Please use this identifier to cite or link to this item: https://idr.nitk.ac.in/jspui/handle/123456789/8424
Full metadata record
DC FieldValueLanguage
dc.contributor.authorNaik, C.
dc.contributor.authorSiddhartha, M.
dc.contributor.authorMartin, J.P.
dc.contributor.authorChandrasekaran, K.
dc.date.accessioned2020-03-30T10:18:39Z-
dc.date.available2020-03-30T10:18:39Z-
dc.date.issued2019
dc.identifier.citationIEEE Region 10 Annual International Conference, Proceedings/TENCON, 2019, Vol.2019-October, , pp.1286-1291en_US
dc.identifier.urihttp://idr.nitk.ac.in/jspui/handle/123456789/8424-
dc.description.abstractIn the past few decades, smartphones and Global Positioning System(GPS) devices have led to the popularity of Location Based Services. It is crucial for large MNCs to get a lot of data from people and provide their services accordingly. However, on the other side, the concern of privacy has also increased among the users, and they would like to hide their whereabouts. The rise of data consumption and the hunger for faster network speed has also led to the emergence of new concepts such as the Fog Computing. Fog computing paradigm extends the storage, networking, and computing facilities of the cloud computing towards the edge of the networks while removing the load on the server centers and decreasing the latency at the edge device. The fog computing will help in unlimited growth of location services and this adoption of fog computing calls for the need for more secure and robust algorithms for location privacy. One of the ways we can alter the information regarding the location of the user is Location Obfuscation. This can be done reversibly or irreversibly. In this paper, we address the problem of location privacy and present a solution based on the type of data that has to be preserved (in our case, it is distance). A mobile application has been designed and developed to test and validate the feasibility of the proposed obfuscation techniques for the Fog computing environments. � 2019 IEEE.en_US
dc.titleLocation Privacy Using Data Obfuscation in Fog Computingen_US
dc.typeBook chapteren_US
Appears in Collections:2. Conference Papers

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.