Item request has been placed! ×
Item request cannot be made. ×
loading  Processing Request

A FRAMEWORK OF ADAPTED TRAVEL REFERENCES IN ONLINE SOCIAL MEDIA

Item request has been placed! ×
Item request cannot be made. ×
loading   Processing Request
  • معلومة اضافية
    • بيانات النشر:
      International Journal of Innovative Technology and Research
    • الموضوع:
      2017
    • Collection:
      International Journal of Innovative Technology and Research (IJITR)
    • نبذة مختصرة :
      Location information collected from mobile users, knowingly and unknowingly, can reveal not only a user’s latitude and longitude. In this paper, we study approximate k nearest neighbor queries where the mobile user queries the area based company about approximate k nearest sights according to his current location. To judge the security within our solutions, we define a crook model internet hosting in queries. The security analysis has shown our solutions ensures both location privacy meaning the client does not reveal any longer understanding about his place for that LBS provider and query privacy meaning the client does not reveal what type of POIs he's interested in the LBS provider. We're feeling the mobile user can purchase his location from satellites anonymously, coupled with base station coupled with LBS provider don't collude to comprise the customer location privacy or susceptible to anonymous funnel. RSA is not a probabilistic file encryption plan. To alter RSA acquiring a probabilistic file encryption plan, we must be adding random bits for your message m before encrypting m with RSA. The goal of transporting this out must be to ensure the mobile user can buy only one in POIs per query. In addition, once the mobile user can buy a string of encrypted k nearest POIs inside the response within the LBS server, they may frequently run the RR formula simply when using the LBS server to get a sequence of k nearest POIs without passion for query generation and response generation. Performance has shown our fundamental protocol performs much well compared to present PIR based LBS query protocols with regards to both parallel computation and communication overhead.
    • File Description:
      application/pdf
    • Relation:
      http://www.ijitr.com/index.php/ojs/article/view/1731/pdf; http://www.ijitr.com/index.php/ojs/article/view/1731
    • الدخول الالكتروني :
      http://www.ijitr.com/index.php/ojs/article/view/1731
    • Rights:
      To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
    • الرقم المعرف:
      edsbas.470A3D28