SlideShare a Scribd company logo
1 of 5
Download to read offline
9 International Journal for Modern Trends in Science and Technology
International Journal for Modern Trends in Science and Technology
Volume: 02, Issue No: 11, November 2016
http://www.ijmtst.com
ISSN: 2455-3778
Cloaking Areas Location Based Services Using
Dynamic Grid System & Privacy Encryption
S. Prashanth1
| Ms. L. Sunitha Rani2
1PG Scholar, Department of CSE, Geethanjali Engineering College, Nannur-V, Kurnool-Dist.
2Assistant Professor, Department of CSE, Geethanjali Engineering College, Nannur-V, Kurnool-Dist.
To Cite this Article
S. Prashanth, Ms. L. Sunitha Rani, Cloaking Areas Location Based Services Using Dynamic Grid System & Privacy
Encryption, International Journal for Modern Trends in Science and Technology, Vol. 02, Issue 11, 2016, pp. 9-13.
Due to the large increasing use of Location Based Services (LBS), which require personal data of the user to
provide the continuous service, protecting the privacy of these data has become a challenge. An approach to
preserving a privacy is through anonymity, by hiding the identity and user location data of the mobile device
from the service provider(third party) or from any unauthorized party who has access at the user’s request
.Considering the challenge mentioned, in this paper gives a classification according to the Architecture,
approaches and techniques used in previous works, and presents a survey of solutions to provide anonymity
in LBS including the open issues or possible improvements to current solutions. All of this, in order to provide
guidelines for choosing the best solution approach to a specific scenery in which anonymity is required.
KEYWORDS: Dynamic grid system, cloaking areas, location based services, Encryption, privacy.
Copyright © 2016 International Journal for Modern Trends in Science and Technology
All rights reserved.
I. INTRODUCTION
The consumer market for location-based
services (LBS) is estimated to grow from 2.9 billion
dollars in 2010 to 10.4 billion dollars in 2015.
While navigation applications are currently
generating the most significant revenues, location
based advertising and local search will be driving
the revenues going forward. The legal landscape,
unfortunately, is unclear about what happens to a
subscriber's location data. The nonexistence of
regulatory controls has led to a growing concern
about potential privacy violations arising out of the
usage of a location-based application. While new
regulations to plug the loopholes are being sought,
the privacy conscious user currently feels reluctant
to adopt one of the most functional business
models of the decade. Privacy and usability are two
equally important requirements for successful
realization of a location-based application. Privacy
(location) is loosely defined as a “personally”
assessed restriction on when and where someone’s
position is deemed appropriate for disclosure. To
begin with, this is a very dynamic concept.
Usability has a twofold meaning: a) privacy
controls should be intuitive yet flexible, and b) the
intended purpose of an application is reasonably
maintained. Towards this end, prior research has
led to the development of a number of privacy
criteria, and algorithms for their optimal
achievement.
However, there is no known attempt to bring
into view the mutual interactions between the
accuracy of a location coordinate and the service
quality from an application using those
coordinates. Therefore, the question of what
minimal location accuracy is required for a LBS
application to function remains open. The common
ABSTRACT
10 International Journal for Modern Trends in Science and Technology
S. Prashanth, Ms. L. Sunitha Rani : Cloaking Areas Location Based Services Using Dynamic Grid System & Privacy
Encryption
man’s question is: “how important is my position to
get me to the nearest coffee shop?” which
unfortunately remains unanswered in the scientific
community. It is worth mentioning that a separate
line of research in analyzing anonymous location
traces has revealed that user locations are heavily
correlated, and knowing a few frequently visited
locations can easily identify the user behind a
certain trace. The privacy breach in these cases
occurs because the location to identity mapping
results in a violation of user anonymity. The
proposal in this work attempts to prevent the
reverse mapping from user identity to user location
in a user-controllable manner.
The term Location-Based Services (LBS) is a
recent concept that denotes applications
integrating with the general notion of services.
Examples of such applications include emergency
services, car navigation systems, tourist tour
planning, or information delivery. In the modern
environment each and every users has lots and lots
of queries to analyze the locations in a global place,
in that case the main motivate of server is to
successfully serve the response to all the requestor
without any delay as well as maintain the privacy
of individuals. The basic idea of every server is the
concept of load balancing; here the server requires
reducing the number of queries submitted by
mobile clients and query load on the server.
However, mobile clients suffer from longer waiting
time for the server to compute valid regions.
II. PRIVATE INFORMATION RETRIEVAL (PIR) OR
OBLIVIOUS TRANSFER (OT)
In paper [19] the authors find the problem of
protecting location privacy of the mobile user to an
Oblivious transfer problem, where the issuer of the
request receives only its corresponding reply and
the service provider remains oblivious of the
location of the user. Further on, they design some
solutions based on different kinds of Oblivious
Transfer (OT) namely Adaptive OT (implementing
blind signatures), Dynamic OT and Proxy OT. They
propose the solutions but do not provide any
further analysis on the correctness or feasibility of
their proposals. Based on [19], the authors in [20]
propose an improved protocol by using two
oblivious transfers where no third party is required
to enable user’s privacy. They assume the
existence of a total server, which is responsible of a
group of LBS providers. The user has to perform a
double OT implemented with blind signatures in
order to get the key required response to the query.
This solution is thought for LBS that require
payment.
Although PIR or OT techniques do not require a
third party, they incur a much higher
communication overhead between the user and the
service provider, requiring the transmission of
much more information than the user actually
needs.
III. DYNAMIC GRID SYSTEM
3.1 Spatial Cloaking
This technique is the most commonly used for
protecting user location data from the third party
attackers where in this technique extracted user
location is blurred before submitting into service
provider server for processing The solution
proposed in this area is further classified by the
architectural approach.
3.2 Semi Trusted Third Party (Dynamic Grid
System)
To overcome the problem of in the above
architecture propose a new architecture called
dynamic grid system (DGS) [4] to provide privacy-
preserving snapshot and continuous LBS. The
main idea is to place a semi-trusted third party,
termed query server (QS), between the user and the
service provider. QS only needs to be semi-trusted
because it will not collect/ store or even have
access to any user location information.
Fig: 1. Architecture
The user encrypts a query that includes the
information of the query area and the dynamic grid
structure, and encrypts the identity of each grid
cell intersecting the required search area of the
spatial query to produce a set of encrypted
identifiers. Next, the user sends a request
including (1) the encrypted query and (2) the
