G. Shravanya, Ch. China Subba Reddy, T. Shesagiri


In databases, modern studies forecasted managing of database queries on encrypted data by way of file encryption methods Brand New they are not suitable for data outsourcing situations by which data are stationary and participate in approach to restricted users. We aim geo-social services, and movie that servers are compromised and, consequently, are untrustworthy. We introduce a dependable system of location towards index mapping for attaining user confidentiality and managing of accurateness in location basis applications. The unit of location towards index mapping bakes a marked improvement of location confidentiality missing of inclusion of insecurity into query results and additionally the unit views an essential move toward making location privacy realistic for rising geo-social services.


Database Queries; Index Mapping; Geo-Social Services; Location Privacy; Encryption Methods; Location Basis Applications;


T. Jiang, H.J. Wang, and Y.-C. Hu, “Preserving Location Privacy in Wireless Lans,” Proc. Fifth Int’l Conf. Mobile Systems, Applications Services, 2007.

B. Hoh et al., “Preserving Privacy in GPS Traces via Uncertainty- Aware Path Cloaking,” Proc. 14th ACM Conf. Computer Comm. Security, 2007.

J. Krumm, “Inference Attacks on Location Tracks,” Proc. Fifth Int’l Conf. Pervasive Computing, 2007.

A. Beresford and F. Stajano, “Mix Zones: User Privacy in Location- Aware Services,” Proc. IEEE Second Ann. Conf. Pervasive Computing Comm. Workshop, 2004.

M.F. Mokbel, C.-Y. Chow, and W.G. Aref, “The New Casper: A Privacy-Aware Location-Based Database Server,” Proc. IEEE 23rd Int’l Conf. Data Eng., 2007.

B. Gedik and L. Liu, “Location Privacy in Mobile Systems: A Personalized Anonymization Model,” Proc. IEEE 25th Int’l Conf. Distributed Computing Systems, 2005.

Full Text: PDF


  • There are currently no refbacks.

Copyright © 2012 - 2023, All rights reserved.|

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at