SlideShare a Scribd company logo
1 of 1
Download to read offline
TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE
IN A LOCATION PROOF UPDATING SYSTEM
ABSTRACT:
Today's location-sensitive service relies on user's mobile device to determine the current
location. This allows malicious users to access a restricted resource or provide bogus alibis by
cheating on their locations. To address this issue, we propose A Privacy-Preserving LocAtion
proof Updating System (APPLAUS) in which colocated Bluetooth enabled mobile devices
mutually generate location proofs and send updates to a location proof server. Periodically
changed pseudonyms are used by the mobile devices to protect source location privacy from
each other, and from the untrusted location proof server.
We develop user-centric location privacy model in which individual users evaluate their location
privacy levels and decide whether and when to accept the location proof requests. In order to
defend against colluding attacks, we also present betweenness ranking-based and correlation
clustering-based approaches for outlier detection. APPLAUS can be implemented with existing
network infrastructure, and can be easily deployed in Bluetooth enabled mobile devices with
little computation or power cost. Extensive experimental results show that APPLAUS can
effectively provide location proofs, significantly preserve the source location privacy, and
effectively detect colluding attacks.
ECWAY TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE
CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111
VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com

More Related Content

Similar to Privacy Preserving Location Proof System

Android toward privacy preserving and collusion resistance in a location pro...
Android  toward privacy preserving and collusion resistance in a location pro...Android  toward privacy preserving and collusion resistance in a location pro...
Android toward privacy preserving and collusion resistance in a location pro...Ecwaytechnoz
 
Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...Ecwayt
 
Android toward privacy preserving and collusion resistance in a location pro...
Android  toward privacy preserving and collusion resistance in a location pro...Android  toward privacy preserving and collusion resistance in a location pro...
Android toward privacy preserving and collusion resistance in a location pro...Ecwaytech
 
Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...Ecwaytech
 
Android toward privacy preserving and collusion resistance in a location pro...
Android  toward privacy preserving and collusion resistance in a location pro...Android  toward privacy preserving and collusion resistance in a location pro...
Android toward privacy preserving and collusion resistance in a location pro...Ecwaytechnoz
 
Android toward privacy preserving and collusion resistance in a location pro...
Android  toward privacy preserving and collusion resistance in a location pro...Android  toward privacy preserving and collusion resistance in a location pro...
Android toward privacy preserving and collusion resistance in a location pro...Ecwayt
 
Dotnet toward privacy preserving and collusion resistance in a location proo...
Dotnet  toward privacy preserving and collusion resistance in a location proo...Dotnet  toward privacy preserving and collusion resistance in a location proo...
Dotnet toward privacy preserving and collusion resistance in a location proo...Ecwaytech
 
Android toward privacy preserving and collusion resistance in a location pro...
Android  toward privacy preserving and collusion resistance in a location pro...Android  toward privacy preserving and collusion resistance in a location pro...
Android toward privacy preserving and collusion resistance in a location pro...Ecway2004
 
ON THE VULNERABILITIES OF VORONOI-BASED APPROACHES TO MOBILE SENSOR DEPLOYMENT
ON THE VULNERABILITIES OF VORONOI-BASED  APPROACHES TO MOBILE SENSOR DEPLOYMENTON THE VULNERABILITIES OF VORONOI-BASED  APPROACHES TO MOBILE SENSOR DEPLOYMENT
ON THE VULNERABILITIES OF VORONOI-BASED APPROACHES TO MOBILE SENSOR DEPLOYMENTNexgen Technology
 
Hiding in the mobile crowd location privacy through collaboration
Hiding in the mobile crowd location privacy through collaborationHiding in the mobile crowd location privacy through collaboration
Hiding in the mobile crowd location privacy through collaborationJPINFOTECH JAYAPRAKASH
 
Woral Seminar port
Woral Seminar portWoral Seminar port
Woral Seminar portAmar Raj
 
Woral seminar report
Woral seminar reportWoral seminar report
Woral seminar reportAmar Raj
 
Discovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networksDiscovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networksIEEEFINALYEARPROJECTS
 
JPD1435 Preserving Location Privacy in Geosocial Applications
JPD1435   Preserving Location Privacy in Geosocial ApplicationsJPD1435   Preserving Location Privacy in Geosocial Applications
JPD1435 Preserving Location Privacy in Geosocial Applicationschennaijp
 
Mobile Computing IEEE 2014 Projects
Mobile Computing IEEE 2014 ProjectsMobile Computing IEEE 2014 Projects
Mobile Computing IEEE 2014 ProjectsVijay Karan
 
The three tier security scheme in wireless
The three tier security scheme in wirelessThe three tier security scheme in wireless
The three tier security scheme in wirelessIMPULSE_TECHNOLOGY
 
Wireless Networks Projects, Network Security Projects, Networking Project
Wireless Networks Projects, Network Security Projects, Networking ProjectWireless Networks Projects, Network Security Projects, Networking Project
Wireless Networks Projects, Network Security Projects, Networking Projectncct
 
Polytechnic Projects
Polytechnic ProjectsPolytechnic Projects
Polytechnic Projectsncct
 

Similar to Privacy Preserving Location Proof System (20)

Android toward privacy preserving and collusion resistance in a location pro...
Android  toward privacy preserving and collusion resistance in a location pro...Android  toward privacy preserving and collusion resistance in a location pro...
Android toward privacy preserving and collusion resistance in a location pro...
 
Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...
 
Android toward privacy preserving and collusion resistance in a location pro...
Android  toward privacy preserving and collusion resistance in a location pro...Android  toward privacy preserving and collusion resistance in a location pro...
Android toward privacy preserving and collusion resistance in a location pro...
 
Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...
 
Android toward privacy preserving and collusion resistance in a location pro...
Android  toward privacy preserving and collusion resistance in a location pro...Android  toward privacy preserving and collusion resistance in a location pro...
Android toward privacy preserving and collusion resistance in a location pro...
 
Android toward privacy preserving and collusion resistance in a location pro...
Android  toward privacy preserving and collusion resistance in a location pro...Android  toward privacy preserving and collusion resistance in a location pro...
Android toward privacy preserving and collusion resistance in a location pro...
 
Dotnet toward privacy preserving and collusion resistance in a location proo...
Dotnet  toward privacy preserving and collusion resistance in a location proo...Dotnet  toward privacy preserving and collusion resistance in a location proo...
Dotnet toward privacy preserving and collusion resistance in a location proo...
 
Android toward privacy preserving and collusion resistance in a location pro...
Android  toward privacy preserving and collusion resistance in a location pro...Android  toward privacy preserving and collusion resistance in a location pro...
Android toward privacy preserving and collusion resistance in a location pro...
 
azd document
azd documentazd document
azd document
 
ON THE VULNERABILITIES OF VORONOI-BASED APPROACHES TO MOBILE SENSOR DEPLOYMENT
ON THE VULNERABILITIES OF VORONOI-BASED  APPROACHES TO MOBILE SENSOR DEPLOYMENTON THE VULNERABILITIES OF VORONOI-BASED  APPROACHES TO MOBILE SENSOR DEPLOYMENT
ON THE VULNERABILITIES OF VORONOI-BASED APPROACHES TO MOBILE SENSOR DEPLOYMENT
 
Hiding in the mobile crowd location privacy through collaboration
Hiding in the mobile crowd location privacy through collaborationHiding in the mobile crowd location privacy through collaboration
Hiding in the mobile crowd location privacy through collaboration
 
Location proof
Location proofLocation proof
Location proof
 
Woral Seminar port
Woral Seminar portWoral Seminar port
Woral Seminar port
 
Woral seminar report
Woral seminar reportWoral seminar report
Woral seminar report
 
Discovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networksDiscovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networks
 
JPD1435 Preserving Location Privacy in Geosocial Applications
JPD1435   Preserving Location Privacy in Geosocial ApplicationsJPD1435   Preserving Location Privacy in Geosocial Applications
JPD1435 Preserving Location Privacy in Geosocial Applications
 
Mobile Computing IEEE 2014 Projects
Mobile Computing IEEE 2014 ProjectsMobile Computing IEEE 2014 Projects
Mobile Computing IEEE 2014 Projects
 
The three tier security scheme in wireless
The three tier security scheme in wirelessThe three tier security scheme in wireless
The three tier security scheme in wireless
 
Wireless Networks Projects, Network Security Projects, Networking Project
Wireless Networks Projects, Network Security Projects, Networking ProjectWireless Networks Projects, Network Security Projects, Networking Project
Wireless Networks Projects, Network Security Projects, Networking Project
 
Polytechnic Projects
Polytechnic ProjectsPolytechnic Projects
Polytechnic Projects
 

Recently uploaded

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 

Recently uploaded (20)

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 

Privacy Preserving Location Proof System

  • 1. TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM ABSTRACT: Today's location-sensitive service relies on user's mobile device to determine the current location. This allows malicious users to access a restricted resource or provide bogus alibis by cheating on their locations. To address this issue, we propose A Privacy-Preserving LocAtion proof Updating System (APPLAUS) in which colocated Bluetooth enabled mobile devices mutually generate location proofs and send updates to a location proof server. Periodically changed pseudonyms are used by the mobile devices to protect source location privacy from each other, and from the untrusted location proof server. We develop user-centric location privacy model in which individual users evaluate their location privacy levels and decide whether and when to accept the location proof requests. In order to defend against colluding attacks, we also present betweenness ranking-based and correlation clustering-based approaches for outlier detection. APPLAUS can be implemented with existing network infrastructure, and can be easily deployed in Bluetooth enabled mobile devices with little computation or power cost. Extensive experimental results show that APPLAUS can effectively provide location proofs, significantly preserve the source location privacy, and effectively detect colluding attacks. ECWAY TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111 VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com