encrypted identifiers to QS, which is a semi-trusted
party located between the user and SP. QS stores
the encrypted identifiers and forwards the
encrypted query to SP specified by the user. SP
11 International Journal for Modern Trends in Science and Technology
S. Prashanth, Ms. L. Sunitha Rani : Cloaking Areas Location Based Services Using Dynamic Grid System & Privacy
Encryption
decrypts the query and selects the POIs within the
query area from its database. For each selected
POI, SP encrypts its information, using the
dynamic grid structure specified by the user to find
a grid cell covering the POI, and encrypts the cell
identity to produce the encrypted identifier for that
POI. The encrypted POIs with their corresponding
encrypted identifiers are returned to QS. QS stores
the set of encrypted POIs and only returns to the
user a subset of encrypted POIs whose
corresponding identifiers match any one of the
encrypted identifiers initially sent by the user
Algorithm for DGS
Input: User location (x, y), POI data P
Output: User's POI Query data U(P).
Initialization:
i. User Select POI Type P(t), QS Query Server, SP
Service Provider.
ii. User set location, defined x, y (Current exact
Location).
letxu,yu∈ U,
Map.getBounds(xu,yu)
return(xb,yb), ( xt,yt) where b- bottom, t- top
Key Derivation Function KDF()
returnsk (random key)
Enc(query) = IBE(P(t), k, ( xb,yb), ( xt,yt)) // At User
side
Enc(query), User data of U fwd toQS.
Create ID for Query and fwdEnc(query) to SP
Decrpt(query) at SP,
get (xc,yc)= Map.getCenter(( xb,yb), ( xt,yt));
while data != nulll
get POI P ∈ P(t),
sort based on dist,
create Query Set U(p).
end while
return Query Set U(p) to QS
At QS, fwd Query Set to User
Decrpt(query set U(P)) at USer,
3.3 Identity Based Encryption (IBE)
For an effective key management system these
are all requirements 2] Authenticate users and
decrypt data 3] Manage keys with partners 4]
Deliver keys to trusted infrastructure components
5] Recover keys
Adi Shamir, one of the pioneers of public key
cryptography, proposed a new type of public key
algorithm in 1984. While public key systems have
the inherent problem of distributing public keys
and tying those public keys to a specific receiver.
The scheme has chosen cipher text security in the
random oracle model assuming a variant of the
computational Diffie- Hellman problem. This
system is based on bilinear maps between groups.
In this paper we propose a fully functional
identity-based encryption scheme. The
performance of our system is comparable to the
performance of ElGamal encryption. The security
of our system is based on a natural analogue of the
computational Diffie-Hellman assumption. this
assumption showed that the new system has
chosen cipher text security in the random oracle
model. Using standard techniques from threshold
cryptography [23, 24] the PKG in our scheme can
be distributed so that the master-key is never
available in a single location.
Comparisons Table
Parameter Existing
System
(TTP)
Proposed
System (DGS)
Computation
Cost(Number of POIs)
0.6 1.4
Communication
Cost(Number of POIs)
1000 10000
Computation Cost
Number of Users
(thousands)
0.8 0.6
Communication Cost
Number of Users
(thousands)
0.1 25
K-Anonymity
Computation Cost
0.2 10
K-Anonymity
Communication Cost
0.1 10
IV. RESULTS
Fig.2 .Grid of user location preparation.
12 International Journal for Modern Trends in Science and Technology
S. Prashanth, Ms. L. Sunitha Rani : Cloaking Areas Location Based Services Using Dynamic Grid System & Privacy
Encryption
Fig. 3. Preparation of Query
Fig 4. Encrypted Query forward to SP at QS
Fig. 5. POI results got at User
V. CONCLUSION
It is necessary to propose new models that
address new threats and attack models, which
seek to break user’s privacy in Location Based
Services. These new models need to overcome the
disadvantages of existing ones. Novel solutions
approaches could combine different proposed
solutions, to compensate the disadvantages of
certain models with the advantages of others.
The job of updating or proposing a new survey
will remain as an open task, as the development of
new solutions to protect user’s privacy in Location
Based Services remains active; moreover it is
necessary to classify the solutions by the privacy
degree they offer, the attack model(s) from which
they are resilient and the type of LBS to which they
can be applied.
REFERENCES
[1] Schiller, J. Voisard, A.: Location-Based Services.
Morgan Kaufmann Publishers (2004)
[2] Mohaisen, A., Hong, D., Nyang, D.: Privacy in
Location based services: Primitives toward the
solution. NCM (2008)
[3] C.-Y. Chow and M. F. Mokbel, “Enabling private
continuous queries for revealed user locations,” in
Proc. 10th Int. Conf. Adv. Spatial Temporal
Databases, 2007, pp. 258–273.
[4] B. Gedik and L. Liu, “Protecting location privacy with
personalized k-anonymity: Architecture and
algorithms,” IEEE Trans. Mobile Comput., vol. 7, no.
1, pp. 1–18, Jan. 2008.
[5] M. Gruteser and D. Grunwald, “Anonymous usage of
locationbased services through spatial and temporal
cloaking,” in Proc. 1st Int. Conf. Mobile Syst., Appl.
Services, 2003, pp. 31–42.
[6] P. Kalnis, G. Ghinita, K. Mouratidis, and D.
Papadias, “Preventing location-based identity
inference in anonymous spatial queries,” IEEE
Trans. Knowl. Data Eng., vol. 19, no. 12, pp.
1719–1733, Dec. 2007.
[7] M. F. Mokbel, C.-Y. Chow, and W. G. Aref, “The new
casper: Query processing for location services
withoutcompromising privacy,” in Proc. 32nd Int.
Conf. Very Large Data Bases, 2006, pp. 763–774.
[8] T. Xu and Y. Cai, “Location anonymity in continuous
locationbased services,” in Proc. 15th Annu. ACM
Int. Symp. Adv. Geographic Inf. Syst., 2007, pp.
39:1–39:8.
[9] Kido, H., Yanagisawa, Y., Satoh, T. An Anonymous
Communication Technique using Dummies for
Location-based Services. In: IEEE International
Conference on Pervasive Services ICPS (2005) 88–97
[10]Lu, H., Jensen, C.S., Yiu, M.L.: PAD: Privacy-Area
Aware. Dummy-Based Location Privacy in Mobile
Services MobiDE (2008) 16–23
13 International Journal for Modern Trends in Science and Technology
S. Prashanth, Ms. L. Sunitha Rani : Cloaking Areas Location Based Services Using Dynamic Grid System & Privacy
Encryption
[11]Bamba, B., Liu, L., Pesti, P., Wang, T.: Supporting
anonymous location queries in mobile environments
with privacy grid. In: Proceedings of the
International World Wide Web Conference, WWW
(2008)
[12]Gedik, B.,Liu, L.: Protecting location privacy with
personalized k-anonymity: Architecture and
algorithms. In: IEEE Transactions on Mobile
Computing, TMC (2008) 1–18
[13]Gruteser, M., Grunwald, D.: Anonymous usage of
location-based services through spatial and
temporal cloaking. In: Proceedings of the
International Conference on Mobile
Systems,Applications, and Services, MobiSys (2003)
[14]Roman Schlegel, Member, IEEE, Chi-Yin Chow,
Member, IEEE, Qiong Huang, Member, IEEE, and
Duncan S. Wong, Member, IEEE, “User-Defined
Privacy Grid System for Continuous Location-Based
Services”, IEEE Transactions on Mobile Computing,
2015.
[15]Ardagna, C. A., Cremonini, M., Damiani, E., De
Capitani di Vimercati S., Samarati, P.: Location
privacy protection through obfuscation based
techniques. Data and Applications Security XXI,
Volume 4602 (2007)
[16]Wightman, P.M.; Jimeno, M.A; Jabba, D.; Labrador,
M.: Matlock: A location obfuscation technique for
accuracy-restricted applications. 2012 IEEE
Wireless Communications and Networking
Conference (WCNC) (2012)
[17]Di Pietro, R., Mandati, R., Verde, N.V.: Track me if
you can: Transparent obfuscation for Location based
Services. 2013 IEEE 14th International Symposium
and Workshops on World of Wireless, Mobile and
Multimedia Networks (WoWMoM) (2013)

