Providing Privacy in Geosocial Networks

Authors

  • Priyanka N. Computer Science and Engineering, IFET College of Engineering, Villupuram, India

DOI:

https://doi.org/10.53555/nncse.v2i3.467

Keywords:

location, social networks

Abstract

Social Network providers concentrate more on profit. Users reveal their personal information and make themselves into trouble. So a framework is proposed to face the conflict between the privacy and profit. The framework that consists of Location Profiles and a venue centric profiles and decentralized approach is provided for strong privacy and also implemented in android.

References

B. Krishnamurthy and C. E. Wills, “On the leakage of personally identifiable information via online social networks,” Comput. Commun. Rev., vol. 40, no. 1, pp. 112–117, 2010.

B. Carbunar and R. Potharaju, “You unlocked the Mt. Everest badge on foursquare! countering location fraud in geosocial networks,” in Proc. 9th IEEE Int. Conf. Mobile Ad Hoc Sensor Syst. (MASS), Feb. 2012, pp. 182–190.

D. L. Chaum, “Untraceable electronic mail, return addresses, and digital pseudonyms,” Commun. ACM, vol. 24, no. 2, pp. 84–90, 1981.

M. Abe, “Universally verifiable mix-net with verification work indendent of the number of mixservers,” in Proc. EUROCRYPT, 1998, pp. 437–447.

R. Dingledine, N. Mathewson, and P. F. Syverson, “Tor: The secondgeneration onion router,” in Proc. USENIX Security Symp., 2004, pp. 303–320.

B. Carbunar, M. Rahman, J. Ballesteros, and N. Rishe, “Private location centric profiles for geosocial networks,” in Proc. 20th ACM SIGSPATIAL Int. Conf. Adv. Geograph. Inf. Syst. (GIS), 2012, pp. 458–461.

M. Rahman, J. Ballesteros, B. Carbunar, N. Rishe, and A. V. Vasilakos, “Toward preserving privacy and functionality in geosocial networks,” in Proc. 18th Int. Conf. Mobile Comput. Netw., 2013, pp. 1–3.

M. Gruteser and D. Grunwald, “Anonymous usage of location-based services through spatial and temporal cloaking,” in Proc. MobiSys, 2003, pp. 31–42.

K. P. N. Puttaswamy and B. Y. Zhao, “Preserving privacy in locationbased mobile social applications,” in Proc. 11th Workshop Mobile Comput. Syst. Appl., New York, NY, USA, 2010, pp. 1–6.

S. Mascetti, D. Freni, C. Bettini, X. Sean Wang, and S. Jajodia, “Privacy in geo-social networks: Proximity notification with untrusted service providers and curious buddies,” VLDB J., vol. 20, no. 4, pp. 541–566, Aug. 2011.

D. Freni, C. Ruiz Vicente, S. Mascetti, C. Bettini, and C. S. Jensen, “Preserving location and absence privacy in geo-social networks,” in Proc. 19th ACM CIKM, New York, NY, USA, 2010, pp. 309–318

Downloads

Published

2015-03-31

How to Cite

N., P. (2015). Providing Privacy in Geosocial Networks. Journal of Advance Research in Computer Science & Engineering (ISSN 2456-3552), 2(3), 06-08. https://doi.org/10.53555/nncse.v2i3.467