SlideShare a Scribd company logo
1 of 5
GLOBALSOFT TECHNOLOGIES 
IEEE PROJECTS & SOFTWARE DEVELOPMENTS 
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE 
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS 
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmai l.com 
Preserving Location Privacy in Geosocial Applications 
ABSTRACT: 
Using geosocial applications, such as FourSquare, millions of people interact with 
their surroundings through their friends and their recommendations. Without 
adequate privacy protection, however, these systems can be easily misused, for 
example, to track users or target them for home invasion. In this paper, we 
introduce LocX, a novel alternative that provides significantly improvedlocation 
privacy without adding uncertainty into query results or relying on strong 
assumptions about server security. Our key insight is to apply secure user-specific, 
distance-preserving coordinate transformations to all location data shared with the 
server. The friends of a user share this user’s secrets so they can apply the same 
transformation. This allows all location queries to be evaluated correctly by the 
server, but our privacy mechanisms guarantee that servers are unable to see or infer 
the actual location data from the transformed data or from the data access. We 
show that LocX provides privacy even against a powerful adversary model, and we 
use prototype measurements to show that it provides privacy with very little 
performance overhead, making it suitable for today’s mobile devices.
EXISTING SYSTEM: 
Existing systems have mainly taken three approaches to improving user privacy in 
geosocial systems: 
 Introducing uncertainty or error into location data. 
 Relying on trusted servers or intermediaries to apply anonymization to user 
identities and private data. 
 Relying on heavy-weight cryptographic or private information retrieval 
(PIR) techniques. 
None of them, however, have proven successful on current application platforms. 
Techniques using the first approach fall short because they require both users and 
application providers to introduce uncertainty into their data, which degrades the 
quality of application results returned to the user. In this approach, there is a 
fundamental tradeoff between the amount of error introduced into the time or 
location domain, and the amount of privacy granted to the user. Users dislike the 
loss of accuracy in results, and application providers have a natural disincentive to 
hide user data from themselves, which reduces their ability to monetize the data. 
The second approach relies on the trusted proxies or servers in the system to 
protect user privacy. This is a risky assumption, since private data can be exposed 
by either software bugs and configuration errors at the trusted servers or by 
malicious administrators. Finally, relying on heavy-weight cryptographic 
mechanisms to obtain provable privacy guarantees are too expensive to deploy on 
mobile devices and even on the servers in answering queries such as nearest 
neighbor and range queries.
DISADVANTAGES OF EXISTING SYSTEM: 
 Location data privacy. The servers should not be able to view the content of 
data stored at a location. 
 This new functionality comes with significantly increased risks to personal 
privacy. 
PROPOSED SYSTEM: 
In this paper, we propose LocX(short for location to index mapping), a novel 
approach to achieving user privacy while maintaining full accuracy in location-based 
social applications (LBSAs from here on ward). Our insight is that many 
services do not need to resolve distance-based queries between arbitrary pairs of 
users, but only between friends interested in each other’s locations and data. Thus, 
we can partition location data based on users’ social groups, and then perform 
transformations on the location coordinates before storing them on untrusted 
servers. A user knows the transformation keys of all her friends, allowing her to 
transform her query into the virtual coordinate system that her friends use. Our 
coordinate transformations preserve distance metrics, allowing an application 
server to perform both point and nearest-neighbor queries correctly on transformed 
data. However, the transformation is secure, in that transformed values cannot be 
easily associated with real-world locations without a secret, which is only available 
to the members of the social group. Finally, transformations are efficient, in that 
they incur minimal overhead on the LBSAs. This makes the applications built on 
LocX lightweight and suitable for running on today’s mobile devices.
ADVANTAGES OF PROPOSED SYSTEM: 
 Our goal is to support both query types in an efficient fashion, suitable for 
today’s mobile devices. 
 Flexibility to support point, circular range, and nearest-neighbor queries on 
location data. 
 Strong location privacy. The servers processing the data (and the 
administrators of these servers) should not be able to learn the history of 
locations that a user has visited. 
SYSTEM ARCHITECTURE: 
SYSTEM REQUIREMENTS: 
HARDWARE REQUIREMENTS: 
 System : Pentium IV 2.4 GHz.
 Hard Disk : 40 GB. 
 Floppy Drive : 1.44 Mb. 
 Monitor : 15 VGA Colour. 
 Mouse : Logitech. 
 Ram : 512 Mb. 
SOFTWARE REQUIREMENTS: 
 Operating system : Windows XP/7. 
 Coding Language : ASP.net, C#.net 
 Tool : Visual Studio 2010 
 Database : SQL SERVER 2008 
REFERENCE: 
Krishna P.N. Puttaswamy, Shiyuan Wang, Troy Steinbauer, Divyakant Agrawal, 
Fellow, IEEE, Amr El Abbadi, Christopher Kruegel, and Ben Y. 
Zhao,“Preserving Location Privacy in Geosocial Applications”, IEEE 
TRANSACTIONS ON MOBILE COMPUTING,VOL. 13,NO. 1, JANUARY 
2014.