More Related Content

What's hot

Privacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesPrivacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesIGEEKS TECHNOLOGIES
 
SURVEY PAPER ON PRIVACY IN LOCATION BASED SEARCH QUERIES.
SURVEY PAPER ON PRIVACY IN LOCATION BASED SEARCH QUERIES.SURVEY PAPER ON PRIVACY IN LOCATION BASED SEARCH QUERIES.
SURVEY PAPER ON PRIVACY IN LOCATION BASED SEARCH QUERIES.ijiert bestjournal
 
Location based spatial query processing in wireless broadcast environments(sy...
Location based spatial query processing in wireless broadcast environments(sy...Location based spatial query processing in wireless broadcast environments(sy...
Location based spatial query processing in wireless broadcast environments(sy...Mumbai Academisc
 
Exploiting service similarity for privacy in location based search queries
Exploiting service similarity for privacy in location based search queriesExploiting service similarity for privacy in location based search queries
Exploiting service similarity for privacy in location based search queriesShakas Technologies
 
Machine Learning Applications in Grid Computing
Machine Learning Applications in Grid ComputingMachine Learning Applications in Grid Computing
Machine Learning Applications in Grid Computingbutest
 
PROTECTING PRIVACY IN VANETs USING MIX ZONES WITH VIRTUAL PSEUDONYM CHANGE
PROTECTING PRIVACY IN VANETs USING MIX ZONES WITH VIRTUAL PSEUDONYM CHANGE PROTECTING PRIVACY IN VANETs USING MIX ZONES WITH VIRTUAL PSEUDONYM CHANGE
PROTECTING PRIVACY IN VANETs USING MIX ZONES WITH VIRTUAL PSEUDONYM CHANGE IJNSA Journal
 
Network Security ,2014 and 2015 ieee projects list @ TMKS Infotech
Network Security ,2014 and 2015 ieee projects list @ TMKS InfotechNetwork Security ,2014 and 2015 ieee projects list @ TMKS Infotech
Network Security ,2014 and 2015 ieee projects list @ TMKS InfotechManju Nath
 
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...Migrant Systems
 
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...IRJET Journal
 
A Generalized Image Authentication Based On Statistical Moments of Color Hist...
A Generalized Image Authentication Based On Statistical Moments of Color Hist...A Generalized Image Authentication Based On Statistical Moments of Color Hist...
A Generalized Image Authentication Based On Statistical Moments of Color Hist...idescitation
 
Preserving location privacy in geo social applications
Preserving location privacy in geo social applicationsPreserving location privacy in geo social applications
Preserving location privacy in geo social applicationsShakas Technologies
 
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
Oruta: Privacy-Preserving Public Auditing for Shared Data in the CloudOruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
Oruta: Privacy-Preserving Public Auditing for Shared Data in the CloudMigrant Systems
 
Privacy Preserving Location Query Service
Privacy Preserving Location Query ServicePrivacy Preserving Location Query Service
Privacy Preserving Location Query ServiceIRJET Journal
 
Securing Location of User in Geo Social Networking
Securing Location of User in Geo Social NetworkingSecuring Location of User in Geo Social Networking
Securing Location of User in Geo Social NetworkingIRJET Journal
 
Be ieee 2015-16 java projects @ dreamweb techno solutions-trichy - copy - copy
Be  ieee 2015-16 java projects @ dreamweb techno solutions-trichy - copy - copyBe  ieee 2015-16 java projects @ dreamweb techno solutions-trichy - copy - copy
Be ieee 2015-16 java projects @ dreamweb techno solutions-trichy - copy - copyElakkiya Triplen
 
Final year dotnet projects titles@ dreamweb techno solution trichy -
Final year  dotnet projects titles@ dreamweb techno solution trichy -Final year  dotnet projects titles@ dreamweb techno solution trichy -
Final year dotnet projects titles@ dreamweb techno solution trichy -ranjith kumar
 

What's hot (17)

Privacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesPrivacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devices
 
SURVEY PAPER ON PRIVACY IN LOCATION BASED SEARCH QUERIES.
SURVEY PAPER ON PRIVACY IN LOCATION BASED SEARCH QUERIES.SURVEY PAPER ON PRIVACY IN LOCATION BASED SEARCH QUERIES.
SURVEY PAPER ON PRIVACY IN LOCATION BASED SEARCH QUERIES.
 
