The increasing availability of location-aware mobile devices has given rise to a flurry of location-based mostly services (LBS). Due to the nature of spatial queries, an LBS needs the user position so as to process her requests. On the opposite hand, revealing exact user locations to a (doubtless untrusted) LBS might pinpoint their identities and breach their privacy. To address this issue, spatial anonymity techniques obfuscate user locations, forwarding to the LBS a sufficiently large region instead. Existing strategies explicitly target processing within the Euclidean space, and don't apply when proximity to the users is defined according to network distance (e.g., driving time through the roads of a city). In this paper, we tend to propose a framework for anonymous question processing in road networks. We style location obfuscation techniques that (i) give anonymous LBS access to the users, and (ii) allow economical question processing at the LBS side. Our techniques exploit existing network database infrastructure, requiring no specialised storage schemes or functionalities. We have a tendency to experimentally compare various designs in real road networks and demonstrate the effectiveness of our techniques.

Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here

PROJECT TITLE : Efficient Anonymous Authentication for Wireless Body Area Networks ABSTRACT: Wireless body area networks (WBANs) are becoming an increasingly important medical paradigm as a result of developments in integrated
PROJECT TITLE :Efficient Anonymous Message Submission - 2018ABSTRACT:In on-line surveys, several folks are reluctant to supply true answers due to privacy considerations. So, anonymity is important for on-line message collection.
PROJECT TITLE : VOD-ADAC: Anonymous Distributed Fine-Grained Access Control Protocol with Verifiable Outsourced Decryption in Public Cloud - 2017 ABSTRACT: Remote information access control is of crucial importance in public
PROJECT TITLE : Provably Secure Dynamic Id-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model Sign In Or Purchase - 2017 ABSTRACT: Authenticated key exchange (AKE) protocol permits a
PROJECT TITLE :Deterministic Detection of Cloning Attacks for Anonymous RFID SystemsABSTRACT:Cloning attacks seriously impede the safety of radio-frequency identification (RFID) applications. This paper tackles deterministic clone

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry