SlideShare a Scribd company logo
1 of 8
GLOBALSOFT TECHNOLOGIES 
IEEE PROJECTS & SOFTWARE DEVELOPMENTS 
IEEE PROJECTS & SOFTWARE DEVELOPMENTS 
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE 
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS 
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE 
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS 
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com 
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com 
Exploiting Service Similarity for Privacy in Location Based Search 
Queries 
ABSTRACT 
Location-based applications utilize the positioning capabilities of a 
mobile device to determine the current location of a user, and 
customize query results to include neighboring points of interests. 
However, location knowledge is often perceived as personal 
information. One of the immediate issues hindering the wide 
acceptance of location-based applications is the lack of appropriate 
methodologies that offer fine grain privacy controls to a user without
vastly affecting the usability of the service. While a number of privacy-preserving 
models and algorithms have taken shape in the past few 
years, there is an almost universal need to specify one’s privacy 
requirement without understanding its implications on the service 
quality. In this paper, we propose a user-centric locationbased 
service architecture where a user can observe the impact of location 
inaccuracy on the service accuracy before deciding the geo-coordinates 
to use in a query. We construct a local search application 
based on this architecture and demonstrate how meaningful 
information can be exchanged between the user and the service 
provider to allow the inference of contours depicting the change in 
query results across a geographic area. Results indicate the 
possibility of large default privacy regions (areas of no change in 
result set) in such applications. 
EXISTING SYSTEM: 
There are many kinds of location-sensitive applications. One category is 
location-based access control. Another class of location-sensitive 
applications requires users to provide past location proofs such as auto
insurance quote in which auto insurance companies offer discounts to 
drivers who can prove that they take safe routes during their daily 
commutes, police investigations in which detectives are interested in finding 
out if a person was at a murder scene at some time, and location-based social 
networking in which a user can ask for a location proof from the service 
requester and accepts the request only if the sender is able to present a valid 
location proof. The common theme across these location sensitive 
applications is that they offer a reward or benefit to users located in a certain 
geographical location at a certain time. Thus, users have the incentive to 
cheat on their locations. 
DISADVANTAGES OF EXISTING SYSTEM: 
· In the location-sensitive applications there is a lack of secure mechanism 
to provide their current or past locations to applications and services. 
· Although cellular service providers have tracking services that can help 
verify the locations of mobile users in real time, the accuracy is not good 
enough and the location history cannot be verified. 
PROPOSED SYSTEM:
We propose a user-centric locationbased service architecture 
where a user can observe the impact of location inaccuracy on the 
service accuracy before deciding the geo-coordinates to use in a 
query. We construct a local search application based on this 
architecture and demonstrate how meaningful information can be 
exchanged between the user and the service provider to allow the 
inference of contours depicting the change in query results across a 
geographic area. Results indicate the possibility of large default 
privacy regions (areas of no change in result set) in such 
applications. 
ADVANTAGES OF PROPOSED SYSTEM: 
We can effectively provide location proofs, significantly preserve the source 
location privacy, and effectively detect colluding attacks. Mobile local 
search is demonstrating an upward market trend.
Architecture: 
Modules: 
1. Admin Module. 
2. Service quality. 
3. A local search application 
4. User Module.
Admin Module: 
In this module admin can register and he can login. After login admin 
can accept user’s registration. Hera Admin will Check About User 
Information. If it is right he will accept. Then only users can login to 
website. Admin can see users list and delete users. Admin can accept user 
posts. Like information about ATMs, hotels, shopping malls and so on. He 
can delete user post information also. Admin Will See Users location. Where 
user will went and which time like that he can search about all users location 
information. And he can change his password. 
Service quality: 
Towards this end, prior research have led to the development of a 
number of privacy criteria, and algorithms for their optimal achievement. 
However, there is no known attempt to bring into view the mutual 
interactions between the accuracy of a location coordinate and the service 
quality from an application using those coordinates. 
A LOCAL SEARCH APPLICATION: 
Mobile local search is demonstrating an upward market trend, the gap 
with the desktop counterpart diminishing in the next three years, and then 
rising further2. Given the penetration of web-enabled handheld devices in
the consumer market, it has become exceedingly common for a user to 
instantly look up the information she seeks to find. 
User Module: 
In this module user can register. And he can login. After login user 
will enter his present location. Why because we don’t have any GPS in 
our system. That’s why we will give externally. Then it will redirect to 
maps page. It will show about your all locations in map. User can enter 
Details about local services. It will host after admin conformation into 
website. User can search about local services like atms, restarents and 
so on. User can see his total locations in map. He can update his profile 
picture. He can change his password. 
Hardware Requirements: 
• System : Pentium IV 2.4 GHz. 
• Hard Disk : 40 GB. 
• Floppy Drive : 1.44 Mb. 
• Monitor : 14’ Colour Monitor. 
• Mouse : Optical Mouse. 
• Ram : 512 Mb. 
• Keyboard : 101 Keyboards.
Software Requirements: 
• Operating system : Windows 7 32 bit. 
• Coding Language : ASP.Net 4.0 with C# 
• Data Base : SQL Server 2008.

