scholarly journals Trusted Base Stations-Based Privacy Preserving Technique in Location-Based Services

2015 ◽  
Vol 8 (4) ◽  
pp. 93
Author(s):  
Muhammad Aqib ◽  
Jonathan Cazalas

With the advent in mobile and internet technologies, there is a significant increase in the number of users using smartphones and other internet based applications. There are a large number of applications available online that use the internet and provide useful information to the users. These include ones that provide location-based services e.g. google maps etc. These applications provide many facilities to the users who want information regarding a specific area or directions using an optimal path to a destination. Due to these reasons, the number of clients using these applications is increasing on a daily basis. Although these services are very useful and are making it easy for us to get information about our surroundings, some issues are also linked with the use of these applications and their services. One of the more significant issues of using these services is privacy with respect to sending personal location information to location-based services servers. Researchers have provided many solutions to solve these issues. One of the solutions is through caching and use of k-anonymity techniques. In this paper, we have proposed a method to solve the privacy issue that uses caching data approach to reduce the number of queries sent to the location-based services server. We also discuss the use of the concept of k-anonymity when no relevant data is available in cache, and queries are sent to the server.

2005 ◽  
Vol 39 (2) ◽  
pp. 169-174
Author(s):  
Michael A. Toler

As a scholar of North Africa and the Middle East, I get very excited about the possibilities internet technologies open up for me and other scholars who are concerned with regions of the globe outside our national borders. The internet brings a wealth of information to my computer on a daily basis. It is true that in the early years of its development the overwhelming majority of content on the internet was American and in English, but as the rest of the world has come online in greater numbers, the internet has increasingly allowed us to transcend international borders. To cite just one example, for decades English was overwhelmingly the language of the internet. While English remains the most common language on the web, it is no longer the majority language. For several years now, there has been more non-English content on the internet than content in English. I can now read newspapers and listen to news broadcasts from North Africa at the click of a mouse button. I can even communicate easily with colleagues overseas via email, chat or, increasingly, voice over IP at very little cost.


2017 ◽  
Vol 926 (8) ◽  
pp. 49-58
Author(s):  
O.S. Lazareva ◽  
M.V. Shalaeva ◽  
S.N. Shekotilova ◽  
V.G. Shekotilov

There was a discrepancy found between the practice of identification of the soldiers who went missing in action during the Great Patriotic War and also the reburied ones and the possibilities of automated processing of the war and post-war archive documents using modern information technology. Using the practical application of the mix of technologies of the databases, geographic information systems and the Internet as an example there is a possibility demonstrated to establish the destiny of a soldier who was considered missing in action. As far as the GIS technologies are concerned the methods of forming the atlas of rastre electronic maps and vector maps with the data from the archive sources have been the most significant. The atlas of raster electronic maps of the Great Patriotic War period for the Kalinin Battle Front and the 30th army which was formed in the process of research has been registered in Rospatent in the form of database. The functionality of the research was provided by applying various programming means


2016 ◽  
Vol 2016 (4) ◽  
pp. 102-122 ◽  
Author(s):  
Kassem Fawaz ◽  
Kyu-Han Kim ◽  
Kang G. Shin

AbstractWith the advance of indoor localization technology, indoor location-based services (ILBS) are gaining popularity. They, however, accompany privacy concerns. ILBS providers track the users’ mobility to learn more about their behavior, and then provide them with improved and personalized services. Our survey of 200 individuals highlighted their concerns about this tracking for potential leakage of their personal/private traits, but also showed their willingness to accept reduced tracking for improved service. In this paper, we propose PR-LBS (Privacy vs. Reward for Location-Based Service), a system that addresses these seemingly conflicting requirements by balancing the users’ privacy concerns and the benefits of sharing location information in indoor location tracking environments. PR-LBS relies on a novel location-privacy criterion to quantify the privacy risks pertaining to sharing indoor location information. It also employs a repeated play model to ensure that the received service is proportionate to the privacy risk. We implement and evaluate PR-LBS extensively with various real-world user mobility traces. Results show that PR-LBS has low overhead, protects the users’ privacy, and makes a good tradeoff between the quality of service for the users and the utility of shared location data for service providers.