More Related Content

What's hot

What's hot (7)

Crime security.
Crime security.Crime security.
Crime security.
 
Context aware applications
Context aware applicationsContext aware applications
Context aware applications
 
Terrance A. 10.20.15
Terrance A. 10.20.15Terrance A. 10.20.15
Terrance A. 10.20.15
 
UbiComp2011: ContextCapture (Poster)
UbiComp2011: ContextCapture (Poster)UbiComp2011: ContextCapture (Poster)
UbiComp2011: ContextCapture (Poster)
 
Macro and micro aspects in RE for AOSE
Macro and micro aspects in RE for AOSEMacro and micro aspects in RE for AOSE
Macro and micro aspects in RE for AOSE
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...
 
Security analysis of a privacy preserving decentralized key-policy attribute-...
Security analysis of a privacy preserving decentralized key-policy attribute-...Security analysis of a privacy preserving decentralized key-policy attribute-...
Security analysis of a privacy preserving decentralized key-policy attribute-...
 

Similar to 2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geosocial-applications

Privacy preserving location sharing services for social networks(1)
Privacy preserving location sharing services for social networks(1)Privacy preserving location sharing services for social networks(1)
Privacy preserving location sharing services for social networks(1)
Kamal Spring
 
Ieee projects-2014-bulk-ieee-projects-2015-title-list-for-me-be-mphil-final-y...
Ieee projects-2014-bulk-ieee-projects-2015-title-list-for-me-be-mphil-final-y...Ieee projects-2014-bulk-ieee-projects-2015-title-list-for-me-be-mphil-final-y...
Ieee projects-2014-bulk-ieee-projects-2015-title-list-for-me-be-mphil-final-y...
birdsking
 

Similar to 2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geosocial-applications (20)

preserving location privacy in geosocial applications
preserving location privacy in geosocial applicationspreserving location privacy in geosocial applications
preserving location privacy in geosocial applications
 
Privacy preserving location sharing services for social networks(1)
Privacy preserving location sharing services for social networks(1)Privacy preserving location sharing services for social networks(1)
Privacy preserving location sharing services for social networks(1)
 
Securing Location of User in Geo Social Networking
Securing Location of User in Geo Social NetworkingSecuring Location of User in Geo Social Networking
Securing Location of User in Geo Social Networking
 
JPJ1437 Exploiting Service Similarity for Privacy in Location-Based Search Q...
JPJ1437  Exploiting Service Similarity for Privacy in Location-Based Search Q...JPJ1437  Exploiting Service Similarity for Privacy in Location-Based Search Q...
JPJ1437 Exploiting Service Similarity for Privacy in Location-Based Search Q...
 
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...
 
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...
 
2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...
 
2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...
 
azd document
azd documentazd document
azd document
 
H017665256
H017665256H017665256
H017665256
 
Privacy - Preserving Reputation with Content Protecting Location Based Queries
Privacy - Preserving Reputation with Content Protecting Location Based QueriesPrivacy - Preserving Reputation with Content Protecting Location Based Queries
Privacy - Preserving Reputation with Content Protecting Location Based Queries
 
Live Matches , Streaming , Scores
Live Matches , Streaming , ScoresLive Matches , Streaming , Scores
Live Matches , Streaming , Scores
 
Indoor localization Leveraging Human Perception of Textual Signs
Indoor localization Leveraging Human Perception of Textual SignsIndoor localization Leveraging Human Perception of Textual Signs
Indoor localization Leveraging Human Perception of Textual Signs
 
A scalable server architecture for mobile presence services in social network...
A scalable server architecture for mobile presence services in social network...A scalable server architecture for mobile presence services in social network...
A scalable server architecture for mobile presence services in social network...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
 
