SlideShare a Scribd company logo
1 of 8
GLOBALSOFT TECHNOLOGIES 
IEEE PROJECTS & SOFTWARE DEVELOPMENTS 
IEEE PROJECTS & SOFTWARE DEVELOPMENTS 
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE 
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS 
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE 
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS 
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com 
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com 
Exploiting Service Similarity for Privacy in Location Based Search 
Queries 
ABSTRACT 
Location-based applications utilize the positioning capabilities of a 
mobile device to determine the current location of a user, and 
customize query results to include neighboring points of interests. 
However, location knowledge is often perceived as personal 
information. One of the immediate issues hindering the wide 
acceptance of location-based applications is the lack of appropriate 
methodologies that offer fine grain privacy controls to a user without
vastly affecting the usability of the service. While a number of privacy-preserving 
models and algorithms have taken shape in the past few 
years, there is an almost universal need to specify one’s privacy 
requirement without understanding its implications on the service 
quality. In this paper, we propose a user-centric locationbased 
service architecture where a user can observe the impact of location 
inaccuracy on the service accuracy before deciding the geo-coordinates 
to use in a query. We construct a local search application 
based on this architecture and demonstrate how meaningful 
information can be exchanged between the user and the service 
provider to allow the inference of contours depicting the change in 
query results across a geographic area. Results indicate the 
possibility of large default privacy regions (areas of no change in 
result set) in such applications. 
EXISTING SYSTEM: 
There are many kinds of location-sensitive applications. One category is 
location-based access control. Another class of location-sensitive 
applications requires users to provide past location proofs such as auto
insurance quote in which auto insurance companies offer discounts to 
drivers who can prove that they take safe routes during their daily 
commutes, police investigations in which detectives are interested in finding 
out if a person was at a murder scene at some time, and location-based social 
networking in which a user can ask for a location proof from the service 
requester and accepts the request only if the sender is able to present a valid 
location proof. The common theme across these location sensitive 
applications is that they offer a reward or benefit to users located in a certain 
geographical location at a certain time. Thus, users have the incentive to 
cheat on their locations. 
DISADVANTAGES OF EXISTING SYSTEM: 
· In the location-sensitive applications there is a lack of secure mechanism 
to provide their current or past locations to applications and services. 
· Although cellular service providers have tracking services that can help 
verify the locations of mobile users in real time, the accuracy is not good 
enough and the location history cannot be verified. 
PROPOSED SYSTEM:
We propose a user-centric locationbased service architecture 
where a user can observe the impact of location inaccuracy on the 
service accuracy before deciding the geo-coordinates to use in a 
query. We construct a local search application based on this 
architecture and demonstrate how meaningful information can be 
exchanged between the user and the service provider to allow the 
inference of contours depicting the change in query results across a 
geographic area. Results indicate the possibility of large default 
privacy regions (areas of no change in result set) in such 
applications. 
ADVANTAGES OF PROPOSED SYSTEM: 
We can effectively provide location proofs, significantly preserve the source 
location privacy, and effectively detect colluding attacks. Mobile local 
search is demonstrating an upward market trend.
Architecture: 
Modules: 
1. Admin Module. 
2. Service quality. 
3. A local search application 
4. User Module.
Admin Module: 
In this module admin can register and he can login. After login admin 
can accept user’s registration. Hera Admin will Check About User 
Information. If it is right he will accept. Then only users can login to 
website. Admin can see users list and delete users. Admin can accept user 
posts. Like information about ATMs, hotels, shopping malls and so on. He 
can delete user post information also. Admin Will See Users location. Where 
user will went and which time like that he can search about all users location 
information. And he can change his password. 
Service quality: 
Towards this end, prior research have led to the development of a 
number of privacy criteria, and algorithms for their optimal achievement. 
However, there is no known attempt to bring into view the mutual 
interactions between the accuracy of a location coordinate and the service 
quality from an application using those coordinates. 
A LOCAL SEARCH APPLICATION: 
Mobile local search is demonstrating an upward market trend, the gap 
with the desktop counterpart diminishing in the next three years, and then 
rising further2. Given the penetration of web-enabled handheld devices in
the consumer market, it has become exceedingly common for a user to 
instantly look up the information she seeks to find. 
User Module: 
In this module user can register. And he can login. After login user 
will enter his present location. Why because we don’t have any GPS in 
our system. That’s why we will give externally. Then it will redirect to 
maps page. It will show about your all locations in map. User can enter 
Details about local services. It will host after admin conformation into 
website. User can search about local services like atms, restarents and 
so on. User can see his total locations in map. He can update his profile 
picture. He can change his password. 
Hardware Requirements: 
• System : Pentium IV 2.4 GHz. 
• Hard Disk : 40 GB. 
• Floppy Drive : 1.44 Mb. 
• Monitor : 14’ Colour Monitor. 
• Mouse : Optical Mouse. 
• Ram : 512 Mb. 
• Keyboard : 101 Keyboards.
Software Requirements: 
• Operating system : Windows 7 32 bit. 
• Coding Language : ASP.Net 4.0 with C# 
• Data Base : SQL Server 2008.