More Related Content

Viewers also liked

Francois hollande president normal - tome 4
Francois hollande   president normal - tome 4Francois hollande   president normal - tome 4
Francois hollande president normal - tome 4Joyeux Nain
 
ACHAT APPARTEMENT NEUILLY STANDING VUE DEGAGEE SOLEIL
ACHAT APPARTEMENT NEUILLY STANDING VUE DEGAGEE SOLEILACHAT APPARTEMENT NEUILLY STANDING VUE DEGAGEE SOLEIL
ACHAT APPARTEMENT NEUILLY STANDING VUE DEGAGEE SOLEILMarc Foujols
 
Silurus glanis reviews in fish biology
Silurus glanis reviews in fish biologySilurus glanis reviews in fish biology
Silurus glanis reviews in fish biologyFatih Üçkardeş
 
Shapter - Journée de l'innovation à Télécom ParisTech 2013
Shapter - Journée de l'innovation à Télécom ParisTech 2013Shapter - Journée de l'innovation à Télécom ParisTech 2013
Shapter - Journée de l'innovation à Télécom ParisTech 2013Emeline Parizel
 
Totalitarian regimes
Totalitarian regimesTotalitarian regimes
Totalitarian regimesjulienbardoux
 
Tract RéUnion Public Mad Du 30 Octobre 2009
Tract RéUnion Public Mad Du 30 Octobre 2009Tract RéUnion Public Mad Du 30 Octobre 2009
Tract RéUnion Public Mad Du 30 Octobre 2009Francois Bardel
 
Primera fase desplegament FO a Badalona
Primera fase desplegament FO a BadalonaPrimera fase desplegament FO a Badalona
Primera fase desplegament FO a BadalonaAntoni Davia
 
Aprendamos a reciclar papel
Aprendamos a                                              reciclar papelAprendamos a                                              reciclar papel
Aprendamos a reciclar papelnellivega
 
Les utopies sanglantes du x xe siècle
Les utopies sanglantes du x xe siècleLes utopies sanglantes du x xe siècle
Les utopies sanglantes du x xe sièclenoctambule
 
N°24 Juin 2006
N°24 Juin 2006N°24 Juin 2006
N°24 Juin 2006fcpepagnol
 
[Group 6] rap and race
[Group 6] rap and race[Group 6] rap and race
[Group 6] rap and raceDuy Đức
 
Les invités politiques de France Télévisions
Les invités politiques de France TélévisionsLes invités politiques de France Télévisions
Les invités politiques de France TélévisionsFrance Télévisions
 

Viewers also liked (20)

La Fondation Raoul Follereau, riche à millions
La Fondation Raoul Follereau, riche à millionsLa Fondation Raoul Follereau, riche à millions
La Fondation Raoul Follereau, riche à millions
 
Irb france-2013
Irb france-2013Irb france-2013
Irb france-2013
 
Regulatory bodies
Regulatory bodiesRegulatory bodies
Regulatory bodies
 
Francois hollande president normal - tome 4
Francois hollande   president normal - tome 4Francois hollande   president normal - tome 4
Francois hollande president normal - tome 4
 
NB
NBNB
NB
 
ACHAT APPARTEMENT NEUILLY STANDING VUE DEGAGEE SOLEIL
ACHAT APPARTEMENT NEUILLY STANDING VUE DEGAGEE SOLEILACHAT APPARTEMENT NEUILLY STANDING VUE DEGAGEE SOLEIL
ACHAT APPARTEMENT NEUILLY STANDING VUE DEGAGEE SOLEIL
 
Silurus glanis reviews in fish biology
Silurus glanis reviews in fish biologySilurus glanis reviews in fish biology
Silurus glanis reviews in fish biology
 
Cloud computing 2
Cloud computing 2Cloud computing 2
Cloud computing 2
 
50120130405030
5012013040503050120130405030
50120130405030
 
Shapter - Journée de l'innovation à Télécom ParisTech 2013
Shapter - Journée de l'innovation à Télécom ParisTech 2013Shapter - Journée de l'innovation à Télécom ParisTech 2013
Shapter - Journée de l'innovation à Télécom ParisTech 2013
 
Totalitarian regimes
Totalitarian regimesTotalitarian regimes
Totalitarian regimes
 
Tract RéUnion Public Mad Du 30 Octobre 2009
Tract RéUnion Public Mad Du 30 Octobre 2009Tract RéUnion Public Mad Du 30 Octobre 2009
Tract RéUnion Public Mad Du 30 Octobre 2009
 
Primera fase desplegament FO a Badalona
Primera fase desplegament FO a BadalonaPrimera fase desplegament FO a Badalona
Primera fase desplegament FO a Badalona
 
Aprendamos a reciclar papel
Aprendamos a                                              reciclar papelAprendamos a                                              reciclar papel
Aprendamos a reciclar papel
 
Les utopies sanglantes du x xe siècle
Les utopies sanglantes du x xe siècleLes utopies sanglantes du x xe siècle
Les utopies sanglantes du x xe siècle
 
N°24 Juin 2006
N°24 Juin 2006N°24 Juin 2006
N°24 Juin 2006
 
Info Prime 090309 A
Info Prime 090309 AInfo Prime 090309 A
Info Prime 090309 A
 
Ch4201557563
Ch4201557563Ch4201557563
Ch4201557563
 
[Group 6] rap and race
[Group 6] rap and race[Group 6] rap and race
[Group 6] rap and race
 
Les invités politiques de France Télévisions
Les invités politiques de France TélévisionsLes invités politiques de France Télévisions
Les invités politiques de France Télévisions
 