JAVA 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for mob...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for mob...JAVA 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for mob...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for mob...
 
exploiting service similarity for privacy in location-based search queries
exploiting service similarity for privacy in location-based search queriesexploiting service similarity for privacy in location-based search queries
exploiting service similarity for privacy in location-based search queries
 
JPA1414 MOSES: Supporting and Enforcing Security Profiles on Smartphones
JPA1414  MOSES: Supporting and Enforcing Security Profiles on SmartphonesJPA1414  MOSES: Supporting and Enforcing Security Profiles on Smartphones
JPA1414 MOSES: Supporting and Enforcing Security Profiles on Smartphones
 
Moses supporting and enforcing security profiles on smartphones
Moses supporting and enforcing security profiles on smartphonesMoses supporting and enforcing security profiles on smartphones
Moses supporting and enforcing security profiles on smartphones
 
Ieee projects-2014-bulk-ieee-projects-2015-title-list-for-me-be-mphil-final-y...
Ieee projects-2014-bulk-ieee-projects-2015-title-list-for-me-be-mphil-final-y...Ieee projects-2014-bulk-ieee-projects-2015-title-list-for-me-be-mphil-final-y...
Ieee projects-2014-bulk-ieee-projects-2015-title-list-for-me-be-mphil-final-y...
 

More from IEEEFINALYEARSTUDENTSPROJECTS

More from IEEEFINALYEARSTUDENTSPROJECTS (11)

2014 2015 ieee dotnet projects globalsoft technologies
2014 2015 ieee dotnet projects globalsoft technologies2014 2015 ieee dotnet projects globalsoft technologies
2014 2015 ieee dotnet projects globalsoft technologies
 
2014 2015 ieee java projects globalsoft technologies
2014 2015 ieee java projects globalsoft technologies2014 2015 ieee java projects globalsoft technologies
2014 2015 ieee java projects globalsoft technologies
 
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Smartdc mobility prediction based a...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Smartdc mobility prediction based a...2014 IEEE DOTNET MOBILE COMPUTING PROJECT Smartdc mobility prediction based a...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Smartdc mobility prediction based a...
 
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Autonomous mobile-mesh-networks
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Autonomous mobile-mesh-networks2014 IEEE DOTNET MOBILE COMPUTING PROJECT Autonomous mobile-mesh-networks
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Autonomous mobile-mesh-networks
 
2014 IEEE DOTNET MOBILE COMPUTING PROJECT A qos-oriented-distributed-routing-...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT A qos-oriented-distributed-routing-...2014 IEEE DOTNET MOBILE COMPUTING PROJECT A qos-oriented-distributed-routing-...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT A qos-oriented-distributed-routing-...
 
2014 IEEE JAVA MOBILE COMPUTING PROJECT TokenMac a fair mac protocol for pass...
2014 IEEE JAVA MOBILE COMPUTING PROJECT TokenMac a fair mac protocol for pass...2014 IEEE JAVA MOBILE COMPUTING PROJECT TokenMac a fair mac protocol for pass...
2014 IEEE JAVA MOBILE COMPUTING PROJECT TokenMac a fair mac protocol for pass...
 
2014 IEEE JAVA MOBILE COMPUTING PROJECT Tag sense leveraging smartphones for ...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Tag sense leveraging smartphones for ...2014 IEEE JAVA MOBILE COMPUTING PROJECT Tag sense leveraging smartphones for ...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Tag sense leveraging smartphones for ...
 
2014 IEEE JAVA MOBILE COMPUTING PROJECT Energy optimum throughput and carrier...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Energy optimum throughput and carrier...2014 IEEE JAVA MOBILE COMPUTING PROJECT Energy optimum throughput and carrier...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Energy optimum throughput and carrier...
 
2014 IEEE JAVA MOBILE COMPUTING PROJECT Efficient and privacy aware data aggr...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Efficient and privacy aware data aggr...2014 IEEE JAVA MOBILE COMPUTING PROJECT Efficient and privacy aware data aggr...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Efficient and privacy aware data aggr...
 
2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...
 
2014 IEEE JAVA MOBILE COMPUTING PROJECT A low complexity algorithm for neighb...
2014 IEEE JAVA MOBILE COMPUTING PROJECT A low complexity algorithm for neighb...2014 IEEE JAVA MOBILE COMPUTING PROJECT A low complexity algorithm for neighb...
2014 IEEE JAVA MOBILE COMPUTING PROJECT A low complexity algorithm for neighb...
 

