An Adaptive Approach for Preserving Privacy in Context Aware Applications for Smartphones in Cloud Computing Platform

被引:0
|
作者
Gadiyar, H. Manoj T. [1 ,2 ]
Thyagaraju, G. S. [1 ]
Goudar, R. H. [2 ]
机构
[1] Sri Dharmasthala Manjunatheshwara Inst Technol, Dept Comp Sci & Engn, Ujire 574240, Karnataka, India
[2] Visvesvaraya Technol Univ, Dept Comp Sci & Engn, Belagavi, Karnataka, India
关键词
Context-aware; privacy; active defence; privacy protection and mobile phones; PREDICTION; PROTECTION;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the widespread use of mobile phones and smartphone applications, protecting one's privacy has become a major concern. Because active defensive strategies and temporal connections between situations relevant to users are not taken into account, present privacy preservation systems for cell phones are often ineffective. This work defines secrecy maintenance issues similar to optimizing tasks, thereby verifying their accuracy and optimization capabilities through a hypothetical study. Many optimal issues arise while preserving one's privacy and these optimal issues are to be addressed as linear programming issues. By addressing linear programming issues, an effective context-aware privacy-preserving algorithm (CAPP) was created that uses an active defence strategy to determine how to release a user's current context to enhance the quality of service (QoS) regarding context-aware applications while maintaining secrecy. CAPP outperforms other standard methodologies in lengthy simulations of actual data. Additionally, the minimax learning algorithm (MLA) optimizes the policy users and improves the satisfaction threshold of the context-aware applications. Moreover, a cloud-based approach is introduced in the work to protect the user's privacy from third parties. The obtained performance measures are compared with existing approaches in terms of privacy policy breaches, context sensitivity, satisfaction threshold, adversary power, and convergence speed for online and offline attacks.
引用
收藏
页码:519 / 529
页数:11
相关论文
共 50 条
  • [31] Privacy-preserving outsourced classification in cloud computing
    Ping Li
    Jin Li
    Zhengan Huang
    Chong-Zhi Gao
    Wen-Bin Chen
    Kai Chen
    Cluster Computing, 2018, 21 : 277 - 286
  • [32] Survey of privacy preserving data queries in cloud computing
    Xiao, Ren-Yi
    Tongxin Xuebao/Journal on Communications, 2014, 35 (12): : 168 - 177
  • [33] Privacy-Preserving Data Sharing in Cloud Computing
    Wang, Hui
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2010, 25 (03) : 401 - 414
  • [34] Privacy Preserving Data Storage Technique in Cloud Computing
    Kartheeban, K.
    Murugan, A. Durai
    2017 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT TECHNIQUES IN CONTROL, OPTIMIZATION AND SIGNAL PROCESSING (INCOS), 2017,
  • [35] Privacy preserving security using biometrics in cloud computing
    Kumar, Santosh
    Singh, Sanjay Kumar
    Singh, Amit Kumar
    Tiwari, Shrikant
    Singh, Ravi Shankar
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (09) : 11017 - 11039
  • [36] Privacy-preserving outsourced classification in cloud computing
    Li, Ping
    Li, Jin
    Huang, Zhengan
    Gao, Chong-Zhi
    Chen, Wen-Bin
    Chen, Kai
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2018, 21 (01): : 277 - 286
  • [37] Privacy preserving protocol for service aggregation in cloud computing
    Wang, Peishun
    Mu, Yi
    Susilo, Willy
    Yan, Jun
    SOFTWARE-PRACTICE & EXPERIENCE, 2012, 42 (04): : 467 - 483
  • [38] Privacy-Preserving Data Sharing in Cloud Computing
    Hui Wang
    Journal of Computer Science and Technology, 2010, 25 : 401 - 414
  • [39] Privacy Preserving Inner Product of Vectors in Cloud Computing
    Sheng, Gang
    Wen, Tao
    Guo, Quan
    Yin, Ying
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [40] Privacy preserving security using biometrics in cloud computing
    Santosh Kumar
    Sanjay Kumar Singh
    Amit Kumar Singh
    Shrikant Tiwari
    Ravi Shankar Singh
    Multimedia Tools and Applications, 2018, 77 : 11017 - 11039