëT E Muhamedit A.S.
 
Katalog Rubber Fender Cell
Katalog Rubber Fender CellKatalog Rubber Fender Cell
Katalog Rubber Fender Cell
 
Информационные технологии в деятельности психолога практика: повышение квалиф...
Информационные технологии в деятельности психолога практика: повышение квалиф...Информационные технологии в деятельности психолога практика: повышение квалиф...
Информационные технологии в деятельности психолога практика: повышение квалиф...
 
Definitief programma Raedelijn 2015-2016
Definitief programma Raedelijn 2015-2016 Definitief programma Raedelijn 2015-2016
Definitief programma Raedelijn 2015-2016
 
Isotherm Studies for Performance Evaluation of Functionalized Carbon Nanotube...
Isotherm Studies for Performance Evaluation of Functionalized Carbon Nanotube...Isotherm Studies for Performance Evaluation of Functionalized Carbon Nanotube...
Isotherm Studies for Performance Evaluation of Functionalized Carbon Nanotube...
 
Pres ru-telesmotr-tv7
Pres ru-telesmotr-tv7Pres ru-telesmotr-tv7
Pres ru-telesmotr-tv7
 
Advocating against the privatization of education: the Chilean experience
Advocating against the privatization of education: the Chilean experienceAdvocating against the privatization of education: the Chilean experience
Advocating against the privatization of education: the Chilean experience
 
The Influence Of Infinite Impedance Flanges On The Electromagnetic Field Of A...
The Influence Of Infinite Impedance Flanges On The Electromagnetic Field Of A...The Influence Of Infinite Impedance Flanges On The Electromagnetic Field Of A...
The Influence Of Infinite Impedance Flanges On The Electromagnetic Field Of A...
 
Innovation, research and development of road equipments
Innovation, research and development of road equipmentsInnovation, research and development of road equipments
Innovation, research and development of road equipments
 
Discretizing of linear systems with time-delay Using method of Euler’s and Tu...
Discretizing of linear systems with time-delay Using method of Euler’s and Tu...Discretizing of linear systems with time-delay Using method of Euler’s and Tu...
Discretizing of linear systems with time-delay Using method of Euler’s and Tu...
 
Adomian decomposition Method and Differential Transform Method to solve the H...
Adomian decomposition Method and Differential Transform Method to solve the H...Adomian decomposition Method and Differential Transform Method to solve the H...
Adomian decomposition Method and Differential Transform Method to solve the H...
 
Neural Network Based Parking via Google Map Guidance
Neural Network Based Parking via Google Map GuidanceNeural Network Based Parking via Google Map Guidance
Neural Network Based Parking via Google Map Guidance
 
IN 7 STAPPEN NAAR EEN PRODUCT DAT GEKOCHT WORDT?
IN 7 STAPPEN NAAR EEN PRODUCT DAT GEKOCHT WORDT?IN 7 STAPPEN NAAR EEN PRODUCT DAT GEKOCHT WORDT?
IN 7 STAPPEN NAAR EEN PRODUCT DAT GEKOCHT WORDT?
 
Simulation of generalized hybrid model for solar and wind power generation
Simulation of generalized hybrid model for solar and wind power generationSimulation of generalized hybrid model for solar and wind power generation
Simulation of generalized hybrid model for solar and wind power generation
 

Similar to A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile Adhoc Network

Exploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search QueriesExploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search QueriesMigrant Systems
 
Prototyping the Future Potentials of Location Based Services in the Realm of ...
Prototyping the Future Potentials of Location Based Services in the Realm of ...Prototyping the Future Potentials of Location Based Services in the Realm of ...
Prototyping the Future Potentials of Location Based Services in the Realm of ...IOSR Journals
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Privacy preserving optimal meeting l...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Privacy preserving optimal meeting l...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Privacy preserving optimal meeting l...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Privacy preserving optimal meeting l...IEEEFINALYEARSTUDENTPROJECTS
 
