Investigation on Privacy and Secure content of location based Queries
B.Kundan, N.Poorna Chandra Rao, Dr S.Prem Kumar, ,
Affiliations (M.Tech), CSEAssistant Professor, Department of Computer Science and EngineeringProfessor & HOD, Department of computer science and engineering, G.Pullaiah College of Engineering and Technology, Kurnool, Andhra Pradesh, India
Now a days, to know the users location information on devices having GPS facility. When user’s location is
provided to LBS, it is possible to user to know all location dependent information like location of friends or Nearest Restaurant,
whether or traffic conditions. The massive use of mobile devices pave the way for the creation of wireless networks that can be
used to exchange information based on locations. When the exchange of location information is done amongst entrusted
parties, the privacy of the user could be in harmful. Existing protocol doesn’t work on many different mobile devices and
another issue is that, Location Server (LS) should provide misleading data to user.. Proposed solution can be implemented on
a desktop PCs, laptops and mobile phones to assess the efficiency of implemented protocol.
B.Kundan,N.Poorna Chandra Rao,Dr S.Prem Kumar."Investigation on Privacy and Secure content of location based Queries". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.2, Issue 09,pp.543-546, SEPTEMBER - 2015, URL :https://ijcert.org/ems/ijcert_papers/V2I904.pdf,
Keywords : Location based query, Points of Interest, private query, private information retrieval, oblivious transfer.
 B. Hoh and M. Gruteser, “Protecting location privacythrough path confusion,” in Proc. 1st Int. Conf. SecureComm, 2005,pp. 194–205.
 G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K.-L. Tan,“Private queries in location based services: Anonymizers are not necessary,” inProc. ACM SIGMOD, Vancouver, BC, Canada, 2008, pp. 121–132.
 B. Gedik and L. Liu, “Location privacy in mobile systems: A per-sonalized anonymization model,” inProc. ICDCS, Columbus, OH, USA, 2005, pp. 620–629.
 C. Gentry and Z. Ramzan, “Single-database private informa-tion retrieval with constant communication rate,” inProc. ICALP,L. Caires, G. Italiano, L. Monteiro, C. Palamidessi, and M. Yung,Eds., Lisbon, Portugal, 2005, pp. 803–815, LNCS 3580.
 G. Ghinita, P. Kalnis, M. Kantarcioglu, and E. Bertino, “A hybrid technique for private location-based queries with database pro-tection,” in Proc. Adv. Spatial Temporal Databases, N. Mamoulis, T. Seidl, T. Pedersen, K. Torp, and I. Assent, Eds., Aalborg, Denmark, 2009, pp. 98– 116, LNCS 5644.
 G. Ghinita, P. Kalnis, M. Kantarcioglu, and E. Bertino,“Approximate and exact hybrid algorithms for private nearest-neighbor queries with database
 B. Schilit, J. Hong, and M. Gruteser, “Wireless location privacy protection,”Computer, vol. 36, no. 12, pp. 135–137, 2003.
 F. Grace, “Stalker Victims Should Check For GPS,” Feb. 2003,www.cbsnews.com.
 DailyNews, “How cell phone helped cops nail key murder suspect secret ’pings’ that gave bouncer away,” Mar. 2006.
 “Police: Thieves robbed homes based on facebook,social media sites,” WMUR News, September 010,http://www.wmur.com/r/24943582/detail.html.
 M. Gruteser and D. Grunwald, “Anonymous usage of location-based service through spatial and temporal cloaking,” in Proc. of Mobisys, 2003
We have kept IJCERT is a free peer-reviewed scientific journal to endorse conservation. We have not put up a paywall to readers, and we do not charge for publishing. But running a monthly journal costs is a lot. While we do have some associates, we still need support to keep the journal flourishing. If our readers help fund it, our future will be more secure.