JAVA IEEE 2013 MOBILECOMPUTING PROJECT Toward privacy preserving and collusion resistance in a location proof updating system
Upcoming SlideShare
Loading in...5
×
 

JAVA IEEE 2013 MOBILECOMPUTING PROJECT Toward privacy preserving and collusion resistance in a location proof updating system

on

  • 301 views

To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org

To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org

Statistics

Views

Total Views
301
Views on SlideShare
301
Embed Views
0

Actions

Likes
0
Downloads
3
Comments
0

0 Embeds 0

No embeds

Accessibility

Upload Details

Uploaded via as Microsoft Word

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    JAVA IEEE 2013 MOBILECOMPUTING PROJECT Toward privacy preserving and collusion resistance in a location proof updating system JAVA IEEE 2013 MOBILECOMPUTING PROJECT Toward privacy preserving and collusion resistance in a location proof updating system Document Transcript

    • GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System ABSTRACT: Today’s location-sensitive service relies on user’s mobile device to determine the current location. This allows malicious users to access a restricted resource or provide bogus alibis by cheating on their locations. To address this issue, we propose A Privacy-Preserving Location proof Updating System (APPLAUS) in which co-located Bluetooth enabled mobile devices mutually generate location proofs and send updates to a location proof server. Periodically changed pseudonyms are used by the mobile devices to protect source location privacy from each other, and from the untrusted location proof server. We also develop user-centric location privacy model in which individual users evaluate their location privacy levels and decide whether and when to accept the location proof requests. In order to defend against colluding attacks, we also present between’s ranking-based and correlation clustering-based approaches for outlier detection. APPLAUS can be implemented with existing network infrastructure, and can be easily deployed in Bluetooth enabled mobile devices with little computation or power cost. Extensive experimental results show that APPLAUS can effectively provide location
    • proofs, significantly preserve the source location privacy, and effectively detect colluding attacks. EXISTING SYSTEM: There are many kinds of location-sensitive applications. One category is location-based access control. For example, a hospital may allow patient information access only when doctors or nurses can prove that they are in a particular room of the hospital. Another class of locationsensitive applications requires users to provide past location proofs such as auto insurance quote in which auto insurance companies offer discounts to drivers who can prove that they take safe routes during their daily commutes, police investigations in which detectives are interested in finding out if a person was at a murder scene at some time, and location-based social networking in which a user can ask for a location proof from the service requester and accepts the request only if the sender is able to present a valid location proof. The common theme across these location sensitive applications is that they offer a reward or benefit to users located in a certain geographical location at a certain time. Thus, users have the incentive to cheat on their locations. DISADVANTAGES OF EXISTING SYSTEM: In the location-sensitive applications there is a lack of secure mechanism to provide their current or past locations to applications and services. Although cellular service providers have tracking services that can help verify the locations of mobile users in real time, the accuracy is not good enough and the location history cannot be verified.
    • PROPOSED SYSTEM: In this paper, we propose A Privacy-Preserving Location proof Updating System (APPLAUS), which does not rely on the wide deployment of network infrastructure or the expensive trusted computing module. In APPLAUS, Bluetooth enabled mobile devices in range mutually generate location proofs, which are uploaded to an untrusted location proof server that can verify the trust level of each location proof. An authorized verifier can query and retrieve location proofs from the server. Moreover, our location proof system guarantees user location privacy from every party. More specifically, we use statistically updated pseudonyms at each mobile device to protect location privacy from each other, and from the untrusted location proof server. We develop a user-centric location privacy model in which individual users evaluate their location privacy levels in real time and decide whether and when to accept a location proof request. In order to defend against colluding attacks, we also present between’s ranking-based and correlation clustering-based approaches for outlier detection. ADVANTAGES OF PROPOSED SYSTEM: APPLAUS can effectively provide location proofs, significantly preserve the source location privacy, and effectively detect colluding attacks. SYSTEM ARCHITECTURE:
    • SYSTEM PROTOCOL: ALGORITHMS USED: Algorithm 1. Location Proof Update Scheduling for the prover SYSTEM CONFIGURATION:HARDWARE CONFIGURATION: Processor  Speed - Pentium –IV 1.1 Ghz  RAM - 256 MB(min)  Hard Disk - 20 GB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - SVGA SOFTWARE CONFIGURATION:-  Operating System : Windows XP  Programming Language : JAVA/J2EE.  Java Version : JDK 1.6 & above.  Database : MYSQL
    • REFERENCE: Zhichao Zhu, Student Member, IEEE, and Guohong Cao, Fellow, IEEE “Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System”- IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 12, NO. 1, JANUARY 2013.