Privacy - Preserving Reputation with Content Protecting Location Based Queries
Privacy - Preserving Reputation with Content Protecting Location Based QueriesPrivacy - Preserving Reputation with Content Protecting Location Based Queries
Privacy - Preserving Reputation with Content Protecting Location Based Queriesiosrjce
 
Cloaking Areas Location Based Services Using Dynamic Grid System & Privacy En...
Cloaking Areas Location Based Services Using Dynamic Grid System & Privacy En...Cloaking Areas Location Based Services Using Dynamic Grid System & Privacy En...
Cloaking Areas Location Based Services Using Dynamic Grid System & Privacy En...IJMTST Journal
 
LPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBS
LPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBSLPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBS
LPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBSIJNSA Journal
 
Privacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesPrivacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesIGEEKS TECHNOLOGIES
 
Securing Location of User in Geo Social Networking
Securing Location of User in Geo Social NetworkingSecuring Location of User in Geo Social Networking
Securing Location of User in Geo Social NetworkingIRJET Journal
 
PERTURBED ANONYMIZATION: TWO LEVEL SMART PRIVACY FOR LBS MOBILE USERS
PERTURBED ANONYMIZATION: TWO LEVEL SMART PRIVACY FOR LBS MOBILE USERS PERTURBED ANONYMIZATION: TWO LEVEL SMART PRIVACY FOR LBS MOBILE USERS
PERTURBED ANONYMIZATION: TWO LEVEL SMART PRIVACY FOR LBS MOBILE USERS cscpconf
 
Anonymous Usage of Location-Based Services Through Spatial and.docx
Anonymous Usage of Location-Based Services Through Spatial and.docxAnonymous Usage of Location-Based Services Through Spatial and.docx
Anonymous Usage of Location-Based Services Through Spatial and.docxrossskuddershamus
 
Privacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesPrivacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesShakas Technologies
 
Privacy Preservation And Data Security In Location Based Services
Privacy Preservation And Data Security In Location Based ServicesPrivacy Preservation And Data Security In Location Based Services
Privacy Preservation And Data Security In Location Based ServicesEditorJST
 
Use of Hidden Markov Mobility Model for Location Based Services
Use of Hidden Markov Mobility Model for Location Based ServicesUse of Hidden Markov Mobility Model for Location Based Services
Use of Hidden Markov Mobility Model for Location Based ServicesIJERA Editor
 
Live Matches , Streaming , Scores
Live Matches , Streaming , ScoresLive Matches , Streaming , Scores
Live Matches , Streaming , Scoreswebcric .site
 
TOURIST PLACE RECOMMENDATION SYSTEM
TOURIST PLACE RECOMMENDATION SYSTEMTOURIST PLACE RECOMMENDATION SYSTEM
TOURIST PLACE RECOMMENDATION SYSTEMIJARIIT
 
exploiting service similarity for privacy in location-based search queries
exploiting service similarity for privacy in location-based search queriesexploiting service similarity for privacy in location-based search queries
exploiting service similarity for privacy in location-based search queriesswathi78
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
PROTECTING PRIVACY IN VANETs USING MIX ZONES WITH VIRTUAL PSEUDONYM CHANGE
PROTECTING PRIVACY IN VANETs USING MIX ZONES WITH VIRTUAL PSEUDONYM CHANGE PROTECTING PRIVACY IN VANETs USING MIX ZONES WITH VIRTUAL PSEUDONYM CHANGE
PROTECTING PRIVACY IN VANETs USING MIX ZONES WITH VIRTUAL PSEUDONYM CHANGE IJNSA Journal
 

Similar to A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile Adhoc Network (20)

Exploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search QueriesExploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search Queries
 
Prototyping the Future Potentials of Location Based Services in the Realm of ...
Prototyping the Future Potentials of Location Based Services in the Realm of ...Prototyping the Future Potentials of Location Based Services in the Realm of ...
Prototyping the Future Potentials of Location Based Services in the Realm of ...
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Privacy preserving optimal meeting l...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Privacy preserving optimal meeting l...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Privacy preserving optimal meeting l...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Privacy preserving optimal meeting l...
 
