CFP last date
15 January 2025
Reseach Article

Cloud based Spatial Cloaking for Mobile User Privacy Preservation

by Revathy Gangadaren M, Lijo V. P.
International Journal of Applied Information Systems
Foundation of Computer Science (FCS), NY, USA
Volume 4 - Number 5
Year of Publication: 2012
Authors: Revathy Gangadaren M, Lijo V. P.
10.5120/ijais12-450709

Revathy Gangadaren M, Lijo V. P. . Cloud based Spatial Cloaking for Mobile User Privacy Preservation. International Journal of Applied Information Systems. 4, 5 ( October 2012), 39-43. DOI=10.5120/ijais12-450709

@article{ 10.5120/ijais12-450709,
author = { Revathy Gangadaren M, Lijo V. P. },
title = { Cloud based Spatial Cloaking for Mobile User Privacy Preservation },
journal = { International Journal of Applied Information Systems },
issue_date = { October 2012 },
volume = { 4 },
number = { 5 },
month = { October },
year = { 2012 },
issn = { 2249-0868 },
pages = { 39-43 },
numpages = {9},
url = { https://www.ijais.org/archives/volume4/number5/301-0709/ },
doi = { 10.5120/ijais12-450709 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-07-05T10:47:27.114596+05:30
%A Revathy Gangadaren M
%A Lijo V. P.
%T Cloud based Spatial Cloaking for Mobile User Privacy Preservation
%J International Journal of Applied Information Systems
%@ 2249-0868
%V 4
%N 5
%P 39-43
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile Cloud Computing has invoked a new era of mobile world. The rapid growth of the mobile cloud computing has given rises to many new security issues. The well known spatial cloaking technique based on k-anonymity concept is using in mobile devices for privacy preserved location based services. To avoid the difficulties of the cloaked region management in mobile device, existing device based spatial cloaking is transferred to cloud based spatial cloaking. It is ensure more involvement of the cloud to reduce the burden of mobile device.

References
  1. Wei-Tek Tsai, Qihong Shao, Xin Sun, Jay Elston, "Real-Time Service-Oriented Cloud Computing", in proceedings of the IEEE 6th World Conference on Services, 2010.
  2. H. Dinh, C. Lee, D. Niyato, and P. Wang, " A survey of mobile cloud computing: architecture, applications, and approaches", Wiley Online.
  3. Chetan S, Gautham Kumar5, Dinesh, Mathew K, and Abhimanyu M. A. , "Cloud Computing for Mobile World", journal available at chetan. ueuo. com, 2010.
  4. M. La Polla, F. Martinelli, D. Sgandurra, "A Survey on Security for Mobile Devices", in proceedings of the IEEE Communications Surveys & Tutorials, 2012.
  5. S. Srinivasamurthy, and D. Liu, "Survey on Cloud Computing Security", Indiana University, 2010.
  6. X. Lin. , "Survey on cloud based mobile security and a new framework for improvement," in proceedings of IEEE International Conference on Information and Automation (ICIA), 2011, pp. 710-715.
  7. J. Oberheide, K. Veeraraghavan, E. Cooke, J. Flinn, and F. Jahanian, "Virtualized in-cloud security services for mobile devices," in Proceedings of the First Workshop on Virtualization in Mobile Computing, ACM, 2008, pp. 31-35.
  8. P. Zou, C. Wang, Z. Liu, J. Wang, and J. Sun, "A cloud based sim drm scheme for the mobile internet," in Proceedings of the 17th ACM conference on Computer and communications security, ACM, 2010, pp. 759-761.
  9. M. Jakobsson, E. Shi, P. Golle, and R. Chow, "Implicit authentication for mobile devices," in Proceedings of the 4th USENIX conference on Hot topics in security, USENIX Association, 2009.
  10. R. Chow, M. Jakobsson, R. Masuoka, J. Molina, Y. Niu, E. Shi, and Z. Song, "Authentication in the clouds: a framework and its application to mobile users," in Proceedings of the 2010 ACM workshop on Cloud computing security workshop, ACM, 2010, pp. 1-6.
  11. A. Houmansadr, S. Zonouz, and R. Berthier, "A cloud-based intrusion detection and response system for mobile phones," in Proceedings of the 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops. IEEE Computer Society, 2011.
  12. C. Y. Chow, M. Mokbel, andX. Liu, "Spatial cloaking for anonymous location-based services in mobile peer to peer environments", GeoInformatica, Springer,2011.
  13. V. D. Dhale, and AR Mahajan, "Review of Cloud Computing Architecture for Social Computing" IJCA Proceedings on National Conference on Innovative Paradigms in Engineering and Technology (NCIPET), 2012.
  14. J. Xu, Jin, M. Zheng, "Mobile-Aware Anonymous Peer Selecting Algorithm for Enhancing Privacy and Connectivity in Location-Based Service", in Proceedings of the IEEE 7th Conference on e-Business Engineering, 2010.
  15. C. Y. Chow, M. F. Mokbel, and T. He,"A privacy preserving location monitoring system for wireless sensor networks", IEEE Transactions on Mobile Computing, 2011.
  16. S. Wang, and X. Wang, "In-device spatial cloaking for mobile user privacy assisted by the cloud", in Proceedings of the 11th IEEE International Conference on Mobile Data Management (MDM), 2010.
  17. Y. Che, Q. Yang, and X. Hong, "A dual-active spatial cloaking algorithm for location privacy preserving in mobile peer-to-peer networks", in Proceedings of the IEEE on Wireless Communications, 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile Cloud Computing Location Based Services Spatial Cloaking