Optimal Meeting Location privacy on Mobile Device Users Using Privacy Preserving Algorithm

Main Article Content

Suryapogu Jayanna
Dr.S.Prem Kumar


Nowadays, individuals of urban and country are utilizing smart phones and mobile devices seriously. Specifically urban populace relies on upon the applications and devices which are given by the mobile devices and smart phones to arrange their day by day life. The applications which are based on these devices fundamentally rely on upon the present or favored locations of the client to give the administrations they wish, which may make harm the security of mobile gadget clients. As a rule no client wish to uncover their present location or the location they wish to go. In this paper, we proposed Optimal Meeting Location privacy on Mobile Device Users Using Privacy Preserving Algorithm for group of users.

Article Details

How to Cite
Suryapogu Jayanna, U.Veeresh, and Dr.S.Prem Kumar, “Optimal Meeting Location privacy on Mobile Device Users Using Privacy Preserving Algorithm”, Int. J. Comput. Eng. Res. Trends, vol. 2, no. 9, pp. 565–569, Sep. 2015.
Research Articles


F. Berger, R. Klein, D. Nussbaum, J.-R. Sack, and J. Yi. A meeting scheduling problem respecting time and space. GeoInformatica, 2009.

D. Boneh, E.-J. Goh, and K. Nissim. Evaluating 2-dnf formulas on ciphertexts. In Theory of Cryptography. 2005.

C. Cachin and R. Strobl. Asynchronous group key exchange with failures. In ACM PODC '04, 2004.

C.-H. O. Chen, C.-W. Chen, C. Kuo, Y.-H. Lai, J. M. McCune, A. Studer, A. Per-rig, B.-Y. Yang, and T.-C. Wu. Gangs: Gather, authenticate 'n group securely. In ACM MobiCom '08, 2008.

M. Chignell, A. Quan-Haase, and J. Gwizdka. The privacy attitudes questionnaire (paq): initial development and validation. In Human Factors and Ergonomics Society Annual Meeting Proceedings, 2003.

T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31, 1985.

FacebookDeals. http://www.facebook.com/deals/.

FacebookStatistics. http://www.facebook.com/press/info.php?statistics

Fou rsquareforBusiness. http://foursquare.com/business/,Lastvisited 04.02.2011.

K. B. Frikken and M. J. Atallah. Privacy preserving route planning. In WPES '04, 2004.

O. Goldreich. Foundations of cryptography: Basic applications. Cambridge University Press, 2004.

J. Krumm. A survey of computational location privacy. Personal and Ubiquitous Computing, 13(6):391{399, 2009.

J. Lewis. IBM computer usability satisfaction questionnaires: psychometric evaluations and instructions for use. International Journal of HumanComputer Inter-action, 7, 1995.

Most read articles by the same author(s)

1 2 3 > >>