EST

Call for paper
April Edition 2017

International Journal of Applied Information Systems solicits high quality original research papers for the
March 15, 2017
April 2017 Edition of the journal.
The last date of research paper submission is
March 15, 2017
SUBMIT YOUR PAPER

Number 5

Cloud based Spatial Cloaking for Mobile User Privacy Preservation

journal image
 Download
1350
  • Revathy Gangadaren M and Lijo V. P. 2012. Cloud based Spatial Cloaking for Mobile User Privacy Preservation. International Journal of Applied Information Systems. 4, 5 (October 2012), 39-43. DOI=http://dx.doi.org/10.5120/ijais450709
  • @article{10.5120/ijais2017451568,
    author = {Revathy Gangadaren M and Lijo V. P.},
    title = {Cloud based Spatial Cloaking for Mobile User Privacy Preservation},
    journal = {International Journal of Applied Information Systems},
    issue_date = {October 2012},
    volume = {4},
    number = {},
    month = {October},
    year = {2012},
    issn = {},
    pages = {39-43},
    numpages = {},
    url = {/archives/volume4/number5/301-0709},
    doi = { 10.5120/ijais12-450709},
    publisher = { xA9 2010 by IJAIS Journal},
    address = {}
    }
    
  • %1 450709
    %A Revathy Gangadaren M
    %A Lijo V.  P.
    %T Cloud based Spatial Cloaking for Mobile User Privacy Preservation
    %J International Journal of Applied Information Systems
    %@ 
    %V 4
    %N 
    %P 39-43
    %D 2012
    %I  xA9 2010 by IJAIS Journal
    

Abstract

Mobile Cloud Computing has invoked a new era of mobile world. The rapid growth of the mobile cloud computing has given rises to many new security issues. The well known spatial cloaking technique based on k-anonymity concept is using in mobile devices for privacy preserved location based services. To avoid the difficulties of the cloaked region management in mobile device, existing device based spatial cloaking is transferred to cloud based spatial cloaking. It is ensure more involvement of the cloud to reduce the burden of mobile device.

References

  1. Wei-Tek Tsai, Qihong Shao, Xin Sun, Jay Elston, "Real-Time Service-Oriented Cloud Computing", in proceedings of the IEEE 6th World Conference on Services, 2010.
  2. H. Dinh, C. Lee, D. Niyato, and P. Wang, " A survey of mobile cloud computing: architecture, applications, and approaches", Wiley Online.
  3. Chetan S, Gautham Kumar5, Dinesh, Mathew K, and Abhimanyu M. A. , "Cloud Computing for Mobile World", journal available at chetan. ueuo. com, 2010.
  4. M. La Polla, F. Martinelli, D. Sgandurra, "A Survey on Security for Mobile Devices", in proceedings of the IEEE Communications Surveys & Tutorials, 2012.
  5. S. Srinivasamurthy, and D. Liu, "Survey on Cloud Computing Security", Indiana University, 2010.
  6. X. Lin. , "Survey on cloud based mobile security and a new framework for improvement," in proceedings of IEEE International Conference on Information and Automation (ICIA), 2011, pp. 710-715.
  7. J. Oberheide, K. Veeraraghavan, E. Cooke, J. Flinn, and F. Jahanian, "Virtualized in-cloud security services for mobile devices," in Proceedings of the First Workshop on Virtualization in Mobile Computing, ACM, 2008, pp. 31-35.
  8. P. Zou, C. Wang, Z. Liu, J. Wang, and J. Sun, "A cloud based sim drm scheme for the mobile internet," in Proceedings of the 17th ACM conference on Computer and communications security, ACM, 2010, pp. 759-761.
  9. M. Jakobsson, E. Shi, P. Golle, and R. Chow, "Implicit authentication for mobile devices," in Proceedings of the 4th USENIX conference on Hot topics in security, USENIX Association, 2009.
  10. R. Chow, M. Jakobsson, R. Masuoka, J. Molina, Y. Niu, E. Shi, and Z. Song, "Authentication in the clouds: a framework and its application to mobile users," in Proceedings of the 2010 ACM workshop on Cloud computing security workshop, ACM, 2010, pp. 1-6.
  11. A. Houmansadr, S. Zonouz, and R. Berthier, "A cloud-based intrusion detection and response system for mobile phones," in Proceedings of the 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops. IEEE Computer Society, 2011.
  12. C. Y. Chow, M. Mokbel, andX. Liu, "Spatial cloaking for anonymous location-based services in mobile peer to peer environments", GeoInformatica, Springer,2011.
  13. V. D. Dhale, and AR Mahajan, "Review of Cloud Computing Architecture for Social Computing" IJCA Proceedings on National Conference on Innovative Paradigms in Engineering and Technology (NCIPET), 2012.
  14. J. Xu, Jin, M. Zheng, "Mobile-Aware Anonymous Peer Selecting Algorithm for Enhancing Privacy and Connectivity in Location-Based Service", in Proceedings of the IEEE 7th Conference on e-Business Engineering, 2010.
  15. C. Y. Chow, M. F. Mokbel, and T. He,"A privacy preserving location monitoring system for wireless sensor networks", IEEE Transactions on Mobile Computing, 2011.
  16. S. Wang, and X. Wang, "In-device spatial cloaking for mobile user privacy assisted by the cloud", in Proceedings of the 11th IEEE International Conference on Mobile Data Management (MDM), 2010.
  17. Y. Che, Q. Yang, and X. Hong, "A dual-active spatial cloaking algorithm for location privacy preserving in mobile peer-to-peer networks", in Proceedings of the IEEE on Wireless Communications, 2012.

Keywords

Mobile Cloud Computing, Location Based Services, Spatial Cloaking

Index Terms

Computer Science
Information Sciences