More Related Content

Viewers also liked

Shapter - Journée de l'innovation à Télécom ParisTech 2013
Shapter - Journée de l'innovation à Télécom ParisTech 2013Shapter - Journée de l'innovation à Télécom ParisTech 2013
Shapter - Journée de l'innovation à Télécom ParisTech 2013
Emeline Parizel
 
Totalitarian regimes
Totalitarian regimesTotalitarian regimes
Totalitarian regimes
julienbardoux
 
Tract RéUnion Public Mad Du 30 Octobre 2009
Tract RéUnion Public Mad Du 30 Octobre 2009Tract RéUnion Public Mad Du 30 Octobre 2009
Tract RéUnion Public Mad Du 30 Octobre 2009
Francois Bardel
 
Les utopies sanglantes du x xe siècle
Les utopies sanglantes du x xe siècleLes utopies sanglantes du x xe siècle
Les utopies sanglantes du x xe siècle
noctambule
 
[Group 6] rap and race
[Group 6] rap and race[Group 6] rap and race
[Group 6] rap and race
Duy Đức
 
Les invités politiques de France Télévisions
Les invités politiques de France TélévisionsLes invités politiques de France Télévisions
Les invités politiques de France Télévisions
France Télévisions
 

Viewers also liked (20)

La Fondation Raoul Follereau, riche à millions
La Fondation Raoul Follereau, riche à millionsLa Fondation Raoul Follereau, riche à millions
La Fondation Raoul Follereau, riche à millions
 
Irb france-2013
Irb france-2013Irb france-2013
Irb france-2013
 
Regulatory bodies
Regulatory bodiesRegulatory bodies
Regulatory bodies
 
Francois hollande president normal - tome 4
Francois hollande   president normal - tome 4Francois hollande   president normal - tome 4
Francois hollande president normal - tome 4
 
NB
NBNB
NB
 
ACHAT APPARTEMENT NEUILLY STANDING VUE DEGAGEE SOLEIL
ACHAT APPARTEMENT NEUILLY STANDING VUE DEGAGEE SOLEILACHAT APPARTEMENT NEUILLY STANDING VUE DEGAGEE SOLEIL
ACHAT APPARTEMENT NEUILLY STANDING VUE DEGAGEE SOLEIL
 
Silurus glanis reviews in fish biology
Silurus glanis reviews in fish biologySilurus glanis reviews in fish biology
Silurus glanis reviews in fish biology
 
Cloud computing 2
Cloud computing 2Cloud computing 2
Cloud computing 2
 
50120130405030
5012013040503050120130405030
50120130405030
 
Shapter - Journée de l'innovation à Télécom ParisTech 2013
Shapter - Journée de l'innovation à Télécom ParisTech 2013Shapter - Journée de l'innovation à Télécom ParisTech 2013
Shapter - Journée de l'innovation à Télécom ParisTech 2013
 
Totalitarian regimes
Totalitarian regimesTotalitarian regimes
Totalitarian regimes
 
Tract RéUnion Public Mad Du 30 Octobre 2009
Tract RéUnion Public Mad Du 30 Octobre 2009Tract RéUnion Public Mad Du 30 Octobre 2009
Tract RéUnion Public Mad Du 30 Octobre 2009
 