More from IEEEGLOBALSOFTSTUDENTSPROJECTS

2014 2015 ieee dotnet projects globalsoft technologies
2014 2015 ieee dotnet projects globalsoft technologies2014 2015 ieee dotnet projects globalsoft technologies
2014 2015 ieee dotnet projects globalsoft technologiesIEEEGLOBALSOFTSTUDENTSPROJECTS
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Signature searching in a networ...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Signature searching in a networ...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Signature searching in a networ...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Signature searching in a networ...IEEEGLOBALSOFTSTUDENTSPROJECTS
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT On social delay tolerant networ...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT On social delay tolerant networ...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT On social delay tolerant networ...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT On social delay tolerant networ...IEEEGLOBALSOFTSTUDENTSPROJECTS
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Multicast capacity-in-manet-wit...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Multicast capacity-in-manet-wit...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Multicast capacity-in-manet-wit...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Multicast capacity-in-manet-wit...IEEEGLOBALSOFTSTUDENTSPROJECTS
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Efficient data-query-in-intermi...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Efficient data-query-in-intermi...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Efficient data-query-in-intermi...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Efficient data-query-in-intermi...IEEEGLOBALSOFTSTUDENTSPROJECTS
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...IEEEGLOBALSOFTSTUDENTSPROJECTS
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...IEEEGLOBALSOFTSTUDENTSPROJECTS
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Trajectory improves data delivery...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Trajectory improves data delivery...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Trajectory improves data delivery...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Trajectory improves data delivery...IEEEGLOBALSOFTSTUDENTSPROJECTS
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Tracon interference aware schedul...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Tracon interference aware schedul...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Tracon interference aware schedul...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Tracon interference aware schedul...IEEEGLOBALSOFTSTUDENTSPROJECTS
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The design-and-evaluation-of-an-i...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The design-and-evaluation-of-an-i...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The design-and-evaluation-of-an-i...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The design-and-evaluation-of-an-i...IEEEGLOBALSOFTSTUDENTSPROJECTS
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The client assignment problem for...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The client assignment problem for...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The client assignment problem for...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The client assignment problem for...IEEEGLOBALSOFTSTUDENTSPROJECTS
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Streaming applications on bus bas...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Streaming applications on bus bas...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Streaming applications on bus bas...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Streaming applications on bus bas...IEEEGLOBALSOFTSTUDENTSPROJECTS
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Securing brokerless publish subsc...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Securing brokerless publish subsc...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Securing brokerless publish subsc...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Securing brokerless publish subsc...IEEEGLOBALSOFTSTUDENTSPROJECTS
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Secure outsourced-attribute-based...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Secure outsourced-attribute-based...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Secure outsourced-attribute-based...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Secure outsourced-attribute-based...IEEEGLOBALSOFTSTUDENTSPROJECTS
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Rre a-game-theoretic-intrusion-re...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Rre a-game-theoretic-intrusion-re...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Rre a-game-theoretic-intrusion-re...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Rre a-game-theoretic-intrusion-re...IEEEGLOBALSOFTSTUDENTSPROJECTS
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Peer assisted vod systems an effi...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Peer assisted vod systems an effi...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Peer assisted vod systems an effi...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Peer assisted vod systems an effi...IEEEGLOBALSOFTSTUDENTSPROJECTS
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...IEEEGLOBALSOFTSTUDENTSPROJECTS
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On social delay tolerant networki...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On social delay tolerant networki...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On social delay tolerant networki...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On social delay tolerant networki...IEEEGLOBALSOFTSTUDENTSPROJECTS
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Constructing load balanced data a...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Constructing load balanced data a...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Constructing load balanced data a...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Constructing load balanced data a...IEEEGLOBALSOFTSTUDENTSPROJECTS
 

More from IEEEGLOBALSOFTSTUDENTSPROJECTS (20)

2014 2015 ieee dotnet projects globalsoft technologies
2014 2015 ieee dotnet projects globalsoft technologies2014 2015 ieee dotnet projects globalsoft technologies
2014 2015 ieee dotnet projects globalsoft technologies
 
2014 2015 ieee java projects globalsoft technologies
2014 2015 ieee java projects globalsoft technologies2014 2015 ieee java projects globalsoft technologies
2014 2015 ieee java projects globalsoft technologies
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Signature searching in a networ...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Signature searching in a networ...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Signature searching in a networ...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Signature searching in a networ...
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT On social delay tolerant networ...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT On social delay tolerant networ...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT On social delay tolerant networ...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT On social delay tolerant networ...
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Multicast capacity-in-manet-wit...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Multicast capacity-in-manet-wit...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Multicast capacity-in-manet-wit...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Multicast capacity-in-manet-wit...
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Efficient data-query-in-intermi...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Efficient data-query-in-intermi...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Efficient data-query-in-intermi...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Efficient data-query-in-intermi...
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Trajectory improves data delivery...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Trajectory improves data delivery...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Trajectory improves data delivery...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Trajectory improves data delivery...
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Tracon interference aware schedul...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Tracon interference aware schedul...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Tracon interference aware schedul...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Tracon interference aware schedul...
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The design-and-evaluation-of-an-i...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The design-and-evaluation-of-an-i...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The design-and-evaluation-of-an-i...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The design-and-evaluation-of-an-i...
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The client assignment problem for...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The client assignment problem for...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The client assignment problem for...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The client assignment problem for...
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Streaming applications on bus bas...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Streaming applications on bus bas...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Streaming applications on bus bas...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Streaming applications on bus bas...
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Securing brokerless publish subsc...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Securing brokerless publish subsc...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Securing brokerless publish subsc...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Securing brokerless publish subsc...
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Secure outsourced-attribute-based...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Secure outsourced-attribute-based...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Secure outsourced-attribute-based...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Secure outsourced-attribute-based...
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Rre a-game-theoretic-intrusion-re...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Rre a-game-theoretic-intrusion-re...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Rre a-game-theoretic-intrusion-re...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Rre a-game-theoretic-intrusion-re...
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Peer assisted vod systems an effi...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Peer assisted vod systems an effi...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Peer assisted vod systems an effi...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Peer assisted vod systems an effi...
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On social delay tolerant networki...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On social delay tolerant networki...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On social delay tolerant networki...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On social delay tolerant networki...
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Constructing load balanced data a...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Constructing load balanced data a...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Constructing load balanced data a...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Constructing load balanced data a...
 

