Tuesday, December 17, 2019
Comparative Analysis Of User Location Based Anonymization...
Comparative analysis of user location based anonymization of mobile computing M.K.Patil1 ,M.N.Sonawane2 and R.A.Mandlik3 1,2,3 Department of computer engineering, 1,2,3 Loknete Gopinathji Munde Institude of Engineering Education and Research, Nashik Abstract:-In this paper we have discussed numerous of papers which are based on mobile computing we also have done comparative analysis of those paper with different parameter which include domain, application ,issue within them. Futher we also sugget next generation system in future scope for user location anonymization. I. Introduction:- As per the growth of mobile devices related with a GPS receiver,a large number of location based services (LBSs) have been launched. Since location information may private information, preserving location privacy has become a signiï ¬ cant issue. Previously studied methods to preserve a usersââ¬â¢ privacy; physical constraints are not taken in consideration for most of them. In this paper, we constantly focus on such constraints and purpose of a location privacy preservation method which can be applicable to a real environment. In particular, our method anonymizes the userââ¬â¢s location which generates dummies which we simulate to behav e like an real human. The model also considers traceability of the userââ¬â¢s locations which can quickly recover from an accidental reveal of the userââ¬â¢s location. We are conducting an experiment using ï ¬ ve usersââ¬â¢ real GPS trajectories and are comparedShow MoreRelatedPrivacy Preserving Data Mining : Database Security And Privacy2788 Words à |à 12 Pagesmining. Currently, privacy preserving data mining has made a lot of research results. As the emergence of mobile communications, embedded, positioning technology development and networking, location-based services and location-based applications such as social networking, the amount of data, which contain personal privacy, is sharply increasing. Using data mining tools for a comprehensive analysis of the data is easier to get an invasion of privacy, which will make the traditional privacy preserving
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.