H017665256
H017665256H017665256
H017665256
 
Privacy - Preserving Reputation with Content Protecting Location Based Queries
Privacy - Preserving Reputation with Content Protecting Location Based QueriesPrivacy - Preserving Reputation with Content Protecting Location Based Queries
Privacy - Preserving Reputation with Content Protecting Location Based Queries
 
Cloaking Areas Location Based Services Using Dynamic Grid System & Privacy En...
Cloaking Areas Location Based Services Using Dynamic Grid System & Privacy En...Cloaking Areas Location Based Services Using Dynamic Grid System & Privacy En...
Cloaking Areas Location Based Services Using Dynamic Grid System & Privacy En...
 
LPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBS
LPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBSLPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBS
LPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBS
 
Privacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesPrivacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devices
 
Securing Location of User in Geo Social Networking
Securing Location of User in Geo Social NetworkingSecuring Location of User in Geo Social Networking
Securing Location of User in Geo Social Networking
 
H0944649
H0944649H0944649
H0944649
 
PERTURBED ANONYMIZATION: TWO LEVEL SMART PRIVACY FOR LBS MOBILE USERS
PERTURBED ANONYMIZATION: TWO LEVEL SMART PRIVACY FOR LBS MOBILE USERS PERTURBED ANONYMIZATION: TWO LEVEL SMART PRIVACY FOR LBS MOBILE USERS
PERTURBED ANONYMIZATION: TWO LEVEL SMART PRIVACY FOR LBS MOBILE USERS
 
Anonymous Usage of Location-Based Services Through Spatial and.docx
Anonymous Usage of Location-Based Services Through Spatial and.docxAnonymous Usage of Location-Based Services Through Spatial and.docx
Anonymous Usage of Location-Based Services Through Spatial and.docx
 
Privacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesPrivacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devices
 
Privacy Preservation And Data Security In Location Based Services
Privacy Preservation And Data Security In Location Based ServicesPrivacy Preservation And Data Security In Location Based Services
Privacy Preservation And Data Security In Location Based Services
 
Use of Hidden Markov Mobility Model for Location Based Services
Use of Hidden Markov Mobility Model for Location Based ServicesUse of Hidden Markov Mobility Model for Location Based Services
Use of Hidden Markov Mobility Model for Location Based Services
 
Live Matches , Streaming , Scores
Live Matches , Streaming , ScoresLive Matches , Streaming , Scores
Live Matches , Streaming , Scores
 
TOURIST PLACE RECOMMENDATION SYSTEM
TOURIST PLACE RECOMMENDATION SYSTEMTOURIST PLACE RECOMMENDATION SYSTEM
TOURIST PLACE RECOMMENDATION SYSTEM
 
exploiting service similarity for privacy in location-based search queries
exploiting service similarity for privacy in location-based search queriesexploiting service similarity for privacy in location-based search queries
exploiting service similarity for privacy in location-based search queries
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
PROTECTING PRIVACY IN VANETs USING MIX ZONES WITH VIRTUAL PSEUDONYM CHANGE
PROTECTING PRIVACY IN VANETs USING MIX ZONES WITH VIRTUAL PSEUDONYM CHANGE PROTECTING PRIVACY IN VANETs USING MIX ZONES WITH VIRTUAL PSEUDONYM CHANGE
PROTECTING PRIVACY IN VANETs USING MIX ZONES WITH VIRTUAL PSEUDONYM CHANGE
 

Recently uploaded

PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiessarkmank1
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Ramkumar k
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfsumitt6_25730773
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementDr. Deepak Mudgal
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxMustafa Ahmed
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdfAldoGarca30
 
👉 Yavatmal Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Girl S...
👉 Yavatmal Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Girl S...👉 Yavatmal Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Girl S...
👉 Yavatmal Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Girl S...manju garg
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...ronahami
 
Post office management system project ..pdf
Post office management system project ..pdfPost office management system project ..pdf
Post office management system project ..pdfKamal Acharya
 
Path loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelPath loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelDrAjayKumarYadav4
 
Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257subhasishdas79
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxkalpana413121
 
Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)ChandrakantDivate1
 
8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessorAshwiniTodkar4
 

Recently uploaded (20)

PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdf
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth Reinforcement
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptx
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
👉 Yavatmal Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Girl S...
👉 Yavatmal Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Girl S...👉 Yavatmal Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Girl S...
👉 Yavatmal Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Girl S...
 