Location based spatial query processing in wireless broadcast environments(sy...
Location based spatial query processing in wireless broadcast environments(sy...Location based spatial query processing in wireless broadcast environments(sy...
Location based spatial query processing in wireless broadcast environments(sy...
 
Exploiting service similarity for privacy in location based search queries
Exploiting service similarity for privacy in location based search queriesExploiting service similarity for privacy in location based search queries
Exploiting service similarity for privacy in location based search queries
 
Machine Learning Applications in Grid Computing
Machine Learning Applications in Grid ComputingMachine Learning Applications in Grid Computing
Machine Learning Applications in Grid Computing
 
Seminar
SeminarSeminar
Seminar
 
PROTECTING PRIVACY IN VANETs USING MIX ZONES WITH VIRTUAL PSEUDONYM CHANGE
PROTECTING PRIVACY IN VANETs USING MIX ZONES WITH VIRTUAL PSEUDONYM CHANGE PROTECTING PRIVACY IN VANETs USING MIX ZONES WITH VIRTUAL PSEUDONYM CHANGE
PROTECTING PRIVACY IN VANETs USING MIX ZONES WITH VIRTUAL PSEUDONYM CHANGE
 
Network Security ,2014 and 2015 ieee projects list @ TMKS Infotech
Network Security ,2014 and 2015 ieee projects list @ TMKS InfotechNetwork Security ,2014 and 2015 ieee projects list @ TMKS Infotech
Network Security ,2014 and 2015 ieee projects list @ TMKS Infotech
 
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
 
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
 
A Generalized Image Authentication Based On Statistical Moments of Color Hist...
A Generalized Image Authentication Based On Statistical Moments of Color Hist...A Generalized Image Authentication Based On Statistical Moments of Color Hist...
A Generalized Image Authentication Based On Statistical Moments of Color Hist...
 
Preserving location privacy in geo social applications
Preserving location privacy in geo social applicationsPreserving location privacy in geo social applications
Preserving location privacy in geo social applications
 
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
Oruta: Privacy-Preserving Public Auditing for Shared Data in the CloudOruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
 
Privacy Preserving Location Query Service
Privacy Preserving Location Query ServicePrivacy Preserving Location Query Service
Privacy Preserving Location Query Service
 
Securing Location of User in Geo Social Networking
Securing Location of User in Geo Social NetworkingSecuring Location of User in Geo Social Networking
Securing Location of User in Geo Social Networking
 
Be ieee 2015-16 java projects @ dreamweb techno solutions-trichy - copy - copy
Be  ieee 2015-16 java projects @ dreamweb techno solutions-trichy - copy - copyBe  ieee 2015-16 java projects @ dreamweb techno solutions-trichy - copy - copy
Be ieee 2015-16 java projects @ dreamweb techno solutions-trichy - copy - copy
 
Final year dotnet projects titles@ dreamweb techno solution trichy -
Final year  dotnet projects titles@ dreamweb techno solution trichy -Final year  dotnet projects titles@ dreamweb techno solution trichy -
Final year dotnet projects titles@ dreamweb techno solution trichy -
 

Viewers also liked

Programación depresión
Programación  depresiónProgramación  depresión
Programación depresiónMaria Jimenez
 
Lightspeed Connect - Lucas Freriks - Sooqr - Hoe site search je conversie kan...
Lightspeed Connect - Lucas Freriks - Sooqr - Hoe site search je conversie kan...Lightspeed Connect - Lucas Freriks - Sooqr - Hoe site search je conversie kan...
Lightspeed Connect - Lucas Freriks - Sooqr - Hoe site search je conversie kan...Lightspeed
 
Team201_Snapple_Plansbook_NSAC2016
Team201_Snapple_Plansbook_NSAC2016Team201_Snapple_Plansbook_NSAC2016
Team201_Snapple_Plansbook_NSAC2016Selena Rudolph
 
Perfil del proyecto (colectivo g51)
Perfil del proyecto (colectivo g51)Perfil del proyecto (colectivo g51)
Perfil del proyecto (colectivo g51)Robert Araujo
 
The family medical leave act (flma)
The family medical leave act (flma)The family medical leave act (flma)
The family medical leave act (flma)Jessica Watson
 
Permis chasser ar_2112016
Permis chasser ar_2112016Permis chasser ar_2112016
Permis chasser ar_2112016Robin Grassi
 
Identidades trigonometricas
Identidades trigonometricasIdentidades trigonometricas
Identidades trigonometricasSteban Ulloa
 
1 paso fundamentos-de-la-auditoria2 (1)
1 paso fundamentos-de-la-auditoria2 (1)1 paso fundamentos-de-la-auditoria2 (1)
1 paso fundamentos-de-la-auditoria2 (1)Michael Cardenas
 
Tema 12 de lengua
Tema 12 de lengua Tema 12 de lengua
Tema 12 de lengua 2003judo
 
Código de ética
Código de éticaCódigo de ética
Código de éticaAnnerella
 
Formas de adquirir la ciudadania
Formas de adquirir la ciudadaniaFormas de adquirir la ciudadania
Formas de adquirir la ciudadaniaRosa Martinez
 
CRM Acceleration Lisbon 2010 - Garanta o sucesso do SugarCRM na sua empresa
CRM Acceleration Lisbon 2010 - Garanta o sucesso do SugarCRM na sua empresa CRM Acceleration Lisbon 2010 - Garanta o sucesso do SugarCRM na sua empresa
CRM Acceleration Lisbon 2010 - Garanta o sucesso do SugarCRM na sua empresa DRI - Discovery/Reinvention/Integration/
 

Viewers also liked (20)

X ray-arabic
X ray-arabicX ray-arabic
X ray-arabic
 
2 ok
2 ok2 ok
2 ok
 
Programación depresión
Programación  depresiónProgramación  depresión
Programación depresión
 
Lightspeed Connect - Lucas Freriks - Sooqr - Hoe site search je conversie kan...
Lightspeed Connect - Lucas Freriks - Sooqr - Hoe site search je conversie kan...Lightspeed Connect - Lucas Freriks - Sooqr - Hoe site search je conversie kan...
Lightspeed Connect - Lucas Freriks - Sooqr - Hoe site search je conversie kan...
 
