Study of Data Security in Position Centered Services

Study of Data Security in Position Centered Services



  • 2020

  • November-December

  • Research

    Technical Paper Publishing Sites , Journals for Publication of Research Paper , Best Journal to Publish Research Paper , Research Paper Publication Sites , Best International Journal for Paper Publication , Best Journals to Publish Papers in India , Journal Publication Sites , Research Paper Publication Sites



    In this paper, a solution for privacy preservation and data
    security is presented. Privacy over the internet can be defined as the
    ability to decide what information one discloses or withholds about a
    person over the internet, who can access such information and for
    what reason a person’s information may or may not be accessed. The
    problem is stated as follows: (i) a client needs to inquire a database
    which contains some authorized and sensitive data and does not want
    to disclose himself to the server because of privacy concerns
    the owner of the database i.e the server, does not want to simply give
    out its data to all users. The server needs to have some control over its
    information, since the information is its asset. In this paper, a two stage
    approach is proposed to achieve secure solution for both user and the
    server. The first step is accomplished using Oblivious Transfer and
    second step is accomplished using Data Retrieval phase. And, a security
    model has been devised, which includes encryption and hashing
    algorithm for providing data security.
    Keywords - Privacy preservation, data security, and location based
    services, oblivious transfer, Data Retrieval.
    [1] Jaydip Sen, “A Secure and User Privacy-Preserving Searching Protocol for Peer-to-Peer Networks” International Journal of
    Communication Networks and Information Security (IJCNIS) Vol. 4, No. 1, April 2012.
    [2] Karl-Peter Fuchs, Hannes Federrath,, Christopher Piosecny, Dominik Herrmann, “Privacy-Preserving DNS: Analysis of Broadcast,
    Range Queries and Mix-based Protection Methods” Volume 6879 of the series Lecture Notes in Computer Science pp 665-683.
    [3] Gianluca Dini and Pericle Perazzo, “A uniformity-based approach to location privacy” 0140-3664 2015 Published by Elsevier B.V.
    [4] Jonathan Cazalas and Muhammad Aqib, “Trusted Base Stations-Based Privacy Preserving Technique in Location-Based Services”
    Computer and Information Science; Vol. 8, No. 4; 2015 ISSN 1913-8989 E-ISSN 1913-8997 Published by Canadian Center of Science
    and Education
    [5] Xiaodong Lin, Rongxing Lu and Jun Shao, “FINE: A Fine-Grained Privacy-Preserving Location-based Service Framework for Mobile
    Devices” IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
    [6] Tadayoshi Kohno, Arvind Krishnamurthy, Gabriel Maganis and Thomas Ristenpart, “Privacy-Preserving Location Tracking of Lost or
    Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTs” Proceeding SS'08 Proceedings of the 17th
    conference on Security symposium Pages 275-290 USENIX Association Berkeley, CA, USA ©2008.
    [7] Eran Toch, Jason Hong, Janne Lindqvist, Jialiu Lin and Shahriyar Amini, “Caché: Caching Location-Enhanced Content to Improve User
    Privacy” Proceeding MobiSys '11 Proceedings of the 9th international conference on Mobile systems, applications, and services Pages
    197-210 ACM New York, NY, USA ©2011.
    [8] Ian Goldberg and Femi Olumofin, “Preserving Access Privacy Over Large Databases” ACM New York, NY, USA ©2011.
    [9] Dirk Grunwald and Marco Gruteser, “Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking”
    Proceeding MobiSys '03 Proceedings of the 1st international conference on Mobile systems, applications and services Pages 31-42

    ACM New York, NY, USA ©2003.

    Study of Data Security in Position Centered Services