SlideShare a Scribd company logo
1 of 1
Download to read offline
ECWAY TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE
CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111
VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE
IN A LOCATION PROOF UPDATING SYSTEM
ABSTRACT:
Today's location-sensitive service relies on user's mobile device to determine the current
location. This allows malicious users to access a restricted resource or provide bogus alibis by
cheating on their locations. To address this issue, we propose A Privacy-Preserving LocAtion
proof Updating System (APPLAUS) in which colocated Bluetooth enabled mobile devices
mutually generate location proofs and send updates to a location proof server. Periodically
changed pseudonyms are used by the mobile devices to protect source location privacy from
each other, and from the untrusted location proof server.

We develop user-centric location privacy model in which individual users evaluate their location
privacy levels and decide whether and when to accept the location proof requests. In order to
defend against colluding attacks, we also present betweenness ranking-based and correlation
clustering-based approaches for outlier detection. APPLAUS can be implemented with existing
network infrastructure, and can be easily deployed in Bluetooth enabled mobile devices with
little computation or power cost. Extensive experimental results show that APPLAUS can
effectively provide location proofs, significantly preserve the source location privacy, and
effectively detect colluding attacks.

More Related Content

Viewers also liked

Toward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networksToward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networksEcwaytech
 
Zigbee device access control and reliable data transmission in zigbee based h...
Zigbee device access control and reliable data transmission in zigbee based h...Zigbee device access control and reliable data transmission in zigbee based h...
Zigbee device access control and reliable data transmission in zigbee based h...Ecwaytech
 
On centralized and localized approximation algorithms for interference aware ...
On centralized and localized approximation algorithms for interference aware ...On centralized and localized approximation algorithms for interference aware ...
On centralized and localized approximation algorithms for interference aware ...Ecwaytech
 
Voice operated remote for tv
Voice operated remote for tvVoice operated remote for tv
Voice operated remote for tvEcwaytech
 
Vampire attacks draining life from wireless ad hoc sensor networks
Vampire attacks draining life from wireless ad hoc sensor networksVampire attacks draining life from wireless ad hoc sensor networks
Vampire attacks draining life from wireless ad hoc sensor networksEcwaytech
 
Empowering Healthcare Professionals to Use Databases: Design and User Study o...
Empowering Healthcare Professionals to Use Databases: Design and User Study o...Empowering Healthcare Professionals to Use Databases: Design and User Study o...
Empowering Healthcare Professionals to Use Databases: Design and User Study o...The Children's Hospital of Philadelphia
 
Vehicles tracking and braking system in traffic
Vehicles tracking and braking system in trafficVehicles tracking and braking system in traffic
Vehicles tracking and braking system in trafficEcwaytech
 
Zero no load power acdc adapter for electronic equipment with embed battery
Zero no load power acdc adapter for electronic equipment with embed batteryZero no load power acdc adapter for electronic equipment with embed battery
Zero no load power acdc adapter for electronic equipment with embed batteryEcwaytech
 
Topology abstraction service for ip vp ns
Topology abstraction service for ip vp nsTopology abstraction service for ip vp ns
Topology abstraction service for ip vp nsEcwaytech
 
Zigbee and atmega32 based wireless digital control and monitoring system for ...
Zigbee and atmega32 based wireless digital control and monitoring system for ...Zigbee and atmega32 based wireless digital control and monitoring system for ...
Zigbee and atmega32 based wireless digital control and monitoring system for ...Ecwaytech
 
Triple loop modulation (tlm) for high reliability and efficiency in a power f...
Triple loop modulation (tlm) for high reliability and efficiency in a power f...Triple loop modulation (tlm) for high reliability and efficiency in a power f...
Triple loop modulation (tlm) for high reliability and efficiency in a power f...Ecwaytech
 
Unterminated small signal behavioral model of dc–dc converters
Unterminated small signal behavioral model of dc–dc convertersUnterminated small signal behavioral model of dc–dc converters
Unterminated small signal behavioral model of dc–dc convertersEcwaytech
 
Towards the implementation of iot for environmental condition monitoring in h...
Towards the implementation of iot for environmental condition monitoring in h...Towards the implementation of iot for environmental condition monitoring in h...
Towards the implementation of iot for environmental condition monitoring in h...Ecwaytech
 