Estadistica 3
Estadistica 3Estadistica 3
Estadistica 3
 
MiT 2014
MiT 2014MiT 2014
MiT 2014
 
Team201_Snapple_Plansbook_NSAC2016
Team201_Snapple_Plansbook_NSAC2016Team201_Snapple_Plansbook_NSAC2016
Team201_Snapple_Plansbook_NSAC2016
 
Lyric bon jovi
Lyric bon joviLyric bon jovi
Lyric bon jovi
 
Perfil del proyecto (colectivo g51)
Perfil del proyecto (colectivo g51)Perfil del proyecto (colectivo g51)
Perfil del proyecto (colectivo g51)
 
The family medical leave act (flma)
The family medical leave act (flma)The family medical leave act (flma)
The family medical leave act (flma)
 
Trac115
Trac115Trac115
Trac115
 
Permis chasser ar_2112016
Permis chasser ar_2112016Permis chasser ar_2112016
Permis chasser ar_2112016
 
Identidades trigonometricas
Identidades trigonometricasIdentidades trigonometricas
Identidades trigonometricas
 
1 paso fundamentos-de-la-auditoria2 (1)
1 paso fundamentos-de-la-auditoria2 (1)1 paso fundamentos-de-la-auditoria2 (1)
1 paso fundamentos-de-la-auditoria2 (1)
 
Recuerdos del poeta
Recuerdos del poetaRecuerdos del poeta
Recuerdos del poeta
 
Tema 12 de lengua
Tema 12 de lengua Tema 12 de lengua
Tema 12 de lengua
 
Código de ética
Código de éticaCódigo de ética
Código de ética
 
Hemant Meena
Hemant MeenaHemant Meena
Hemant Meena
 
Formas de adquirir la ciudadania
Formas de adquirir la ciudadaniaFormas de adquirir la ciudadania
Formas de adquirir la ciudadania
 
CRM Acceleration Lisbon 2010 - Garanta o sucesso do SugarCRM na sua empresa
CRM Acceleration Lisbon 2010 - Garanta o sucesso do SugarCRM na sua empresa CRM Acceleration Lisbon 2010 - Garanta o sucesso do SugarCRM na sua empresa
CRM Acceleration Lisbon 2010 - Garanta o sucesso do SugarCRM na sua empresa
 

Similar to Cloaking Areas Location Based Services Using Dynamic Grid System & Privacy Encryption

Privacy - Preserving Reputation with Content Protecting Location Based Queries
Privacy - Preserving Reputation with Content Protecting Location Based QueriesPrivacy - Preserving Reputation with Content Protecting Location Based Queries
Privacy - Preserving Reputation with Content Protecting Location Based Queriesiosrjce
 
User-Defined Privacy Grid System for Continuous Location-Based Services
User-Defined Privacy Grid System for Continuous Location-Based ServicesUser-Defined Privacy Grid System for Continuous Location-Based Services
User-Defined Privacy Grid System for Continuous Location-Based Services1crore projects
 
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...IJERA Editor
 
IDP: A Privacy Provisioning Framework for TIP Attributes in Trusted Third Par...
IDP: A Privacy Provisioning Framework for TIP Attributes in Trusted Third Par...IDP: A Privacy Provisioning Framework for TIP Attributes in Trusted Third Par...
IDP: A Privacy Provisioning Framework for TIP Attributes in Trusted Third Par...Rida Qayyum
 
An Efficient User Privacy and Protecting Location Content in Location Based S...
An Efficient User Privacy and Protecting Location Content in Location Based S...An Efficient User Privacy and Protecting Location Content in Location Based S...
An Efficient User Privacy and Protecting Location Content in Location Based S...IJRST Journal
 
User defined privacy grid system
User defined privacy grid system User defined privacy grid system
User defined privacy grid system nexgentech15
 
Survey on confidentiality of the user and query processing on spatial network
Survey on confidentiality of the user and query processing on spatial networkSurvey on confidentiality of the user and query processing on spatial network
Survey on confidentiality of the user and query processing on spatial networkeSAT Journals
 
A survey on hiding user privacy in location based services through clustering
A survey on hiding user privacy in location based services through clusteringA survey on hiding user privacy in location based services through clustering
A survey on hiding user privacy in location based services through clusteringeSAT Journals
 
Privacy Preservation And Data Security In Location Based Services
Privacy Preservation And Data Security In Location Based ServicesPrivacy Preservation And Data Security In Location Based Services
Privacy Preservation And Data Security In Location Based ServicesEditorJST
 
DATA AGGREGATION AND PRIVACY FOR POLICE PATROLS
DATA AGGREGATION AND PRIVACY FOR POLICE PATROLSDATA AGGREGATION AND PRIVACY FOR POLICE PATROLS
DATA AGGREGATION AND PRIVACY FOR POLICE PATROLSijasuc
 
Situation Alert and Quality of Service using Collaborative Filtering for Web ...
Situation Alert and Quality of Service using Collaborative Filtering for Web ...Situation Alert and Quality of Service using Collaborative Filtering for Web ...
Situation Alert and Quality of Service using Collaborative Filtering for Web ...IRJET Journal
 
A Novel Solitude Conserving Location Monitoring Approach for Wireless Sensor ...
A Novel Solitude Conserving Location Monitoring Approach for Wireless Sensor ...A Novel Solitude Conserving Location Monitoring Approach for Wireless Sensor ...
A Novel Solitude Conserving Location Monitoring Approach for Wireless Sensor ...IJERA Editor
 
Use of Hidden Markov Mobility Model for Location Based Services
Use of Hidden Markov Mobility Model for Location Based ServicesUse of Hidden Markov Mobility Model for Location Based Services
Use of Hidden Markov Mobility Model for Location Based ServicesIJERA Editor
 
Live Matches , Streaming , Scores
Live Matches , Streaming , ScoresLive Matches , Streaming , Scores
Live Matches , Streaming , Scoreswebcric .site
 
Prototyping the Future Potentials of Location Based Services in the Realm of ...
Prototyping the Future Potentials of Location Based Services in the Realm of ...Prototyping the Future Potentials of Location Based Services in the Realm of ...
Prototyping the Future Potentials of Location Based Services in the Realm of ...IOSR Journals
 
Your Are Your Mobile Phone
Your Are Your Mobile PhoneYour Are Your Mobile Phone
Your Are Your Mobile Phoneguest314c4e
 
The next stage of the mnp service development in convergence environment
The next stage of the mnp service development in convergence environmentThe next stage of the mnp service development in convergence environment
The next stage of the mnp service development in convergence environmentYuriy Kargapolov
 

Similar to Cloaking Areas Location Based Services Using Dynamic Grid System & Privacy Encryption (20)

H017665256
H017665256H017665256
H017665256
 
Privacy - Preserving Reputation with Content Protecting Location Based Queries
Privacy - Preserving Reputation with Content Protecting Location Based QueriesPrivacy - Preserving Reputation with Content Protecting Location Based Queries
Privacy - Preserving Reputation with Content Protecting Location Based Queries
 
User-Defined Privacy Grid System for Continuous Location-Based Services
User-Defined Privacy Grid System for Continuous Location-Based ServicesUser-Defined Privacy Grid System for Continuous Location-Based Services
User-Defined Privacy Grid System for Continuous Location-Based Services
 
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...
 
IDP: A Privacy Provisioning Framework for TIP Attributes in Trusted Third Par...
IDP: A Privacy Provisioning Framework for TIP Attributes in Trusted Third Par...IDP: A Privacy Provisioning Framework for TIP Attributes in Trusted Third Par...
IDP: A Privacy Provisioning Framework for TIP Attributes in Trusted Third Par...
 
azd document
azd documentazd document
azd document
 
An Efficient User Privacy and Protecting Location Content in Location Based S...
An Efficient User Privacy and Protecting Location Content in Location Based S...An Efficient User Privacy and Protecting Location Content in Location Based S...
An Efficient User Privacy and Protecting Location Content in Location Based S...
 
User defined privacy grid system
User defined privacy grid system User defined privacy grid system
User defined privacy grid system
 
TMC.2020.2993599.pdf
TMC.2020.2993599.pdfTMC.2020.2993599.pdf
TMC.2020.2993599.pdf
 
Survey on confidentiality of the user and query processing on spatial network
Survey on confidentiality of the user and query processing on spatial networkSurvey on confidentiality of the user and query processing on spatial network
Survey on confidentiality of the user and query processing on spatial network
 
A survey on hiding user privacy in location based services through clustering
A survey on hiding user privacy in location based services through clusteringA survey on hiding user privacy in location based services through clustering
A survey on hiding user privacy in location based services through clustering
 
Privacy Preservation And Data Security In Location Based Services
Privacy Preservation And Data Security In Location Based ServicesPrivacy Preservation And Data Security In Location Based Services
Privacy Preservation And Data Security In Location Based Services
 
DATA AGGREGATION AND PRIVACY FOR POLICE PATROLS
DATA AGGREGATION AND PRIVACY FOR POLICE PATROLSDATA AGGREGATION AND PRIVACY FOR POLICE PATROLS
DATA AGGREGATION AND PRIVACY FOR POLICE PATROLS
 
Situation Alert and Quality of Service using Collaborative Filtering for Web ...
Situation Alert and Quality of Service using Collaborative Filtering for Web ...Situation Alert and Quality of Service using Collaborative Filtering for Web ...
Situation Alert and Quality of Service using Collaborative Filtering for Web ...
 
A Novel Solitude Conserving Location Monitoring Approach for Wireless Sensor ...
A Novel Solitude Conserving Location Monitoring Approach for Wireless Sensor ...A Novel Solitude Conserving Location Monitoring Approach for Wireless Sensor ...
A Novel Solitude Conserving Location Monitoring Approach for Wireless Sensor ...
 
Use of Hidden Markov Mobility Model for Location Based Services
Use of Hidden Markov Mobility Model for Location Based ServicesUse of Hidden Markov Mobility Model for Location Based Services
Use of Hidden Markov Mobility Model for Location Based Services
 
Live Matches , Streaming , Scores
Live Matches , Streaming , ScoresLive Matches , Streaming , Scores
Live Matches , Streaming , Scores
 
Prototyping the Future Potentials of Location Based Services in the Realm of ...
Prototyping the Future Potentials of Location Based Services in the Realm of ...Prototyping the Future Potentials of Location Based Services in the Realm of ...
Prototyping the Future Potentials of Location Based Services in the Realm of ...
 
Your Are Your Mobile Phone
Your Are Your Mobile PhoneYour Are Your Mobile Phone
Your Are Your Mobile Phone
 
The next stage of the mnp service development in convergence environment
The next stage of the mnp service development in convergence environmentThe next stage of the mnp service development in convergence environment
The next stage of the mnp service development in convergence environment
 

Recently uploaded

Query optimization and processing for advanced database systems
Query optimization and processing for advanced database systemsQuery optimization and processing for advanced database systems
Query optimization and processing for advanced database systemsmeharikiros2
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxkalpana413121
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxSCMS School of Architecture
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxSCMS School of Architecture
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...Amil baba
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...josephjonse
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiessarkmank1
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxMustafa Ahmed
 
Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)ChandrakantDivate1
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARKOUSTAV SARKAR
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdfKamal Acharya
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Ramkumar k
 
Post office management system project ..pdf
Post office management system project ..pdfPost office management system project ..pdf
Post office management system project ..pdfKamal Acharya
 

Recently uploaded (20)

Query optimization and processing for advanced database systems
Query optimization and processing for advanced database systemsQuery optimization and processing for advanced database systems
Query optimization and processing for advanced database systems
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptx
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptx
 
Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
Post office management system project ..pdf
Post office management system project ..pdfPost office management system project ..pdf
Post office management system project ..pdf
 

Cloaking Areas Location Based Services Using Dynamic Grid System & Privacy Encryption

