Asian Journal of Information Technology

Year: 2016
Volume: 15
Issue: 19
Page No. 3712 - 3717

Hybrid Spatio Location Algorithm to Enhance Qos forHeterogeneous Mobile Devices in Location Based Services

Authors : A. Haja Alaudeen, E. Kirubakaran and D. Jeya Mala

References

Bettini, C., X.S. Wang and S. Jajodia, 2005. Protecting Privacy Against Location-Based Personal Identification. In: Secure Data Management. Jonker, W. and M. Petkovic (Eds.). Springer Berlin Heidelberg, Berlin, Germany, ISBN: 978-3-540-28798-8, pp: 185-199.

Chow, C.Y., M.F. Mokbel and X. Liu, 2006. A Peer-to-peer spatial cloaking algorithm for anonymous Location-based service. Proceedings of the 14th Annual ACM International Symposium on Advances in Geographic Information Systems, November 5-11, 2006, Arlington, Virginia, USA., pp: 171-178.

Duckham, M. and L. Kulik, 2005. A formal model of obfuscation and negotiation for location privacy. Proceedings of the 3rd International Conference on Pervasive Computing, May 8-13, 2005, Munich, Germany, pp: 152-170.

Gedik, B. and L. Liu, 2005. Location privacy in mobile systems: A personalized anonymization model. Proceedings of the 25th IEEE International Conference on Distributed Computing Systems, June 10-10, 2005, Columbus, OH., pp: 620-629.

Gedik, B. and L. Liu, 2008. Protecting location privacy with personalized k-anonymity: Architecture and algorithms. IEEE Trans. Mob. Comput., 7: 1-18.
CrossRef  |  Direct Link  |  

Ghinita, G., P. Kalnis and S. Skiadopoulos, 2007. Prive: Anonymous location-based queries in distributed mobile systems. Proceedings of the 16th International Conference on World Wide Web, May 8-12, 2007, Banff, Alberta, Canada, pp: 371-380.

Gruteser, M. and D. Grunwald, 2003. Anonymous usage of Location-based services through spatial and temporal cloaking. Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, May 5-8, 2003, San Francisco, California, pp: 31-42.

Hashem, T. and L. Kulik, 2011. Dont trust anyone: Privacy protection for location-based services. Pervasive Mob. Comput., 7: 44-59.
CrossRef  |  Direct Link  |  

Hu, H. and J. Xu, 2010. 2PASS: Bandwidth-optimized location cloaking for anonymous location-based services. IEEE. Trans. Parallel Distrib. Syst., 21: 1458-1472.
CrossRef  |  Direct Link  |  

Ilyas, M. and R. Vijayakumar, 2012. ELRM: A Generic Framework for Location Privacy in LBS. In: Advances in Computer Science, Engineering and Applications. Wyld, D.C., J. Zizka, and D. Nagamalai (Eds.). Springer Berlin Heidelberg, Berlin, Germany, ISBN: 978-3-642-30110-0, pp: 647-657.

Jin, H. and K. Nam, 2008. Analysis of location determination technology and location based service. Korea Inst. Commun. Sci., 25: 24-33.

Kalnis, P., G. Ghinita, K. Mouratidis and D. Papadias, 2007. Preventing location-based identity inference in anonymous spatial queries. IEEE. Trans. Knowl. Data Eng., 19: 1719-1733.
CrossRef  |  Direct Link  |  

Kang, S.Y., J.W. Song, K.J. Lee, J.H. Lee and J.H. Kim et al., 2009. Improved Location Acquisition Algorithms for the Location-Based Alert Service. In: Information Security and Assurance. Park, J.H., H.H. Chen, M. Atiquzzaman, L. Changhoon and T.H. Kim et al. (Eds.). Springer Berlin Heidelberg, Berlin, Germany, ISBN: 978-3-642-02616-4, pp: 461-470.

Khoshgozaran, A. and C. Shahabi, 2010. A taxonomy of approaches to preserve location privacy in location-based services. Int. J. Comput. Sci. Eng., 5: 86-96.

Mokbel, M.F., C.Y. Chow and W.G. Aref, 2006. The new casper: Query processing for location services without compromising privacy. Proceedings of the 32nd International Conference on Very Large Data Bases, September 12-15, 2006, Seoul, Korea, pp: 763-774.

Samarati, P., 2001. Protecting respondents identities in microdata release. Trans. Knowledge Data Eng., 13: 1010-1027.
CrossRef  |  

Sweeney, L., 2002. Achieving k-anonymity privacy protection using generalization and suppression. Int. J. Uncertainty Fuzziness Knowledge-Base Syst., 10: 571-588.
Direct Link  |  

Sweeney, L., 2002. k-Anonymity: A model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl. Based Syst., 10: 557-570.
CrossRef  |  

Yan, X., Y.A. Sekercioglu and S. Narayanan, 2010. A survey of vertical handover decision algorithms in fourth generation heterogeneous wireless networks. Comput. Networks, 54: 1848-1863.
CrossRef  |  Direct Link  |  

Yang, K., J. Zhang and H.H. Chen, 2007. A flexible QoS-aware service gateway for heterogeneous wireless networks. IEEE. Netw., 21: 6-12.
CrossRef  |  Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved