International Journal of Scientific Research in Science, Engineering and TechnologyPrint ISSN : 2395-1990 Online ISSN : 2394-4099 email@example.com
Russell Paulet, Md. Golam Kaosar, Xun Yi, and Elisa Bertino, Fellow, IEEE, “Privacy-Preserving and Content-Protecting Location Based Queries,” IEEE Transaction on Knowledg and Data Engineering , vol. 26, No. 5, May 2014
 (2011, Jul. 7) Openssl [Online].Available:http:// www.openssl.org
M. Bellare and S. Micali, “Non-interactive oblivious transfer and applications,” in Proc. CRYPTO, 1990, pp. 547–557.
A. Beresford and F. Stajano, “Location privacy in pervasive computing,”IEEE Pervasive Comput., vol. 2, no. 1, pp. 46–55, Jan.–Mar.2003.
C. Bettini, X. Wang, and S. Jajodia, “Protecting privacy againstlocation-based personal identification,” in Proc. 2nd VDLB Int.Conf. SDM, W. Jonker and M. Petkovic, Eds., Trondheim, Norway,2005, pp. 185–199, LNCS 3674.
X. Chen and J. Pang, “Measuring query privacy in location-based services,” in Proc. 2nd ACM CODASPY, San Antonio, TX, USA,2012, pp. 49–60.
B. Chor, E. Kushilevitz, O. Goldreich, and M. Sudan, “Private information retrieval,” J. ACM, vol. 45, no. 6, pp. 965–981, 1998.
M. Damiani, E. Bertino, and C. Silvestri, “The PROBE framework for the personalized cloaking of private locations,” Trans. Data Privacy, vol. 3, no. 2, pp. 123–148, 2010.
M. Duckham and L. Kulik, “A formal model of obfuscation and negotiation for location privacy,” in Proc. 3rd Int. Conf. Pervasive Comput., H. Gellersen, R. Want, and A. Schmidt, Eds., 2005, pp 243–251, LNCS 3468.
T. ElGamal, “A public key cryptosystem and a signature scheme based on discrete logarithms,” IEEE Trans. Inform. Theory, vol. 31, no. 4, pp. 469–472, Jul. 1985.
B. Gedik and L. Liu, “Location privacy in mobile systems: A personalized anonymization model,” in Proc. ICDCS, Columbus, OH,USA, 2005, pp. 620–629.
C. Gentry and Z. Ramzan, “Single-database private information retrieval with constant communication rate,” in Proc. ICALP,L. Caires, G. Italiano, L. Monteiro, C. Palamidessi, and M. Yung,Eds., Lisbon, Portugal, 2005, pp. 803–815, LNCS 3580.
G. Ghinita, P. Kalnis, M. Kantarcioglu, and E. Bertino, “A hybrid technique for private location-based queries with database protection,” in Proc. Adv. Spatial Temporal Databases, N. Mamoulis,T. Seidl, T. Pedersen, K. Torp, and I. Assent, Eds., Aalborg, Denmark, 2009, pp. 98–116, LNCS 5644.
G. Ghinita, P. Kalnis, M. Kantarcioglu, and E. Bertino, “Approximate and exact hybrid algorithms for private nearestneighbor queries with database protection,” GeoInformatica, vol. 15, no. 14, pp. 1–28, 2010.
G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K.-L. Tan, “Private queries in location based services: Anonymizers are not necessary,” in Proc. ACM SIGMOD, Vancouver, BC, Canada, 2008, pp. 121–132.
G. Ghinita, C. R. Vicente, N. Shang, and E. Bertino, “Privacypreserving matching of spatial datasets with protection against background knowledge,” in Proc. 18th SIGSPATIAL Int. Conf. GIS, 2010, pp. 3–12.
M. Gruteser and D. Grunwald, “Anonymous usage of locationbased services through spatial and temporal cloaking,” in Proc. 1st Int. Conf. MobiSys, 2003, pp. 31–42.
T. Hashem and L. Kulik, “Safeguarding location privacy in wireless ad-hoc networks,” in Proc. 9th Int. Conf. UbiComp, Innsbruck, Austria, 2007, pp. 372–390.
B. Hoh and M. Gruteser, “Protecting location privacy through path confusion,” in Proc. 1st Int. Conf. SecureComm, 2005, pp. 194–205.
P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias, “Preventing location-based identity inference in anonymous spatial queries,” IEEE Trans. Knowl. Data Eng., vol. 19, no. 12, pp. 1719–1733, Dec. 2007.
H. Kido, Y. Yanagisawa, and T. Satoh, “An anonymous communication technique using dummies for location-based services,” in Proc. Int. Conf. ICPS, 2005, pp. 88–97.
J. Krumm, “A survey of computational location privacy,” Pers. Ubiquitous Comput., vol. 13, no. 6, pp. 391–399, Aug. 2009.
E. Kushilevitz and R. Ostrovsky, “Replication is not needed: Single database, computationally-private information retrieval,” in Proc. FOCS, Miami Beach, FL, USA, 1997, pp. 364–373.
L. Marconi, R. Pietro, B. Crispo, and M. Conti, “Time warp: How time affects privacy in LBSs,” in Proc. ICICS, Barcelona, Spain, 2010, pp. 325–339.
S. Mascetti and C. Bettini, “A comparison of spatial generalization algorithms for lbs privacy preservation,” in Proc. Int. Mobile Data Manage., Mannheim, Germany, 2007, pp. 258–262.
M. F. Mokbel, C.-Y. Chow, and W. G. Aref, “The new casper: Query processing for location services without compromising privacy,” in Proc. VLDB, Seoul, Korea, 2006, pp. 763–774.
M. Naor and B. Pinkas, “Oblivious transfer with adaptive queries,” in Proc. CRYPTO, vol. 1666, Santa Barbara, CA, USA, 1999, pp. 791–791.
P. Paillier, “Public-key cryptosystems based on composite degree residuosity classes,” in Proc. EUROCRYPT, vol. 1592, Prague, Czech Republic, 1999, pp. 223–238.
R. Paulet, M. Golam Kaosar, X. Yi, and E. Bertino, “Privacypreserving and content-protecting location based queries,” in Proc. ICDE, Washington, DC, USA, 2012, pp. 44–53.
B. Palanisamy and L. Liu, “MobiMix: Protecting location privacy with mix-zones over road networks,” in Proc. ICDE, Hannover, Germany, 2011, pp. 494–505.
S. Pohlig and M. Hellman, “An improved algorithm for computing logarithms over GF(p) and its cryptographic significance (corresp.),” IEEE Trans. Inform. Theory, vol. 24, no. 1, pp. 106–110, Jan. 1978.
V. Shoup, (2011, Jul. 7). Number thoery library [Online]. Available: http://www.shoup.net/ntl
L. Sweeney, “k-Anonymity: A model for protecting privacy,” Int. J. Uncertain. Fuzziness Knowl. Based Syst., vol. 10, no. 5, pp. 557–570, Oct. 2002.
T. Xu and Y. Cai, “Feeling-based location privacy protection for location-based services,” in Proc. 16th ACM CCS, Chicago, IL, USA, 2009, pp. 348–357.
Cite This Article
Ram Prakash. R, Prabhu. K, Samson Sunny. S, Devi. S, "Protecting Privacy Against Location-Based Personal Identification ", International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 1, Issue 2, pp.259-264, March-April-2015.
URL : http://ijsrset.com/IJSRSET152281.php
Copyright @ 2017 - International Journal of Scientific Research in Science, Engineering and Technology