Signal Processing and Linear System Analysis
Signal Processing and Linear System AnalysisSignal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
 
Post office management system project ..pdf
Post office management system project ..pdfPost office management system project ..pdf
Post office management system project ..pdf
 
Path loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelPath loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata Model
 
Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptx
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)
 
8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor
 

A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile Adhoc Network

  • 1. Lochana Gaulkar Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 5, Issue 3, ( Part -1) March 2015, pp.74-76 www.ijera.com 74 | P a g e A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile Adhoc Network Lochana Gaulkar, Vaishali Katkar Department of Computer Science and Engineering G.H Raisoni Institute of Engineering and Technology for Women Nagpur, India Assistant Professor, Department of Computer Science and Engineering G.H Raisoni Institute of Engineering and Technology for Women Nagpur, India Abstract Location privacy in Location Based Services (LBS) is the capability to protect the connection between user’s identity, uncertainty sources, servers and database, thereby restraining an impending attacker from conveniently linking users of LBS to convinced locations. Smart Phones have become most important gadget for maintaining the daily activities, highly interconnected urban population is also increasingly dependent on these gadgets to regulate and schedule their daily lives. These applications often depend on current location of user or a class of user. Use of Smart Mapping technology is also increasing in large area; this system provides an easy attainable online platform that can be used for accessing many services. This survey paper projects the privacy-preserving algorithm to find the most favorable meeting location for a class of users. GSM calculates the location of all users. Keywords— Location Privacy, Global System for Mobile Communication (GSM) I. INTRODUCTION Location-based services (LBS) are a general category of computer program-level services that use location data to control features; these Services comprise applications that depend on the particular user location to offer a service/information that is applicable to the user at that location. For providing services and information to the user, LBS commonly use mobile devices with positioning proficiency. LBS can also be used for private or specialized purposes. LBS is an information service and has a number of uses in social networking today as an entertainment service, which is accessible with mobile devices through the mobile network and which uses information on the geographical location of the mobile device. This has become more and more important with the development of the Smartphone and tablet markets. LBS are used in a large range of contexts, such as health, indoor object explore, entertainment, work, personal life, etc, it also consist of services to determine a location of a person or object, such as discovering the nearby banking cash machine or the whereabouts of a friend or employee. LBS include load tracking and vehicle tracking services [1]. Two prominent features of location-based services are location check-ins and sharing location. By checking into a location, users can share their prevailing location with family and friends or access location-specific services from third-party providers. The ability to restrict other parties from learning one’s present or past location is location privacy. Generally, Location Based Service (LBS) gives an information service about the physical location of a user [9]. The remaining paper is organized as follows: Section II describes the related work. Section III presents the proposed work. Section IV describes the proposed solution of the system. Lastly section V presents the conclusion. II. RELATED WORK Igor Bilogrevic, Murtuza Jadliwala [1] proposed privacy-preserving algorithms for determining an optimal meeting location for a class of users. They perform a thorough privacy valuation by formally computing privacy-loss of the proposed approaches. They deal with the privacy issue in LSBSs by focusing on a explicit problem called Fair Rendez- Vous Point(FRVP) problem. Given a set of user location preferences, this FRVP problem is to find out a location among the proposed ones such that the greatest distance between this location and all other users’ locations is minimized. Rinku Dewri and Ramakrishna Thurimella [2] proposed a user-centric location based service architecture where a user can examine the blow of location inaccuracy on the service by deciding the geo coordinates to use in a query. They construct a search application based on user-centric location- based service architecture where a user can detect the impact of position inaccuracy on the service accuracy. RESEARCH ARTICLE OPEN ACCESS