Recently uploaded

Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
chumtiyababu
 

Recently uploaded (20)

Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptx
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 

2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geosocial-applications

  • 1. GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmai l.com Preserving Location Privacy in Geosocial Applications ABSTRACT: Using geosocial applications, such as FourSquare, millions of people interact with their surroundings through their friends and their recommendations. Without adequate privacy protection, however, these systems can be easily misused, for example, to track users or target them for home invasion. In this paper, we introduce LocX, a novel alternative that provides significantly improvedlocation privacy without adding uncertainty into query results or relying on strong assumptions about server security. Our key insight is to apply secure user-specific, distance-preserving coordinate transformations to all location data shared with the server. The friends of a user share this user’s secrets so they can apply the same transformation. This allows all location queries to be evaluated correctly by the server, but our privacy mechanisms guarantee that servers are unable to see or infer the actual location data from the transformed data or from the data access. We show that LocX provides privacy even against a powerful adversary model, and we use prototype measurements to show that it provides privacy with very little performance overhead, making it suitable for today’s mobile devices.
  • 2. EXISTING SYSTEM: Existing systems have mainly taken three approaches to improving user privacy in geosocial systems:  Introducing uncertainty or error into location data.  Relying on trusted servers or intermediaries to apply anonymization to user identities and private data.  Relying on heavy-weight cryptographic or private information retrieval (PIR) techniques. None of them, however, have proven successful on current application platforms. Techniques using the first approach fall short because they require both users and application providers to introduce uncertainty into their data, which degrades the quality of application results returned to the user. In this approach, there is a fundamental tradeoff between the amount of error introduced into the time or location domain, and the amount of privacy granted to the user. Users dislike the loss of accuracy in results, and application providers have a natural disincentive to hide user data from themselves, which reduces their ability to monetize the data. The second approach relies on the trusted proxies or servers in the system to protect user privacy. This is a risky assumption, since private data can be exposed by either software bugs and configuration errors at the trusted servers or by malicious administrators. Finally, relying on heavy-weight cryptographic mechanisms to obtain provable privacy guarantees are too expensive to deploy on mobile devices and even on the servers in answering queries such as nearest neighbor and range queries.
  • 3. DISADVANTAGES OF EXISTING SYSTEM:  Location data privacy. The servers should not be able to view the content of data stored at a location.  This new functionality comes with significantly increased risks to personal privacy. PROPOSED SYSTEM: In this paper, we propose LocX(short for location to index mapping), a novel approach to achieving user privacy while maintaining full accuracy in location-based social applications (LBSAs from here on ward). Our insight is that many services do not need to resolve distance-based queries between arbitrary pairs of users, but only between friends interested in each other’s locations and data. Thus, we can partition location data based on users’ social groups, and then perform transformations on the location coordinates before storing them on untrusted servers. A user knows the transformation keys of all her friends, allowing her to transform her query into the virtual coordinate system that her friends use. Our coordinate transformations preserve distance metrics, allowing an application server to perform both point and nearest-neighbor queries correctly on transformed data. However, the transformation is secure, in that transformed values cannot be easily associated with real-world locations without a secret, which is only available to the members of the social group. Finally, transformations are efficient, in that they incur minimal overhead on the LBSAs. This makes the applications built on LocX lightweight and suitable for running on today’s mobile devices.
  • 4. ADVANTAGES OF PROPOSED SYSTEM:  Our goal is to support both query types in an efficient fashion, suitable for today’s mobile devices.  Flexibility to support point, circular range, and nearest-neighbor queries on location data.  Strong location privacy. The servers processing the data (and the administrators of these servers) should not be able to learn the history of locations that a user has visited. SYSTEM ARCHITECTURE: SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.
  • 5.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7.  Coding Language : ASP.net, C#.net  Tool : Visual Studio 2010  Database : SQL SERVER 2008 REFERENCE: Krishna P.N. Puttaswamy, Shiyuan Wang, Troy Steinbauer, Divyakant Agrawal, Fellow, IEEE, Amr El Abbadi, Christopher Kruegel, and Ben Y. Zhao,“Preserving Location Privacy in Geosocial Applications”, IEEE TRANSACTIONS ON MOBILE COMPUTING,VOL. 13,NO. 1, JANUARY 2014.