AN EXPLOSIVE EXPANSION TOWARDS MUTUAL DATA UTILIZING ROUTINE USING DATA ASSEMBLY

Rajesh Kumar Bhavani, P Ravindra Kumar

Abstract


The information collector gathers reviews about points-of-interest (POIs) from data contributors, while LBSPs purchase POI data many techniques from the information collector and permit users to do spatial top-k queries which request the POIs inside a certain region along with the greatest k ratings to have an interested POI attribute. This paper presents three novel schemes for users to identify fake spatial snapshot and moving top-k query results being an effort to promote the sensible deployment and utilization of the suggested system. The effectiveness and efficiency in our schemes are completely examined and evaluated. The machine includes a data collector, data contributors, location-based providers (LBSPs), and system users. This paper views a manuscript distributed system for collaborative location-based information generation and discussing which become more and more popular because of the explosive development of Internet-capable and placement-aware cellular devices. Used, LBSPs are entrusted and could return fake query recent results for various bad motives, e.g., in support of POIs prepared to pay.


Keywords


Spatial Top-K Query; Location-Based Service; Security

References


B. Hore, S. Mehrotra, and G. Tsudik, “A Privacy-Preserving Index for Range Queries,” Proc. 30th Int’l Conf. Very Large Data Bases (VLDB’04), pp. 720-731, Aug. 2004.

H. Yu, P. Gibbons, M. Kaminsky, and F. Xiao, “SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks,” IEEE/ACM Trans. Networking, vol. 18, no. 3, pp. 885-898, June 2010.

E. Shi, J. Bethencourt, H. Chan, D. Song, and A. Perrig, “Multi-Dimensional Range Query over Encrypted Data,” Proc. IEEE Symp. Security and Privacy (S&P’07), pp. 350-364, May 2007.

M. Narasimha and G. Tsudik, “Authentication of Outsourced Databases Using Signature Aggregation and Chaining,” Proc. 11th Int’l Conf. Database Systems for Advanced Applications (DASFAA’06), pp. 420-436, Apr. 2006.

J. Shi, R. Zhang, and Y. Zhang, “Secure Range Queries in Tiered Sensor Networks,” Proc. IEEE INFOCOM’09, Apr. 2009.


Full Text: PDF

Refbacks

  • There are currently no refbacks.




Copyright © 2012 - 2021, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.