  • 1. 9 International Journal for Modern Trends in Science and Technology International Journal for Modern Trends in Science and Technology Volume: 02, Issue No: 11, November 2016 http://www.ijmtst.com ISSN: 2455-3778 Cloaking Areas Location Based Services Using Dynamic Grid System & Privacy Encryption S. Prashanth1 | Ms. L. Sunitha Rani2 1PG Scholar, Department of CSE, Geethanjali Engineering College, Nannur-V, Kurnool-Dist. 2Assistant Professor, Department of CSE, Geethanjali Engineering College, Nannur-V, Kurnool-Dist. To Cite this Article S. Prashanth, Ms. L. Sunitha Rani, Cloaking Areas Location Based Services Using Dynamic Grid System & Privacy Encryption, International Journal for Modern Trends in Science and Technology, Vol. 02, Issue 11, 2016, pp. 9-13. Due to the large increasing use of Location Based Services (LBS), which require personal data of the user to provide the continuous service, protecting the privacy of these data has become a challenge. An approach to preserving a privacy is through anonymity, by hiding the identity and user location data of the mobile device from the service provider(third party) or from any unauthorized party who has access at the user’s request .Considering the challenge mentioned, in this paper gives a classification according to the Architecture, approaches and techniques used in previous works, and presents a survey of solutions to provide anonymity in LBS including the open issues or possible improvements to current solutions. All of this, in order to provide guidelines for choosing the best solution approach to a specific scenery in which anonymity is required. KEYWORDS: Dynamic grid system, cloaking areas, location based services, Encryption, privacy. Copyright © 2016 International Journal for Modern Trends in Science and Technology All rights reserved. I. INTRODUCTION The consumer market for location-based services (LBS) is estimated to grow from 2.9 billion dollars in 2010 to 10.4 billion dollars in 2015. While navigation applications are currently generating the most significant revenues, location based advertising and local search will be driving the revenues going forward. The legal landscape, unfortunately, is unclear about what happens to a subscriber's location data. The nonexistence of regulatory controls has led to a growing concern about potential privacy violations arising out of the usage of a location-based application. While new regulations to plug the loopholes are being sought, the privacy conscious user currently feels reluctant to adopt one of the most functional business models of the decade. Privacy and usability are two equally important requirements for successful realization of a location-based application. Privacy (location) is loosely defined as a “personally” assessed restriction on when and where someone’s position is deemed appropriate for disclosure. To begin with, this is a very dynamic concept. Usability has a twofold meaning: a) privacy controls should be intuitive yet flexible, and b) the intended purpose of an application is reasonably maintained. Towards this end, prior research has led to the development of a number of privacy criteria, and algorithms for their optimal achievement. However, there is no known attempt to bring into view the mutual interactions between the accuracy of a location coordinate and the service quality from an application using those coordinates. Therefore, the question of what minimal location accuracy is required for a LBS application to function remains open. The common ABSTRACT
  • 2. 10 International Journal for Modern Trends in Science and Technology S. Prashanth, Ms. L. Sunitha Rani : Cloaking Areas Location Based Services Using Dynamic Grid System & Privacy Encryption man’s question is: “how important is my position to get me to the nearest coffee shop?” which unfortunately remains unanswered in the scientific community. It is worth mentioning that a separate line of research in analyzing anonymous location traces has revealed that user locations are heavily correlated, and knowing a few frequently visited locations can easily identify the user behind a certain trace. The privacy breach in these cases occurs because the location to identity mapping results in a violation of user anonymity. The proposal in this work attempts to prevent the reverse mapping from user identity to user location in a user-controllable manner. The term Location-Based Services (LBS) is a recent concept that denotes applications integrating with the general notion of services. Examples of such applications include emergency services, car navigation systems, tourist tour planning, or information delivery. In the modern environment each and every users has lots and lots of queries to analyze the locations in a global place, in that case the main motivate of server is to successfully serve the response to all the requestor without any delay as well as maintain the privacy of individuals. The basic idea of every server is the concept of load balancing; here the server requires reducing the number of queries submitted by mobile clients and query load on the server. However, mobile clients suffer from longer waiting time for the server to compute valid regions. II. PRIVATE INFORMATION RETRIEVAL (PIR) OR OBLIVIOUS TRANSFER (OT) In paper [19] the authors find the problem of protecting location privacy of the mobile user to an Oblivious transfer problem, where the issuer of the request receives only its corresponding reply and the service provider remains oblivious of the location of the user. Further on, they design some solutions based on different kinds of Oblivious Transfer (OT) namely Adaptive OT (implementing blind signatures), Dynamic OT and Proxy OT. They propose the solutions but do not provide any further analysis on the correctness or feasibility of their proposals. Based on [19], the authors in [20] propose an improved protocol by using two oblivious transfers where no third party is required to enable user’s privacy. They assume the existence of a total server, which is responsible of a group of LBS providers. The user has to perform a double OT implemented with blind signatures in order to get the key required response to the query. This solution is thought for LBS that require payment. Although PIR or OT techniques do not require a third party, they incur a much higher communication overhead between the user and the service provider, requiring the transmission of much more information than the user actually needs. III. DYNAMIC GRID SYSTEM 3.1 Spatial Cloaking This technique is the most commonly used for protecting user location data from the third party attackers where in this technique extracted user location is blurred before submitting into service provider server for processing The solution proposed in this area is further classified by the architectural approach. 3.2 Semi Trusted Third Party (Dynamic Grid System) To overcome the problem of in the above architecture propose a new architecture called dynamic grid system (DGS) [4] to provide privacy- preserving snapshot and continuous LBS. The main idea is to place a semi-trusted third party, termed query server (QS), between the user and the service provider. QS only needs to be semi-trusted because it will not collect/ store or even have access to any user location information. Fig: 1. Architecture The user encrypts a query that includes the information of the query area and the dynamic grid structure, and encrypts the identity of each grid cell intersecting the required search area of the spatial query to produce a set of encrypted identifiers. Next, the user sends a request including (1) the encrypted query and (2) the encrypted identifiers to QS, which is a semi-trusted party located between the user and SP. QS stores the encrypted identifiers and forwards the encrypted query to SP specified by the user. SP
