期刊名称:International Journal of Innovative Research in Computer and Communication Engineering
印刷版ISSN:2320-9798
电子版ISSN:2320-9801
出版年度:2014
卷号:2
期号:10
出版社:S&S Publications
摘要:Recently there is a steep rise in usage of location –aware devices such as many GSM mobile phones,GPS enabled PDA’s, location sensors, and active RFID tags. Due to this device usage scenario, the device generate alarge collection of moving data objects with the help of trajectory data , all these data are used for various dataidentification and analysis process. For instance consider traffic control, one can hack the control unit of traffic controlmanagement. Therefore it is way clear that a hacker may collect many temporal data to cover sensational massages ofan organization and especially he/she can discover much personal information of third party/check points of manypremises. Typically personal data (data privacy) may also fetch. Due to user’s identity replacement which is actual liketerminal i.e. Quasi Identifiers (QID) of moving data are linked to external information to re-identify individualexistence, thus the attacker can be able to track and trace the anonymous moving objects back into individuals. Thispaper gives a survey on recent trends and a new strategy for securing trajectory moving data objects.
关键词:GSM; Trajectory Data; Moving Object Data; Data Privacy; Quasi Identifier; Security Attack