Primera fase desplegament FO a Badalona
Primera fase desplegament FO a BadalonaPrimera fase desplegament FO a Badalona
Primera fase desplegament FO a Badalona
 
Aprendamos a reciclar papel
Aprendamos a                                              reciclar papelAprendamos a                                              reciclar papel
Aprendamos a reciclar papel
 
Les utopies sanglantes du x xe siècle
Les utopies sanglantes du x xe siècleLes utopies sanglantes du x xe siècle
Les utopies sanglantes du x xe siècle
 
N°24 Juin 2006
N°24 Juin 2006N°24 Juin 2006
N°24 Juin 2006
 
Info Prime 090309 A
Info Prime 090309 AInfo Prime 090309 A
Info Prime 090309 A
 
Ch4201557563
Ch4201557563Ch4201557563
Ch4201557563
 
[Group 6] rap and race
[Group 6] rap and race[Group 6] rap and race
[Group 6] rap and race
 
Les invités politiques de France Télévisions
Les invités politiques de France TélévisionsLes invités politiques de France Télévisions
Les invités politiques de France Télévisions
 

More from IEEEGLOBALSOFTSTUDENTSPROJECTS

More from IEEEGLOBALSOFTSTUDENTSPROJECTS (20)

2014 2015 ieee dotnet projects globalsoft technologies
2014 2015 ieee dotnet projects globalsoft technologies2014 2015 ieee dotnet projects globalsoft technologies
2014 2015 ieee dotnet projects globalsoft technologies
 
2014 2015 ieee java projects globalsoft technologies
2014 2015 ieee java projects globalsoft technologies2014 2015 ieee java projects globalsoft technologies
2014 2015 ieee java projects globalsoft technologies
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Signature searching in a networ...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Signature searching in a networ...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Signature searching in a networ...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Signature searching in a networ...
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT On social delay tolerant networ...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT On social delay tolerant networ...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT On social delay tolerant networ...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT On social delay tolerant networ...
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Multicast capacity-in-manet-wit...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Multicast capacity-in-manet-wit...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Multicast capacity-in-manet-wit...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Multicast capacity-in-manet-wit...
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Efficient data-query-in-intermi...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Efficient data-query-in-intermi...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Efficient data-query-in-intermi...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Efficient data-query-in-intermi...
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Trajectory improves data delivery...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Trajectory improves data delivery...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Trajectory improves data delivery...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Trajectory improves data delivery...
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Tracon interference aware schedul...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Tracon interference aware schedul...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Tracon interference aware schedul...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Tracon interference aware schedul...
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The design-and-evaluation-of-an-i...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The design-and-evaluation-of-an-i...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The design-and-evaluation-of-an-i...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The design-and-evaluation-of-an-i...
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The client assignment problem for...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The client assignment problem for...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The client assignment problem for...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The client assignment problem for...
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Streaming applications on bus bas...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Streaming applications on bus bas...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Streaming applications on bus bas...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Streaming applications on bus bas...
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Securing brokerless publish subsc...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Securing brokerless publish subsc...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Securing brokerless publish subsc...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Securing brokerless publish subsc...
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Secure outsourced-attribute-based...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Secure outsourced-attribute-based...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Secure outsourced-attribute-based...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Secure outsourced-attribute-based...
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Rre a-game-theoretic-intrusion-re...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Rre a-game-theoretic-intrusion-re...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Rre a-game-theoretic-intrusion-re...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Rre a-game-theoretic-intrusion-re...
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Peer assisted vod systems an effi...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Peer assisted vod systems an effi...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Peer assisted vod systems an effi...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Peer assisted vod systems an effi...
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On social delay tolerant networki...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On social delay tolerant networki...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On social delay tolerant networki...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On social delay tolerant networki...
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Constructing load balanced data a...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Constructing load balanced data a...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Constructing load balanced data a...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Constructing load balanced data a...
 

