Optimal Meeting Location privacy on Mobile Device Users Using Privacy Preserving Algorithm
Main Article Content
Abstract
Nowadays, individuals of urban and country are utilizing smart phones and mobile devices seriously. Specifically urban populace relies on upon the applications and devices which are given by the mobile devices and smart phones to arrange their day by day life. The applications which are based on these devices fundamentally rely on upon the present or favored locations of the client to give the administrations they wish, which may make harm the security of mobile gadget clients. As a rule no client wish to uncover their present location or the location they wish to go. In this paper, we proposed Optimal Meeting Location privacy on Mobile Device Users Using Privacy Preserving Algorithm for group of users.
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
IJCERT Policy:
The published work presented in this paper is licensed under the Creative Commons Attribution 4.0 International (CC BY 4.0) license. This means that the content of this paper can be shared, copied, and redistributed in any medium or format, as long as the original author is properly attributed. Additionally, any derivative works based on this paper must also be licensed under the same terms. This licensing agreement allows for broad dissemination and use of the work while maintaining the author's rights and recognition.
By submitting this paper to IJCERT, the author(s) agree to these licensing terms and confirm that the work is original and does not infringe on any third-party copyright or intellectual property rights.
References
F. Berger, R. Klein, D. Nussbaum, J.-R. Sack, and J. Yi. A meeting scheduling problem respecting time and space. GeoInformatica, 2009.
D. Boneh, E.-J. Goh, and K. Nissim. Evaluating 2-dnf formulas on ciphertexts. In Theory of Cryptography. 2005.
C. Cachin and R. Strobl. Asynchronous group key exchange with failures. In ACM PODC '04, 2004.
C.-H. O. Chen, C.-W. Chen, C. Kuo, Y.-H. Lai, J. M. McCune, A. Studer, A. Per-rig, B.-Y. Yang, and T.-C. Wu. Gangs: Gather, authenticate 'n group securely. In ACM MobiCom '08, 2008.
M. Chignell, A. Quan-Haase, and J. Gwizdka. The privacy attitudes questionnaire (paq): initial development and validation. In Human Factors and Ergonomics Society Annual Meeting Proceedings, 2003.
T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31, 1985.
FacebookDeals. http://www.facebook.com/deals/.
FacebookStatistics. http://www.facebook.com/press/info.php?statistics
Fou rsquareforBusiness. http://foursquare.com/business/,Lastvisited 04.02.2011.
K. B. Frikken and M. J. Atallah. Privacy preserving route planning. In WPES '04, 2004.
O. Goldreich. Foundations of cryptography: Basic applications. Cambridge University Press, 2004.
J. Krumm. A survey of computational location privacy. Personal and Ubiquitous Computing, 13(6):391{399, 2009.
J. Lewis. IBM computer usability satisfaction questionnaires: psychometric evaluations and instructions for use. International Journal of HumanComputer Inter-action, 7, 1995.