Vehicle gas detection with automatic safety warning system using gsm
Vehicle gas detection with automatic safety warning system using gsmVehicle gas detection with automatic safety warning system using gsm
Vehicle gas detection with automatic safety warning system using gsmEcwaytech
 
Wireless access control system based on ieee 802.15.4
Wireless access control system based on ieee 802.15.4Wireless access control system based on ieee 802.15.4
Wireless access control system based on ieee 802.15.4Ecwaytech
 
Tongue motion controlled wheel chair
Tongue motion controlled wheel chairTongue motion controlled wheel chair
Tongue motion controlled wheel chairEcwaytech
 
Towards the implementation of io t for environmental condition monitoring in ...
Towards the implementation of io t for environmental condition monitoring in ...Towards the implementation of io t for environmental condition monitoring in ...
Towards the implementation of io t for environmental condition monitoring in ...Ecwaytech
 
Teenage pregnancy in Sierra Leone
Teenage pregnancy in Sierra LeoneTeenage pregnancy in Sierra Leone
Teenage pregnancy in Sierra LeoneKhadi Mansaray
 
Wireless sensor network for multi storey building design and implementation
Wireless sensor network for multi storey building design and implementationWireless sensor network for multi storey building design and implementation
Wireless sensor network for multi storey building design and implementationEcwaytech
 

Viewers also liked (19)

Toward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networksToward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networks
 
Zigbee device access control and reliable data transmission in zigbee based h...
Zigbee device access control and reliable data transmission in zigbee based h...Zigbee device access control and reliable data transmission in zigbee based h...
Zigbee device access control and reliable data transmission in zigbee based h...
 
On centralized and localized approximation algorithms for interference aware ...
On centralized and localized approximation algorithms for interference aware ...On centralized and localized approximation algorithms for interference aware ...
On centralized and localized approximation algorithms for interference aware ...
 
Voice operated remote for tv
Voice operated remote for tvVoice operated remote for tv
Voice operated remote for tv
 
Vampire attacks draining life from wireless ad hoc sensor networks
Vampire attacks draining life from wireless ad hoc sensor networksVampire attacks draining life from wireless ad hoc sensor networks
Vampire attacks draining life from wireless ad hoc sensor networks
 
Empowering Healthcare Professionals to Use Databases: Design and User Study o...
Empowering Healthcare Professionals to Use Databases: Design and User Study o...Empowering Healthcare Professionals to Use Databases: Design and User Study o...
Empowering Healthcare Professionals to Use Databases: Design and User Study o...
 
Vehicles tracking and braking system in traffic
Vehicles tracking and braking system in trafficVehicles tracking and braking system in traffic
Vehicles tracking and braking system in traffic
 
Zero no load power acdc adapter for electronic equipment with embed battery
Zero no load power acdc adapter for electronic equipment with embed batteryZero no load power acdc adapter for electronic equipment with embed battery
Zero no load power acdc adapter for electronic equipment with embed battery
 
Topology abstraction service for ip vp ns
Topology abstraction service for ip vp nsTopology abstraction service for ip vp ns
Topology abstraction service for ip vp ns
 
Zigbee and atmega32 based wireless digital control and monitoring system for ...
Zigbee and atmega32 based wireless digital control and monitoring system for ...Zigbee and atmega32 based wireless digital control and monitoring system for ...
Zigbee and atmega32 based wireless digital control and monitoring system for ...
 
Triple loop modulation (tlm) for high reliability and efficiency in a power f...
Triple loop modulation (tlm) for high reliability and efficiency in a power f...Triple loop modulation (tlm) for high reliability and efficiency in a power f...
Triple loop modulation (tlm) for high reliability and efficiency in a power f...
 
Unterminated small signal behavioral model of dc–dc converters
Unterminated small signal behavioral model of dc–dc convertersUnterminated small signal behavioral model of dc–dc converters
Unterminated small signal behavioral model of dc–dc converters
 
Towards the implementation of iot for environmental condition monitoring in h...
Towards the implementation of iot for environmental condition monitoring in h...Towards the implementation of iot for environmental condition monitoring in h...
Towards the implementation of iot for environmental condition monitoring in h...
 