  • 2. Lochana Gaulkar Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 5, Issue 3, ( Part -1) March 2015, pp.74-76 www.ijera.com 75 | P a g e Jing Liu, Zechao Li, Jinhui Tang [3] authors focus on the personalized tag recommendation task and try to recognize user-preferred, geo-location- specific as well as semantically significant tags for a photo by leveraging rich contexts of the unreservedly existing community-contributed photos. For users and geo-locations, they have different privileged tags assigned to a photo, and recommend a subspace learning method to individually expose the both types of preferences. Linke Guo, Chi Zhang [4] proposes a privacy- preserving revocable content sharing scheme in geosocial networks. Proposed scheme allows mobile users to share their encrypted location-based contents on an untrusted server without revealing genuine location information, and further enables other mobile users who physically check in at the particular location to search and decrypt the content if they have the equivalent attributes. Muhammad Ridhwan Ahmad Fuad and Micheal Drieberg [5] presents the expansion of the remote vehicle tracking system which accommodate the Global System for Mobile Communications (GSM) Modem and Google Map. Wei Xin, Cong Tang, TaoYang [6] uses LocSafe method, a “missed-connections” service is used which grantees based on RFID technology, in order to verify an encounter sharing between users in the past. LocSafe is composed of three parts: RFID Tags, LE Collectors, and social service provider. They use RFID technology to detect encounters, and use attribute-based encryption and broadcast encryption to create conviction and defend users, privacy. We estimate LocSafe by a study of “missed- connections “troubles and study of system implementation. Wei Li, Wei Jiao, Guangye Li [7] Location- Based Service(LBS) combined with mobile devices and internet become more and more trendy, and are widely used in traffic navigation, intelligent logistics and the point of interest query. However, most users worry about their privacy when using the LBS because they should provide their precise location and query content to the undependable server. This paper analyses the query association attack model for the constant query in mobile LBS. Jianliang Xu, Xueyan Tang [8] identifies and addresses three new issues concerning location cloaking approach. First, study the demonstration of cloaking regions and illustrate that a circular region normally leads to a small result size for region-based queries. Second, extend a mobility-aware location cloaking technique to oppose trace analysis attacks. Two cloaking algorithms, explicitly MaxAccu_Cloak and MinComm_Cloak, are intended based on different performance objectives. Finally, develop an competent polynomial algorithm for evaluating circular-region-based kNN queries. Hanunah Othman, Habibah Hashim, Jamalul-lail Ab Manan [9] studies modern schemes deliberate to present location privacy and anonymity to LBS users. The main idea is to decipher current practical problem by proposing a latest framework of LBS Middleware called Trusted Anonymizer (TA) secured by Trusted Computing (TC) technologies. Leone C. Monticone, Richard E. Snow [10] provides an analysis of the case where the MRs operate in or above circular service areas on the surface of a spherical Earth. The analysis provides an accurate and competent way, which is less complex than performing the calculations on the sphere, to compute true minimum distance ratios. The method uses stereographic projection to convert the original minimization problem into a simpler problem of minimizing a ratio of Euclidean distances, which is expressed as a function of a single real variable, over the boundaries of discs (i.e., circles) in the complex plane. V. N. Sahare, Y. Raut, Dr. M.V.Sarode[11] proposed a system which will find out the relative position between several vehicles by using Great Circle Algorithm. The enhancement in VANET connectivity is made by road side unit which will supervise all the vehicle information and detect the failure vehicle and calculate the detail of the vehicles that get affected by the failure vehicle and multicast alert packet to well-known vehicles. This will avoid the broadcasting difficulty. III. PROPOSED WORK This proposed system will hide the location of users by using stealth geo-synchronization. Great circle algorithm will be use for calculating the distance between multiple geo-locations. Then by using polygon centroid calculation, central point will be determined. This system will provide the central location which will be approximately same for all users by considering user preferences; it will also provide privacy about users location. Figure 1: Proposed system process diagram
