Security Providing When Disclosing Information By Using K-Anonymity Privacy Concept Method

Download Now
Provided by: IRD India
Topic: Enterprise Software
Format: PDF
The technological advances in sensor technologies, wireless sensor networks are also used to control the temperature and humidity levels inside commercial greenhouses. The authors proposed two algorithms like, resource aware and quality aware algorithms. This both algorithms works on k-anonymity privacy concept like k-anonymity and location k-anonymity. There are two popular approaches to protect location privacy in the context of LBS usage: policy-based and anonymity-based approaches. In policy-based approaches, mobile clients specify their location privacy preferences as policies and completely trust that the third party LBS providers adhere to these policies.
Download Now

Find By Topic