Vehicle gas detection with automatic safety warning system using gsm
Vehicle gas detection with automatic safety warning system using gsmVehicle gas detection with automatic safety warning system using gsm
Vehicle gas detection with automatic safety warning system using gsm
 
Wireless access control system based on ieee 802.15.4
Wireless access control system based on ieee 802.15.4Wireless access control system based on ieee 802.15.4
Wireless access control system based on ieee 802.15.4
 
Tongue motion controlled wheel chair
Tongue motion controlled wheel chairTongue motion controlled wheel chair
Tongue motion controlled wheel chair
 
Towards the implementation of io t for environmental condition monitoring in ...
Towards the implementation of io t for environmental condition monitoring in ...Towards the implementation of io t for environmental condition monitoring in ...
Towards the implementation of io t for environmental condition monitoring in ...
 
Teenage pregnancy in Sierra Leone
Teenage pregnancy in Sierra LeoneTeenage pregnancy in Sierra Leone
Teenage pregnancy in Sierra Leone
 
Wireless sensor network for multi storey building design and implementation
Wireless sensor network for multi storey building design and implementationWireless sensor network for multi storey building design and implementation
Wireless sensor network for multi storey building design and implementation
 

Similar to PPCLU system preserves privacy and resists collusion

Java toward privacy preserving and collusion resistance in a location proof ...
Java  toward privacy preserving and collusion resistance in a location proof ...Java  toward privacy preserving and collusion resistance in a location proof ...
Java toward privacy preserving and collusion resistance in a location proof ...ecwayerode
 
Android toward privacy preserving and collusion resistance in a location pro...
Android  toward privacy preserving and collusion resistance in a location pro...Android  toward privacy preserving and collusion resistance in a location pro...
Android toward privacy preserving and collusion resistance in a location pro...ecway
 
Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...Ecway Technologies
 
Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...Ecway Technologies
 
Android toward privacy preserving and collusion resistance in a location pro...
Android  toward privacy preserving and collusion resistance in a location pro...Android  toward privacy preserving and collusion resistance in a location pro...
Android toward privacy preserving and collusion resistance in a location pro...ecway
 
Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...JPINFOTECH JAYAPRAKASH
 
Android ssd a robust rf location fingerprint addressing mobile devices’ hete...
Android  ssd a robust rf location fingerprint addressing mobile devices’ hete...Android  ssd a robust rf location fingerprint addressing mobile devices’ hete...
Android ssd a robust rf location fingerprint addressing mobile devices’ hete...Ecway2004
 
Ssd a robust rf location fingerprint addressing mobile devices’ heterogeneity
Ssd a robust rf location fingerprint addressing mobile devices’ heterogeneitySsd a robust rf location fingerprint addressing mobile devices’ heterogeneity
Ssd a robust rf location fingerprint addressing mobile devices’ heterogeneityEcwayt
 
Android ssd a robust rf location fingerprint addressing mobile devices’ hete...
Android  ssd a robust rf location fingerprint addressing mobile devices’ hete...Android  ssd a robust rf location fingerprint addressing mobile devices’ hete...
Android ssd a robust rf location fingerprint addressing mobile devices’ hete...Ecwaytech
 
Android ssd a robust rf location fingerprint addressing mobile devices’ hete...
Android  ssd a robust rf location fingerprint addressing mobile devices’ hete...Android  ssd a robust rf location fingerprint addressing mobile devices’ hete...
Android ssd a robust rf location fingerprint addressing mobile devices’ hete...Ecway2004
 
Android ssd a robust rf location fingerprint addressing mobile devices’ hete...
Android  ssd a robust rf location fingerprint addressing mobile devices’ hete...Android  ssd a robust rf location fingerprint addressing mobile devices’ hete...
Android ssd a robust rf location fingerprint addressing mobile devices’ hete...Ecwaytechnoz
 
Android ssd a robust rf location fingerprint addressing mobile devices’ hete...
Android  ssd a robust rf location fingerprint addressing mobile devices’ hete...Android  ssd a robust rf location fingerprint addressing mobile devices’ hete...
Android ssd a robust rf location fingerprint addressing mobile devices’ hete...Ecwaytechnoz
 
