IJSER Home >> Journal >> IJSER
International Journal of Scientific and Engineering Research
ISSN Online 2229-5518
ISSN Print: 2229-5518 12    
Website: http://www.ijser.org
scirp IJSER >> Volume 2, Issue 12, December 2011
UDA: Update driven approach for Continuously Moving Objects
Full Text(PDF, 3000)  PP.  
Author(s)
G.Sriram murthy,Ch.Jyosthna Devi,G.Bala venkata kishore
KEYWORDS
Spatial databases, Update Driven, Performance, Efficiency,Scalability,Computation,Object Index
ABSTRACT
In the present scenario location updating is main problem in mobile applications. Mobile clients will be spread based on location hierarchy. Updating all mobile clients' information at single database server faces overhead problem. To overcome this, in our approach we are providing server hierarchy for load balancing. Mobile clients generally send continuous information to servers. But if movement is local then the local server will have responsible to update data. If movement is global then central server will send data to all. Using this approach load is balanced. We develop efficient query evaluation/reevaluation and safe region computation algorithms in the approach. The experimental results show that UDA substantially outperforms traditional schemes in terms of monitoring overhead, CPU cost, and scalability while achieving close-to-optimal communication cost.
References
[1] S. Babu and J. Widom, “Continuous Queries over Data Streams,” Proc. ACM SIGMOD, 2001.

[2] N. Beckmann, H. Kriegel, R. Schneider, and B. Seeger, “The R*- Tree: An Efficient and Robust Access Method for Points and Rectangles,” Proc. ACM SIGMOD, pp. 322-331, 1990.

[3]. Duri, S., Gruteser, M., Liu, X., Moskowitz, P., Perez, R., Singh, M., Tang, J.M.: Framework for security and privacy in automotive telematics. In: WMC ’02: Pro- ceedings of the 2nd international workshop on Mobile commerce, New York, NY, USA, ACM (2002) 25–32

[4]. Ardagna, C.A., Cremonini, M., Damiani, E., di Vimercati, S.D.C., Samarati, P.:Supporting location-based conditions in access control policies. In: ASIACCS ’06: Proceedings of the 2006 ACM Symposium on Information, computer and communications security, New York, NY, USA, ACM (2006) 212–22224

[5]. Zibuschka, J., Scherner, T., Fritsch, L., Rannenberg, K., Goethe, J.W.: Towards a unified interface for privacy regulation-conformant location-based services. In: W3C Workshop on Languages for Privacy Policy Negotiation and Semantics- Driven Enforcement, Ispra/Italy (October 2006)

[6]. Sweeney, L.: k-anonymity: A model for protecting privacy. Interna-tional Journal on Uncertainty, Fuzziness and Knowledge-based Systems 10(5) (2002) 557–570 [7]. Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems 10(5) (2002) 571–588

[8]. Gruteser, M., Grunwald, D.: Anonymous usage of location-based services throughh spatial and temporal cloaking. In: MobiSys ’03: Proceedings of the 1st international conference on Mobile systems, applications and services, New York, NY, USA, ACM (2003) 31–42

[9]. Gedik, B., Liu, L.: Location privacy in mobile systems: A personalized anonymization model. In: ICDCS ’05: Proceedings of the 25th IEEE International Conference on Distributed Computing Systems, Washington, DC, USA, IEEE Computer So- ciety (2005) 620–629

[10]. Kalnis, P., Ghinita, G., Mouratidis, K., Papadias, D.: Preserving anonymity in location based services. Technical report, National University of Singapore (2006)

[11]. Mokbel, M.F., Chow, C.Y., Aref, W.G.: The new casper: query processing for location services without compromising privacy. In: VLDB ’06: Proceedings of the 32nd international conference on Very large data bases, VLDB Endowment (2006) 763–774

[12]. Hoh, B., Gruteser, M.: Protecting location privacy through path confusion. In: SECURECOMM ’05: Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SE- CURECOMM’05),Washington, DC, USA, IEEE Computer Society (2005) 194–205

[13]. Cheng, R., Zhang, Y., Bertino, E., Prabhakar., S.: Preserving user location privacy in mobile data management infrastructures. In: PET ’06: 6thWorkshop on Privacy Enhancing Technologies. (2006)

[14]. Ghinita, G., Kalnis, P., Skiadopoulos, S.: Prive: anonymous location-based queries in distributed mobile systems. In:WWW’07: Proceedings of the 16th international conference on World Wide Web, New York, NY, USA, ACM (2007) 371–380

[15]. Ghinita, G., Kalnis, P., Skiadopoulos, S.: Mobihide: A mobile peer-to-peer system for anonymous location-based queries. In: SSTD ’07: 10th International Sympo- sium on Advances in Spatial and Temporal DatabasDatabases, Boston, MA, USA, Springer (2007) 221–238

[16]. Duckham,M., Kulik, L.: A formal model of obfuscation and negotiation for location privacy. In: Pervasive 05’: Third International Conference on Pervasive Computing.(2005) 152–170

[17]. Schilit, B.N., LaMarca, A., Borriello, G., Griswold,W.G., McDonald, D., Lazowska, E., Balachandran, A., Hong, J., Iverson, V.: Challenge: ubiquitous location-aware computing and the ”place lab” initiative. In: WMASH ’03: Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots, New York, NY, USA, ACM Press (2003) 29–35

[18]. Chow, C.Y., Mokbel, M.F., Liu, X.: A peer-to-peer spatial cloaking algorithm for anonymous location-based service. In: GIS ’06: Proceedings of the 14th annual ACM international symposium on Advances in geographic information systems, New York, NY, USA, ACM (2006) 171–178

Untitled Page