2021 ◽  
pp. 1-12
Author(s):  
Gokay Saldamli ◽  
Richard Chow ◽  
Hongxia Jin

Social networking services are increasingly accessed through mobile devices. This trend has prompted services such as Facebook and Google+to incorporate location as a de facto feature of user interaction. At the same time, services based on location such as Foursquare and Shopkick are also growing as smartphone market penetration increases. In fact, this growth is happening despite concerns (growing at a similar pace) about security and third-party use of private location information (e.g., for advertising). Nevertheless, service providers have been unwilling to build truly private systems in which they do not have access to location information. In this paper, we describe an architecture and a trial implementation of a privacy-preserving location sharing system called ILSSPP. The system protects location information from the service provider and yet enables fine grained location-sharing. One main feature of the system is to protect an individual’s social network structure. The pattern of location sharing preferences towards contacts can reveal this structure without any knowledge of the locations themselves. ILSSPP protects locations sharing preferences through protocol unification and masking. ILSSPP has been implemented as a standalone solution, but the technology can also be integrated into location-based services to enhance privacy.


Author(s):  
M. Chandraleka ◽  
D. Anitha

In mobile, many applications provide services to the users based on the photos provided by the user.Certain applications, client users take a photo of a certain spot and send it to a server, the server identifies the spot with an image recognizer and returns its related information to the users.It can cause a privacy issue because image recognition results are sometimes privacy sensitive.To overcome the problems of existing approaches, proposed an Encryption-Free framework for Privacy preserving Image Recognition, called Enfpire.InEnfPire, the server cannot identify the client users current location, its candidates can only be presented. In proposed thefeature extraction with CNN algorithm help to collect the unique and accurate features from input image and also used Duplicate Detection process to detect images with same features present within same index.In proposed approach user transform the extracted image feature x into y on the user server and sends it to the public server.With the transformation , the effectiveness of the original feature x is degraded so that the public server cannot uniquely recognize the spot-ID of user from y.It only retrives the relevant spot ID’s.The unique spot ID will identify and information regarding the spot and relevant images will be given to the user.


2021 ◽  
Author(s):  
Jennifer Donath

The purpose of this project was to explore how young adults are experiencing relationships when using social media. Using a qualitative design young adults between the ages of 16-25 were asked questions about their experience with social media in the city of Toronto. Qualitative interviews were conducted with three homeless participants who used social media and had access to the internet and a mobile device. The researcher analyzed the data by looking for themes within the participant’s answers. Discussion focuses on the impact of social media, their experiences as a homeless youth and the interaction with social media on a daily basis. The findings also suggest future research for technology amongst homeless youth


Temida ◽  
2016 ◽  
Vol 19 (3-4) ◽  
pp. 355-372 ◽  
Author(s):  
Debarati Halder ◽  
Karuppannan Jaishankar

With the advent of internet and digital communication technology, online crimes targeting celebrities have gained a momentum. This article argues that, among the celebrities, actresses of Hollywood and Bollywood are particularly targeted online mainly because of their sex appeal and easy availability of contents including their images, video clippings, their private geo-location information, etc. The perpetrators are mostly fans who may wish to view the actresses as sex symbols. This article suggests that production houses should take primary responsibilities to prevent such victimisation and the actors themselves may avail legal policies such as right to be forgotten to approach the internet companies including search engines like Google to prevent victimisation and remove the offensive contents.


Author(s):  
Zeinab Gvarishvili

Across the gamut of media formats – from television to the Internet – beauty product advertising influences consumers on a daily basis. Each advertisement seeks to persuade potential buyers of the product's value, or even its necessity for the buyer's well-being and self-image. These techniques, sometimes manipulative in nature, affect consumers’ self-concepts. One of the signature strengths of the beauty advertisement lies in its ability to transform seemingly mundane objects into highly desirable products. In some cases, the beauty industry uses buzzwords and scientific words to convince consumers of a product's value; these linguistic devices describe the product's apparent capabilities and appeal to the consumer's ego by suggesting that the product will enhance the assets the consumer already possesses. All things considered, the present paper deals with a comparative study of skincare product advertisements in English and Georgian and focuses on the use of persuasive strategies, buzzwords and scientific terminology in the advertisements that manipulate and influence potential consumers.


Author(s):  
Acheme Odeh

The internet technologies have made it even easier for terrorist activities to migrate smoothly to the internet. Nations are now benefiting from the act of cyberterrorism, making it more difficult to successfully fight this monster. This chapter aims to draw up a review on various published work addressing the financial benefits of cyberterrorism. The question is to know if economic benefits alone is significantly strong enough to encourage more cyberterrorism activities. Should this be the case, what can be done to curb this deadly cancer from spreading further? Scientific methods could prove to be a much efficient solution to the issue of cyber terrorism. But how is that going to happen and for how long should we wait to see this happen? Would it ever happen? Considering that the internet is an ever-growing technology with endless possibilities for both attackers and crime investigative specialist, do we forsee a cyber war between nations who can boost of better fighting and defending technologies? These questions and many more are discussed based on recent literature.


Sign in / Sign up

Export Citation Format

Share Document