Recently uploaded

5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...archanaece3
 
Diploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdfDiploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdfJNTUA
 
Introduction to Artificial Intelligence and History of AI
Introduction to Artificial Intelligence and History of AIIntroduction to Artificial Intelligence and History of AI
Introduction to Artificial Intelligence and History of AISheetal Jain
 
BURGER ORDERING SYSYTEM PROJECT REPORT..pdf
BURGER ORDERING SYSYTEM PROJECT REPORT..pdfBURGER ORDERING SYSYTEM PROJECT REPORT..pdf
BURGER ORDERING SYSYTEM PROJECT REPORT..pdfKamal Acharya
 
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024EMMANUELLEFRANCEHELI
 
Quiz application system project report..pdf
Quiz application system project report..pdfQuiz application system project report..pdf
Quiz application system project report..pdfKamal Acharya
 
Supermarket billing system project report..pdf
Supermarket billing system project report..pdfSupermarket billing system project report..pdf
Supermarket billing system project report..pdfKamal Acharya
 
ChatGPT Prompt Engineering for project managers.pdf
ChatGPT Prompt Engineering for project managers.pdfChatGPT Prompt Engineering for project managers.pdf
ChatGPT Prompt Engineering for project managers.pdfqasastareekh
 
Piping and instrumentation diagram p.pdf
Piping and instrumentation diagram p.pdfPiping and instrumentation diagram p.pdf
Piping and instrumentation diagram p.pdfAshrafRagab14
 
Introduction to Arduino Programming: Features of Arduino
Introduction to Arduino Programming: Features of ArduinoIntroduction to Arduino Programming: Features of Arduino
Introduction to Arduino Programming: Features of ArduinoAbhimanyu Sangale
 
The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...
The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...
The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...Roi Lipman
 
Lesson no16 application of Induction Generator in Wind.ppsx
Lesson no16 application of Induction Generator in Wind.ppsxLesson no16 application of Induction Generator in Wind.ppsx
Lesson no16 application of Induction Generator in Wind.ppsxmichaelprrior
 
Introduction to Heat Exchangers: Principle, Types and Applications
Introduction to Heat Exchangers: Principle, Types and ApplicationsIntroduction to Heat Exchangers: Principle, Types and Applications
Introduction to Heat Exchangers: Principle, Types and ApplicationsKineticEngineeringCo
 
Theory for How to calculation capacitor bank
Theory for How to calculation capacitor bankTheory for How to calculation capacitor bank
Theory for How to calculation capacitor banktawat puangthong
 
EMPLOYEE MANAGEMENT SYSTEM FINAL presentation
EMPLOYEE MANAGEMENT SYSTEM FINAL presentationEMPLOYEE MANAGEMENT SYSTEM FINAL presentation
EMPLOYEE MANAGEMENT SYSTEM FINAL presentationAmayJaiswal4
 
Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1T.D. Shashikala
 
Operating System chapter 9 (Virtual Memory)
Operating System chapter 9 (Virtual Memory)Operating System chapter 9 (Virtual Memory)
Operating System chapter 9 (Virtual Memory)NareenAsad
 
Interfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdfInterfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdfragupathi90
 
Intelligent Agents, A discovery on How A Rational Agent Acts
Intelligent Agents, A discovery on How A Rational Agent ActsIntelligent Agents, A discovery on How A Rational Agent Acts
Intelligent Agents, A discovery on How A Rational Agent ActsSheetal Jain
 
Research Methodolgy & Intellectual Property Rights Series 2
Research Methodolgy & Intellectual Property Rights Series 2Research Methodolgy & Intellectual Property Rights Series 2
Research Methodolgy & Intellectual Property Rights Series 2T.D. Shashikala
 

Recently uploaded (20)

5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...
 
Diploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdfDiploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdf
 
Introduction to Artificial Intelligence and History of AI
Introduction to Artificial Intelligence and History of AIIntroduction to Artificial Intelligence and History of AI
Introduction to Artificial Intelligence and History of AI
 
BURGER ORDERING SYSYTEM PROJECT REPORT..pdf
BURGER ORDERING SYSYTEM PROJECT REPORT..pdfBURGER ORDERING SYSYTEM PROJECT REPORT..pdf
BURGER ORDERING SYSYTEM PROJECT REPORT..pdf
 
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
 
Quiz application system project report..pdf
Quiz application system project report..pdfQuiz application system project report..pdf
Quiz application system project report..pdf
 
Supermarket billing system project report..pdf
Supermarket billing system project report..pdfSupermarket billing system project report..pdf
Supermarket billing system project report..pdf
 
ChatGPT Prompt Engineering for project managers.pdf
ChatGPT Prompt Engineering for project managers.pdfChatGPT Prompt Engineering for project managers.pdf
ChatGPT Prompt Engineering for project managers.pdf
 
Piping and instrumentation diagram p.pdf
Piping and instrumentation diagram p.pdfPiping and instrumentation diagram p.pdf
Piping and instrumentation diagram p.pdf
 
Introduction to Arduino Programming: Features of Arduino
Introduction to Arduino Programming: Features of ArduinoIntroduction to Arduino Programming: Features of Arduino
Introduction to Arduino Programming: Features of Arduino
 
The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...
The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...
The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...
 
Lesson no16 application of Induction Generator in Wind.ppsx
Lesson no16 application of Induction Generator in Wind.ppsxLesson no16 application of Induction Generator in Wind.ppsx
Lesson no16 application of Induction Generator in Wind.ppsx
 
Introduction to Heat Exchangers: Principle, Types and Applications
Introduction to Heat Exchangers: Principle, Types and ApplicationsIntroduction to Heat Exchangers: Principle, Types and Applications
Introduction to Heat Exchangers: Principle, Types and Applications
 
Theory for How to calculation capacitor bank
Theory for How to calculation capacitor bankTheory for How to calculation capacitor bank
Theory for How to calculation capacitor bank
 
EMPLOYEE MANAGEMENT SYSTEM FINAL presentation
EMPLOYEE MANAGEMENT SYSTEM FINAL presentationEMPLOYEE MANAGEMENT SYSTEM FINAL presentation
EMPLOYEE MANAGEMENT SYSTEM FINAL presentation
 
Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1
 
Operating System chapter 9 (Virtual Memory)
Operating System chapter 9 (Virtual Memory)Operating System chapter 9 (Virtual Memory)
Operating System chapter 9 (Virtual Memory)
 
Interfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdfInterfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdf
 
Intelligent Agents, A discovery on How A Rational Agent Acts
Intelligent Agents, A discovery on How A Rational Agent ActsIntelligent Agents, A discovery on How A Rational Agent Acts
Intelligent Agents, A discovery on How A Rational Agent Acts
 
Research Methodolgy & Intellectual Property Rights Series 2
Research Methodolgy & Intellectual Property Rights Series 2Research Methodolgy & Intellectual Property Rights Series 2
Research Methodolgy & Intellectual Property Rights Series 2
 

2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Exploiting service similarity for privacy in location based search queries

