Investigation on Privacy and Secure content of location based Queries
Main Article Content
Abstract
Now a days, to know the users location information on devices having GPS facility. When user’s location is provided to LBS, it is possible to user to know all location dependent information like location of friends or Nearest Restaurant, whether or traffic conditions. The massive use of mobile devices pave the way for the creation of wireless networks that can be used to exchange information based on locations. When the exchange of location information is done amongst entrusted parties, the privacy of the user could be in harmful. Existing protocol doesn’t work on many different mobile devices and another issue is that, Location Server (LS) should provide misleading data to user.. Proposed solution can be implemented on a desktop PCs, laptops and mobile phones to assess the efficiency of implemented protocol.
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
IJCERT Policy:
The published work presented in this paper is licensed under the Creative Commons Attribution 4.0 International (CC BY 4.0) license. This means that the content of this paper can be shared, copied, and redistributed in any medium or format, as long as the original author is properly attributed. Additionally, any derivative works based on this paper must also be licensed under the same terms. This licensing agreement allows for broad dissemination and use of the work while maintaining the author's rights and recognition.
By submitting this paper to IJCERT, the author(s) agree to these licensing terms and confirm that the work is original and does not infringe on any third-party copyright or intellectual property rights.
References
B. Hoh and M. Gruteser, “Protecting location privacythrough path confusion,” in Proc. 1st Int. Conf. SecureComm, 2005,pp. 194–205.
G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K.-L. Tan,“Private queries in location based services: Anonymizers are not necessary,” inProc. ACM SIGMOD, Vancouver, BC, Canada, 2008, pp. 121–132.
B. Gedik and L. Liu, “Location privacy in mobile systems: A per-sonalized anonymization model,” inProc. ICDCS, Columbus, OH, USA, 2005, pp. 620–629.
C. Gentry and Z. Ramzan, “Single-database private informa-tion retrieval with constant communication rate,” inProc. ICALP,L. Caires, G. Italiano, L. Monteiro, C. Palamidessi, and M. Yung,Eds., Lisbon, Portugal, 2005, pp. 803–815, LNCS 3580.
G. Ghinita, P. Kalnis, M. Kantarcioglu, and E. Bertino, “A hybrid technique for private location-based queries with database pro-tection,” in Proc. Adv. Spatial Temporal Databases, N. Mamoulis, T. Seidl, T. Pedersen, K. Torp, and I. Assent, Eds., Aalborg, Denmark, 2009, pp. 98– 116, LNCS 5644.
G. Ghinita, P. Kalnis, M. Kantarcioglu, and E. Bertino,“Approximate and exact hybrid algorithms for private nearest-neighbor queries with database
B. Schilit, J. Hong, and M. Gruteser, “Wireless location privacy protection,”Computer, vol. 36, no. 12, pp. 135–137, 2003.
F. Grace, “Stalker Victims Should Check For GPS,” Feb. 2003,www.cbsnews.com.
DailyNews, “How cell phone helped cops nail key murder suspect secret ’pings’ that gave bouncer away,” Mar. 2006.
“Police: Thieves robbed homes based on facebook,social media sites,” WMUR News, September 010,http://www.wmur.com/r/24943582/detail.html.
M. Gruteser and D. Grunwald, “Anonymous usage of location-based service through spatial and temporal cloaking,” in Proc. of Mobisys, 2003