Android ssd a robust rf location fingerprint addressing mobile devices’ hete...
Android  ssd a robust rf location fingerprint addressing mobile devices’ hete...Android  ssd a robust rf location fingerprint addressing mobile devices’ hete...
Android ssd a robust rf location fingerprint addressing mobile devices’ hete...Ecwaytechnoz
 
Android ssd a robust rf location fingerprint addressing mobile devices’ hete...
Android  ssd a robust rf location fingerprint addressing mobile devices’ hete...Android  ssd a robust rf location fingerprint addressing mobile devices’ hete...
Android ssd a robust rf location fingerprint addressing mobile devices’ hete...Ecwayt
 
Dotnet ssd a robust rf location fingerprint addressing mobile devices’ heter...
Dotnet  ssd a robust rf location fingerprint addressing mobile devices’ heter...Dotnet  ssd a robust rf location fingerprint addressing mobile devices’ heter...
Dotnet ssd a robust rf location fingerprint addressing mobile devices’ heter...Ecwaytech
 
Android ssd a robust rf location fingerprint addressing mobile devices’ hete...
Android  ssd a robust rf location fingerprint addressing mobile devices’ hete...Android  ssd a robust rf location fingerprint addressing mobile devices’ hete...
Android ssd a robust rf location fingerprint addressing mobile devices’ hete...Ecwayt
 
Dotnet cluster-based certificate revocation with vindication capability for ...
Dotnet  cluster-based certificate revocation with vindication capability for ...Dotnet  cluster-based certificate revocation with vindication capability for ...
Dotnet cluster-based certificate revocation with vindication capability for ...Ecwayt
 
Cluster based certificate revocation with vindication capability for mobile a...
Cluster based certificate revocation with vindication capability for mobile a...Cluster based certificate revocation with vindication capability for mobile a...
Cluster based certificate revocation with vindication capability for mobile a...ecwayprojects
 
Dotnet cluster-based certificate revocation with vindication capability for ...
Dotnet  cluster-based certificate revocation with vindication capability for ...Dotnet  cluster-based certificate revocation with vindication capability for ...
Dotnet cluster-based certificate revocation with vindication capability for ...Ecwaytech
 
Android a scalable server architecture for mobile presence services in socia...
Android  a scalable server architecture for mobile presence services in socia...Android  a scalable server architecture for mobile presence services in socia...
Android a scalable server architecture for mobile presence services in socia...ecway
 

Similar to PPCLU system preserves privacy and resists collusion (20)

Java toward privacy preserving and collusion resistance in a location proof ...
Java  toward privacy preserving and collusion resistance in a location proof ...Java  toward privacy preserving and collusion resistance in a location proof ...
Java toward privacy preserving and collusion resistance in a location proof ...
 
Android toward privacy preserving and collusion resistance in a location pro...
Android  toward privacy preserving and collusion resistance in a location pro...Android  toward privacy preserving and collusion resistance in a location pro...
Android toward privacy preserving and collusion resistance in a location pro...
 
Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...
 
Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...
 
Android toward privacy preserving and collusion resistance in a location pro...
Android  toward privacy preserving and collusion resistance in a location pro...Android  toward privacy preserving and collusion resistance in a location pro...
Android toward privacy preserving and collusion resistance in a location pro...
 
Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...
 
Android ssd a robust rf location fingerprint addressing mobile devices’ hete...
Android  ssd a robust rf location fingerprint addressing mobile devices’ hete...Android  ssd a robust rf location fingerprint addressing mobile devices’ hete...
Android ssd a robust rf location fingerprint addressing mobile devices’ hete...
 
Ssd a robust rf location fingerprint addressing mobile devices’ heterogeneity
Ssd a robust rf location fingerprint addressing mobile devices’ heterogeneitySsd a robust rf location fingerprint addressing mobile devices’ heterogeneity
Ssd a robust rf location fingerprint addressing mobile devices’ heterogeneity
 
Android ssd a robust rf location fingerprint addressing mobile devices’ hete...
Android  ssd a robust rf location fingerprint addressing mobile devices’ hete...Android  ssd a robust rf location fingerprint addressing mobile devices’ hete...
Android ssd a robust rf location fingerprint addressing mobile devices’ hete...
 
