Please use this identifier to cite or link to this item:
https://idr.l2.nitk.ac.in/jspui/handle/123456789/8424
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Naik, C. | |
dc.contributor.author | Siddhartha, M. | |
dc.contributor.author | Martin, J.P. | |
dc.contributor.author | Chandrasekaran, K. | |
dc.date.accessioned | 2020-03-30T10:18:39Z | - |
dc.date.available | 2020-03-30T10:18:39Z | - |
dc.date.issued | 2019 | |
dc.identifier.citation | IEEE Region 10 Annual International Conference, Proceedings/TENCON, 2019, Vol.2019-October, , pp.1286-1291 | en_US |
dc.identifier.uri | http://idr.nitk.ac.in/jspui/handle/123456789/8424 | - |
dc.description.abstract | In the past few decades, smartphones and Global Positioning System(GPS) devices have led to the popularity of Location Based Services. It is crucial for large MNCs to get a lot of data from people and provide their services accordingly. However, on the other side, the concern of privacy has also increased among the users, and they would like to hide their whereabouts. The rise of data consumption and the hunger for faster network speed has also led to the emergence of new concepts such as the Fog Computing. Fog computing paradigm extends the storage, networking, and computing facilities of the cloud computing towards the edge of the networks while removing the load on the server centers and decreasing the latency at the edge device. The fog computing will help in unlimited growth of location services and this adoption of fog computing calls for the need for more secure and robust algorithms for location privacy. One of the ways we can alter the information regarding the location of the user is Location Obfuscation. This can be done reversibly or irreversibly. In this paper, we address the problem of location privacy and present a solution based on the type of data that has to be preserved (in our case, it is distance). A mobile application has been designed and developed to test and validate the feasibility of the proposed obfuscation techniques for the Fog computing environments. � 2019 IEEE. | en_US |
dc.title | Location Privacy Using Data Obfuscation in Fog Computing | en_US |
dc.type | Book chapter | en_US |
Appears in Collections: | 2. Conference Papers |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.