ISSN ONLINE(2320-9801) PRINT (2320-9798)

All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.

Research Article Open Access

Certain Investigations on Securing Moving Data Objects

Abstract

Recently there is a steep rise in usage of location –aware devices such as many GSM mobile phones, GPS enabled PDA’s, location sensors, and active RFID tags. Due to this device usage scenario, the device generate a large collection of moving data objects with the help of trajectory data , all these data are used for various data identification and analysis process. For instance consider traffic control, one can hack the control unit of traffic control management. Therefore it is way clear that a hacker may collect many temporal data to cover sensational massages of an organization and especially he/she can discover much personal information of third party/check points of many premises. Typically personal data (data privacy) may also fetch. Due to user’s identity replacement which is actual like terminal i.e. Quasi Identifiers (QID) of moving data are linked to external information to re-identify individual existence, thus the attacker can be able to track and trace the anonymous moving objects back into individuals. This paper gives a survey on recent trends and a new strategy for securing trajectory moving data objects.

P.Andrew, J.Anish Kumar, R.Santhya, Prof.S.Balamurugan, S.Charanyaa

To read the full article Download Full Article | Visit Full Article