Android ssd a robust rf location fingerprint addressing mobile devices’ hete...
Android  ssd a robust rf location fingerprint addressing mobile devices’ hete...Android  ssd a robust rf location fingerprint addressing mobile devices’ hete...
Android ssd a robust rf location fingerprint addressing mobile devices’ hete...
 
Android ssd a robust rf location fingerprint addressing mobile devices’ hete...
Android  ssd a robust rf location fingerprint addressing mobile devices’ hete...Android  ssd a robust rf location fingerprint addressing mobile devices’ hete...
Android ssd a robust rf location fingerprint addressing mobile devices’ hete...
 
Android ssd a robust rf location fingerprint addressing mobile devices’ hete...
Android  ssd a robust rf location fingerprint addressing mobile devices’ hete...Android  ssd a robust rf location fingerprint addressing mobile devices’ hete...
Android ssd a robust rf location fingerprint addressing mobile devices’ hete...
 
Android ssd a robust rf location fingerprint addressing mobile devices’ hete...
Android  ssd a robust rf location fingerprint addressing mobile devices’ hete...Android  ssd a robust rf location fingerprint addressing mobile devices’ hete...
Android ssd a robust rf location fingerprint addressing mobile devices’ hete...
 
Android ssd a robust rf location fingerprint addressing mobile devices’ hete...
Android  ssd a robust rf location fingerprint addressing mobile devices’ hete...Android  ssd a robust rf location fingerprint addressing mobile devices’ hete...
Android ssd a robust rf location fingerprint addressing mobile devices’ hete...
 
Dotnet ssd a robust rf location fingerprint addressing mobile devices’ heter...
Dotnet  ssd a robust rf location fingerprint addressing mobile devices’ heter...Dotnet  ssd a robust rf location fingerprint addressing mobile devices’ heter...
Dotnet ssd a robust rf location fingerprint addressing mobile devices’ heter...
 
Android ssd a robust rf location fingerprint addressing mobile devices’ hete...
Android  ssd a robust rf location fingerprint addressing mobile devices’ hete...Android  ssd a robust rf location fingerprint addressing mobile devices’ hete...
Android ssd a robust rf location fingerprint addressing mobile devices’ hete...
 
Dotnet cluster-based certificate revocation with vindication capability for ...
Dotnet  cluster-based certificate revocation with vindication capability for ...Dotnet  cluster-based certificate revocation with vindication capability for ...
Dotnet cluster-based certificate revocation with vindication capability for ...
 
Cluster based certificate revocation with vindication capability for mobile a...
Cluster based certificate revocation with vindication capability for mobile a...Cluster based certificate revocation with vindication capability for mobile a...
Cluster based certificate revocation with vindication capability for mobile a...
 
Dotnet cluster-based certificate revocation with vindication capability for ...
Dotnet  cluster-based certificate revocation with vindication capability for ...Dotnet  cluster-based certificate revocation with vindication capability for ...
Dotnet cluster-based certificate revocation with vindication capability for ...
 
Android a scalable server architecture for mobile presence services in socia...
Android  a scalable server architecture for mobile presence services in socia...Android  a scalable server architecture for mobile presence services in socia...
Android a scalable server architecture for mobile presence services in socia...
 

PPCLU system preserves privacy and resists collusion

  • 1. ECWAY TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111 VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM ABSTRACT: Today's location-sensitive service relies on user's mobile device to determine the current location. This allows malicious users to access a restricted resource or provide bogus alibis by cheating on their locations. To address this issue, we propose A Privacy-Preserving LocAtion proof Updating System (APPLAUS) in which colocated Bluetooth enabled mobile devices mutually generate location proofs and send updates to a location proof server. Periodically changed pseudonyms are used by the mobile devices to protect source location privacy from each other, and from the untrusted location proof server. We develop user-centric location privacy model in which individual users evaluate their location privacy levels and decide whether and when to accept the location proof requests. In order to defend against colluding attacks, we also present betweenness ranking-based and correlation clustering-based approaches for outlier detection. APPLAUS can be implemented with existing network infrastructure, and can be easily deployed in Bluetooth enabled mobile devices with little computation or power cost. Extensive experimental results show that APPLAUS can effectively provide location proofs, significantly preserve the source location privacy, and effectively detect colluding attacks.