Recently uploaded

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
 

Recently uploaded (20)

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 

2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Exploiting service similarity for privacy in location based search queries

  • 1. GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com Exploiting Service Similarity for Privacy in Location Based Search Queries ABSTRACT Location-based applications utilize the positioning capabilities of a mobile device to determine the current location of a user, and customize query results to include neighboring points of interests. However, location knowledge is often perceived as personal information. One of the immediate issues hindering the wide acceptance of location-based applications is the lack of appropriate methodologies that offer fine grain privacy controls to a user without
  • 2. vastly affecting the usability of the service. While a number of privacy-preserving models and algorithms have taken shape in the past few years, there is an almost universal need to specify one’s privacy requirement without understanding its implications on the service quality. In this paper, we propose a user-centric locationbased service architecture where a user can observe the impact of location inaccuracy on the service accuracy before deciding the geo-coordinates to use in a query. We construct a local search application based on this architecture and demonstrate how meaningful information can be exchanged between the user and the service provider to allow the inference of contours depicting the change in query results across a geographic area. Results indicate the possibility of large default privacy regions (areas of no change in result set) in such applications. EXISTING SYSTEM: There are many kinds of location-sensitive applications. One category is location-based access control. Another class of location-sensitive applications requires users to provide past location proofs such as auto
  • 3. insurance quote in which auto insurance companies offer discounts to drivers who can prove that they take safe routes during their daily commutes, police investigations in which detectives are interested in finding out if a person was at a murder scene at some time, and location-based social networking in which a user can ask for a location proof from the service requester and accepts the request only if the sender is able to present a valid location proof. The common theme across these location sensitive applications is that they offer a reward or benefit to users located in a certain geographical location at a certain time. Thus, users have the incentive to cheat on their locations. DISADVANTAGES OF EXISTING SYSTEM: · In the location-sensitive applications there is a lack of secure mechanism to provide their current or past locations to applications and services. · Although cellular service providers have tracking services that can help verify the locations of mobile users in real time, the accuracy is not good enough and the location history cannot be verified. PROPOSED SYSTEM:
  • 4. We propose a user-centric locationbased service architecture where a user can observe the impact of location inaccuracy on the service accuracy before deciding the geo-coordinates to use in a query. We construct a local search application based on this architecture and demonstrate how meaningful information can be exchanged between the user and the service provider to allow the inference of contours depicting the change in query results across a geographic area. Results indicate the possibility of large default privacy regions (areas of no change in result set) in such applications. ADVANTAGES OF PROPOSED SYSTEM: We can effectively provide location proofs, significantly preserve the source location privacy, and effectively detect colluding attacks. Mobile local search is demonstrating an upward market trend.
  • 5. Architecture: Modules: 1. Admin Module. 2. Service quality. 3. A local search application 4. User Module.
  • 6. Admin Module: In this module admin can register and he can login. After login admin can accept user’s registration. Hera Admin will Check About User Information. If it is right he will accept. Then only users can login to website. Admin can see users list and delete users. Admin can accept user posts. Like information about ATMs, hotels, shopping malls and so on. He can delete user post information also. Admin Will See Users location. Where user will went and which time like that he can search about all users location information. And he can change his password. Service quality: Towards this end, prior research have led to the development of a number of privacy criteria, and algorithms for their optimal achievement. However, there is no known attempt to bring into view the mutual interactions between the accuracy of a location coordinate and the service quality from an application using those coordinates. A LOCAL SEARCH APPLICATION: Mobile local search is demonstrating an upward market trend, the gap with the desktop counterpart diminishing in the next three years, and then rising further2. Given the penetration of web-enabled handheld devices in
  • 7. the consumer market, it has become exceedingly common for a user to instantly look up the information she seeks to find. User Module: In this module user can register. And he can login. After login user will enter his present location. Why because we don’t have any GPS in our system. That’s why we will give externally. Then it will redirect to maps page. It will show about your all locations in map. User can enter Details about local services. It will host after admin conformation into website. User can search about local services like atms, restarents and so on. User can see his total locations in map. He can update his profile picture. He can change his password. Hardware Requirements: • System : Pentium IV 2.4 GHz. • Hard Disk : 40 GB. • Floppy Drive : 1.44 Mb. • Monitor : 14’ Colour Monitor. • Mouse : Optical Mouse. • Ram : 512 Mb. • Keyboard : 101 Keyboards.
  • 8. Software Requirements: • Operating system : Windows 7 32 bit. • Coding Language : ASP.Net 4.0 with C# • Data Base : SQL Server 2008.