  • 3. Lochana Gaulkar Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 5, Issue 3, ( Part -1) March 2015, pp.74-76 www.ijera.com 76 | P a g e Above figure shows the overall working process of proposed system. This process includes multiple stages of execution. As per shown consider a condition there are five users in group planning to meet in centrally preferred location then one user from all will become master user and after which all user will share their location with master user and master user will execute the process. After execution system will calculate the central location by calculating the centroid of the polygon created by the user’s connection. Once system get the central location it will ask user about his preferred location and after this using Google mapping API system will find out the nearest location selected by the user and once it found system will inform all user about final meeting location and if user wants he can view the travelling path to the location. IV. PROPOSED SOLUTION From the idea of the proposed system we are clear with two outcomes. These two outcomes are discussed below. 1) Provide central feasible location Central feasible location will be calculated by using great circle algorithm and polygon centroid calculation. Then by using Google map API users location will be track. 2) Provide privacy to all users Privacy can be provided by using stealth geo- synchronization. V. CONCLUSION The proposed system will provide a location based service. This system will provide the central location or the location which is nearer to all users by using great circle algorithm and users location will be determined by using Google map API and GSM. Location privacy is the capability to prevent new parties from learning one’s present or past location. Generally, Location Based Service (LBS) gives an information service about the physical location of a user. Proposed system will also provide privacy about user’s location. REFERENCES [1] Igor Bilogrevic, Murtuza Jadliwala, Vishal Joneja,“ Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices”, IEEE Transactions on Information Forensics and Security , Vol. 9, NO. 7,2014. [2] Rinku Dewri and Ramakrishna Thurimella, “Exploiting Service Similarity in Location Based Search Queries, “IEEE Transaction on Parallel and Distributed, February 2014. [3] Jing Liu, Zechao Li, Jinhui Tang, “Personalized Geo-Specific Tag Recommendation for Photos on Social Websites”, IEEE Transaction on Multimedia, Vol. 16, NO. 3, April 2014. [4] Linke Guo, Chi Zhang, “Privacy-Preserving Revocable Content Sharing in Geosocial Networks”, IEEE Conference on Communication and Network Security,2013. [5] Muhammad Ridhwan Ahmad Fuad and Micheal Drieberg, “Remote Vehicle Tracking System using GSM Modem and Google Map”, IEEE Conference on Sustainable Utilization and Development in Engineering and Technology, 2013 . [6] Wei Li, Wei Jiao, Guangye Li, “A LOCATION PRIVACY PRESERVING ALGORITHM FOR MOBILE LBS”, IEEE CCIS, 2012. [7] Wei Xin, Cong Tang, Tao Yang,Hui Ping sun, Zhong Chen, “Towards-Privacy Preserving RFID-Based Location Based Services”,IEEE International Conference on Fuzzy System and Knowledge Discovery, 2012. [8] Jianliang Xu, Xueyan Tang, “Privacy- Conscious Location-Based Queries in Mobile Environments”, IEEE Transactions on Parallel and Distributed Systems , VOL. 21, NO. 3, MARCH 2010 [9] Hanunah Othman, Habibah Hashim, Jamalul-lail Ab Manan, “Privacy Preservation in Location-Based Services (LBS) Through Trusted Computing Technology”, IEEE International Conference on Communication, December 2009. [10] Leone C. Monticone, Richard E. Snow, “Minimizing Great-Circle Distance Ratios of Undesired and Desired Signal Paths on a Spherical Earth”, IEEE Transaction on vehicular technology, Vol. 58, NO. 9, November 2009. [11] V. N. Sahare, Y. Raut, Dr. M.V.Sarode, “Early Alert System Using Relative Positioning in Vehicular Ad-hoc Network”, International Conference on Magnetics, Machines & Drives (AICERA-2014 iCMMD).