A New Methodology to Preserve User Profile and Functionality In Geosocial Networks

Authors

  • P. Dinakaran  Computer Science and Engineering, IFET College of Engineerimg, Villupuram, Tamil Nadu, India
  • L. Mogana Priya   Computer Science and Engineering, IFET College of Engineerimg, Villupuram, Tamil Nadu, India

Keywords:

PROFILER, Homomorphic Cryptosystem, Location centric profiles (LCP), Anonymizer, Identity fake news, and Benalohs Cryptosystem

Abstract

Social networking services have become an important source to store individual information. Geolocation on web based social network can be IP-based or used hotspot trilateration. A recent addition to this space, social networking such as Yelp or Foursquare, collects some user locations, through check-ins performed by users at visited venues. Overtly, individual information allows social networking providers to offer a different type of applications, including individual recommendations and targeted advertising, and venue owners to promote their business through the spatio-temporal incentives. Without individual people may be reluctant to use social networking; without user information the provider not able to use applications and have no incentive to associate in social networking services.

References

  1. Yelp, Inc., San Francisco, CA, USA. (2014, Feb. 28) [Online]. Available: http://www.yelp.com
  2. Foursquare, New York, NY, USA. (2014, Feb. 28) [Online]. Available: https://foursquare.com/
  3. B. Krishnamurthy and C. E. Wills, "On the leakage of personally identifiable information via online social networks," Comput. Commun.Rev., vol. 40, no. 1, pp. 112–117, 2010.
  4. E. Steel and G.Fowler.(2010). Facebook in Privacy Breach [Online]. Available: http://online.wsj.com/article/SB100014240527023047728045 755584840752369%68.html
  5. Foursquare Official Blog, New York, NY, USA. (2011). On Foursquare, Cheating, and Claiming Mayorships from your Couch [Online]. Available: http://goo.gl/F1Yn5
  6. G. Zhong, I. Goldberg, and U. Hengartner, "Louis, Lester, and Pierre: Three Protocols for Location Privacy," Privacy Enhancing Technologies, LNCS 4776, Springer, 2007, pp. 62–76.
  7. G. Ghinita et al., "Private Queries in Location-Based Services: Anonymizers Are Not Necessary," Proc. SIGMOD, ACM Press, 2008, pp. 121–132.
  8. M.L. Yiu et al., "SpaceTwist: Managing the Trade-Offs among Location Privacy, Query Performance, and Query Accuracy in Mobile Services," Proc. Int’l Conf. Data Eng., IEEE CS Press, 2008, pp. 366–375
  9. S. Mascetti et al., "Privacy in Geo-Social Networks: Proximity Notification with Untrusted Service Providers and Curious Buddies," Very Large Databases J., 2011; www.springerlink.com/content/y6m385570364876j/..
  10. D. Freni et al., "Preserving Location and Absence Privacy in Geo-Social Networks," Proc. Conf. Information and Knowledge Management, ACM Press, 2010,  pp. 309–318.

Downloads

Published

2017-04-30

Issue

Section

Research Articles

How to Cite

[1]
P. Dinakaran, L. Mogana Priya , " A New Methodology to Preserve User Profile and Functionality In Geosocial Networks , IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 2, pp.364-366, March-April-2017.