Open Access Open Access  Restricted Access Subscription or Fee Access

Enterprise Wide Employee Identification using Mobile Service

R. Aswini Priyanka, S. Baskari

Abstract


Smart phones support location-based services (LBS) like maps, navigation, tracking services and applications. Users can query the LBS server and get information about surroundings. But the user queries give away private information, enabling the LBS to track them. It leads service operator to misuse their personal data. These issues are addressed by introducing a novel mechanism for mobile user. The mobile users are authenticated by a secure mechanism and they are interacting with clients for their business needs. In proposed system, by injecting a novel mechanism to track the User location it incorporates the service-based orchestration engine using predictive analysis technique. The predictive analysis computation is introduced in this project via threshold limits to address the incorrect data stream coming from up-stream systems.

Keywords


Location-Based Services (LBS), Geo-Location, Predictive Analysis, Service-Based Orchestration Engine

Full Text:

PDF

References


G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K.-L. Tan, “Private Queries in Location Based Services: Anonymizers are Not Necessary,” Proc. ACM SIGMOD Int’l Conf. Management of Data, 2008.

R. Shokri, P. Papadimitratos, and J.-P.Hubaux, “Mobile Crowd: A Collaborative Location Privacy Preserving LBS Mobile Proxy (Demonstration),” Proc. Eighth ACM Int’l Conf. Mobile Systems, Applications, and Services (MobiSys), 2010.

F. Olumofin, P.K. Tysowski, I. Goldberg, and U. Hengartner, “Achieving Efficient Query Privacy for Location Based Services,” Proc. 10th Int’l Conf. Privacy Enhancing Technologies, 2010.

R. Shokri, G. Theodorakopoulos, J.-Y. Le Boudec, and J.-P. Hubaux, “Quantifying Location Privacy,” Proc. IEEE Symp. Security and Privacy, 2011.

J. Freudiger, R. Shokri, and J.-P.Hubaux, “Evaluating the Privacy Risk of Location-Based Services,” Proc. Fifth Int’l Conf. Financial Cryptography and Data Security (FC ’11), pp. 31-46, 2012.

R.Shokri, G. Theodorakopoulos, C. Troncoso, J.-P. Hubaux, and J.-Y. LeBoudec, “Protecting Location Privacy: Optimal Strategy against Localization Attacks,” Proc. ACM Conf. Computer and Comm. Security, 2012.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.