  • 1. GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com Exploiting Service Similarity for Privacy in Location Based Search Queries ABSTRACT Location-based applications utilize the positioning capabilities of a mobile device to determine the current location of a user, and customize query results to include neighboring points of interests. However, location knowledge is often perceived as personal information. One of the immediate issues hindering the wide acceptance of location-based applications is the lack of appropriate methodologies that offer fine grain privacy controls to a user without
  • 2. vastly affecting the usability of the service. While a number of privacy-preserving models and algorithms have taken shape in the past few years, there is an almost universal need to specify one’s privacy requirement without understanding its implications on the service quality. In this paper, we propose a user-centric locationbased service architecture where a user can observe the impact of location inaccuracy on the service accuracy before deciding the geo-coordinates to use in a query. We construct a local search application based on this architecture and demonstrate how meaningful information can be exchanged between the user and the service provider to allow the inference of contours depicting the change in query results across a geographic area. Results indicate the possibility of large default privacy regions (areas of no change in result set) in such applications. EXISTING SYSTEM: There are many kinds of location-sensitive applications. One category is location-based access control. Another class of location-sensitive applications requires users to provide past location proofs such as auto
  • 3. insurance quote in which auto insurance companies offer discounts to drivers who can prove that they take safe routes during their daily commutes, police investigations in which detectives are interested in finding out if a person was at a murder scene at some time, and location-based social networking in which a user can ask for a location proof from the service requester and accepts the request only if the sender is able to present a valid location proof. The common theme across these location sensitive applications is that they offer a reward or benefit to users located in a certain geographical location at a certain time. Thus, users have the incentive to cheat on their locations. DISADVANTAGES OF EXISTING SYSTEM: · In the location-sensitive applications there is a lack of secure mechanism to provide their current or past locations to applications and services. · Although cellular service providers have tracking services that can help verify the locations of mobile users in real time, the accuracy is not good enough and the location history cannot be verified. PROPOSED SYSTEM:
  • 4. We propose a user-centric locationbased service architecture where a user can observe the impact of location inaccuracy on the service accuracy before deciding the geo-coordinates to use in a query. We construct a local search application based on this architecture and demonstrate how meaningful information can be exchanged between the user and the service provider to allow the inference of contours depicting the change in query results across a geographic area. Results indicate the possibility of large default privacy regions (areas of no change in result set) in such applications. ADVANTAGES OF PROPOSED SYSTEM: We can effectively provide location proofs, significantly preserve the source location privacy, and effectively detect colluding attacks. Mobile local search is demonstrating an upward market trend.
  • 5. Architecture: Modules: 1. Admin Module. 2. Service quality. 3. A local search application 4. User Module.
  • 6. Admin Module: In this module admin can register and he can login. After login admin can accept user’s registration. Hera Admin will Check About User Information. If it is right he will accept. Then only users can login to website. Admin can see users list and delete users. Admin can accept user posts. Like information about ATMs, hotels, shopping malls and so on. He can delete user post information also. Admin Will See Users location. Where user will went and which time like that he can search about all users location information. And he can change his password. Service quality: Towards this end, prior research have led to the development of a number of privacy criteria, and algorithms for their optimal achievement. However, there is no known attempt to bring into view the mutual interactions between the accuracy of a location coordinate and the service quality from an application using those coordinates. A LOCAL SEARCH APPLICATION: Mobile local search is demonstrating an upward market trend, the gap with the desktop counterpart diminishing in the next three years, and then rising further2. Given the penetration of web-enabled handheld devices in
  • 7. the consumer market, it has become exceedingly common for a user to instantly look up the information she seeks to find. User Module: In this module user can register. And he can login. After login user will enter his present location. Why because we don’t have any GPS in our system. That’s why we will give externally. Then it will redirect to maps page. It will show about your all locations in map. User can enter Details about local services. It will host after admin conformation into website. User can search about local services like atms, restarents and so on. User can see his total locations in map. He can update his profile picture. He can change his password. Hardware Requirements: • System : Pentium IV 2.4 GHz. • Hard Disk : 40 GB. • Floppy Drive : 1.44 Mb. • Monitor : 14’ Colour Monitor. • Mouse : Optical Mouse. • Ram : 512 Mb. • Keyboard : 101 Keyboards.
  • 8. Software Requirements: • Operating system : Windows 7 32 bit. • Coding Language : ASP.Net 4.0 with C# • Data Base : SQL Server 2008.