  • 3. 11 International Journal for Modern Trends in Science and Technology S. Prashanth, Ms. L. Sunitha Rani : Cloaking Areas Location Based Services Using Dynamic Grid System & Privacy Encryption decrypts the query and selects the POIs within the query area from its database. For each selected POI, SP encrypts its information, using the dynamic grid structure specified by the user to find a grid cell covering the POI, and encrypts the cell identity to produce the encrypted identifier for that POI. The encrypted POIs with their corresponding encrypted identifiers are returned to QS. QS stores the set of encrypted POIs and only returns to the user a subset of encrypted POIs whose corresponding identifiers match any one of the encrypted identifiers initially sent by the user Algorithm for DGS Input: User location (x, y), POI data P Output: User's POI Query data U(P). Initialization: i. User Select POI Type P(t), QS Query Server, SP Service Provider. ii. User set location, defined x, y (Current exact Location). letxu,yu∈ U, Map.getBounds(xu,yu) return(xb,yb), ( xt,yt) where b- bottom, t- top Key Derivation Function KDF() returnsk (random key) Enc(query) = IBE(P(t), k, ( xb,yb), ( xt,yt)) // At User side Enc(query), User data of U fwd toQS. Create ID for Query and fwdEnc(query) to SP Decrpt(query) at SP, get (xc,yc)= Map.getCenter(( xb,yb), ( xt,yt)); while data != nulll get POI P ∈ P(t), sort based on dist, create Query Set U(p). end while return Query Set U(p) to QS At QS, fwd Query Set to User Decrpt(query set U(P)) at USer, 3.3 Identity Based Encryption (IBE) For an effective key management system these are all requirements 2] Authenticate users and decrypt data 3] Manage keys with partners 4] Deliver keys to trusted infrastructure components 5] Recover keys Adi Shamir, one of the pioneers of public key cryptography, proposed a new type of public key algorithm in 1984. While public key systems have the inherent problem of distributing public keys and tying those public keys to a specific receiver. The scheme has chosen cipher text security in the random oracle model assuming a variant of the computational Diffie- Hellman problem. This system is based on bilinear maps between groups. In this paper we propose a fully functional identity-based encryption scheme. The performance of our system is comparable to the performance of ElGamal encryption. The security of our system is based on a natural analogue of the computational Diffie-Hellman assumption. this assumption showed that the new system has chosen cipher text security in the random oracle model. Using standard techniques from threshold cryptography [23, 24] the PKG in our scheme can be distributed so that the master-key is never available in a single location. Comparisons Table Parameter Existing System (TTP) Proposed System (DGS) Computation Cost(Number of POIs) 0.6 1.4 Communication Cost(Number of POIs) 1000 10000 Computation Cost Number of Users (thousands) 0.8 0.6 Communication Cost Number of Users (thousands) 0.1 25 K-Anonymity Computation Cost 0.2 10 K-Anonymity Communication Cost 0.1 10 IV. RESULTS Fig.2 .Grid of user location preparation.
  • 4. 12 International Journal for Modern Trends in Science and Technology S. Prashanth, Ms. L. Sunitha Rani : Cloaking Areas Location Based Services Using Dynamic Grid System & Privacy Encryption Fig. 3. Preparation of Query Fig 4. Encrypted Query forward to SP at QS Fig. 5. POI results got at User V. CONCLUSION It is necessary to propose new models that address new threats and attack models, which seek to break user’s privacy in Location Based Services. These new models need to overcome the disadvantages of existing ones. Novel solutions approaches could combine different proposed solutions, to compensate the disadvantages of certain models with the advantages of others. The job of updating or proposing a new survey will remain as an open task, as the development of new solutions to protect user’s privacy in Location Based Services remains active; moreover it is necessary to classify the solutions by the privacy degree they offer, the attack model(s) from which they are resilient and the type of LBS to which they can be applied. REFERENCES [1] Schiller, J. Voisard, A.: Location-Based Services. Morgan Kaufmann Publishers (2004) [2] Mohaisen, A., Hong, D., Nyang, D.: Privacy in Location based services: Primitives toward the solution. NCM (2008) [3] C.-Y. Chow and M. F. Mokbel, “Enabling private continuous queries for revealed user locations,” in Proc. 10th Int. Conf. Adv. Spatial Temporal Databases, 2007, pp. 258–273. [4] B. Gedik and L. Liu, “Protecting location privacy with personalized k-anonymity: Architecture and algorithms,” IEEE Trans. Mobile Comput., vol. 7, no. 1, pp. 1–18, Jan. 2008. [5] M. Gruteser and D. Grunwald, “Anonymous usage of locationbased services through spatial and temporal cloaking,” in Proc. 1st Int. Conf. Mobile Syst., Appl. Services, 2003, pp. 31–42. [6] P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias, “Preventing location-based identity inference in anonymous spatial queries,” IEEE Trans. Knowl. Data Eng., vol. 19, no. 12, pp. 1719–1733, Dec. 2007. [7] M. F. Mokbel, C.-Y. Chow, and W. G. Aref, “The new casper: Query processing for location services withoutcompromising privacy,” in Proc. 32nd Int. Conf. Very Large Data Bases, 2006, pp. 763–774. [8] T. Xu and Y. Cai, “Location anonymity in continuous locationbased services,” in Proc. 15th Annu. ACM Int. Symp. Adv. Geographic Inf. Syst., 2007, pp. 39:1–39:8. [9] Kido, H., Yanagisawa, Y., Satoh, T. An Anonymous Communication Technique using Dummies for Location-based Services. In: IEEE International Conference on Pervasive Services ICPS (2005) 88–97 [10]Lu, H., Jensen, C.S., Yiu, M.L.: PAD: Privacy-Area Aware. Dummy-Based Location Privacy in Mobile Services MobiDE (2008) 16–23
  • 5. 13 International Journal for Modern Trends in Science and Technology S. Prashanth, Ms. L. Sunitha Rani : Cloaking Areas Location Based Services Using Dynamic Grid System & Privacy Encryption [11]Bamba, B., Liu, L., Pesti, P., Wang, T.: Supporting anonymous location queries in mobile environments with privacy grid. In: Proceedings of the International World Wide Web Conference, WWW (2008) [12]Gedik, B.,Liu, L.: Protecting location privacy with personalized k-anonymity: Architecture and algorithms. In: IEEE Transactions on Mobile Computing, TMC (2008) 1–18 [13]Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the International Conference on Mobile Systems,Applications, and Services, MobiSys (2003) [14]Roman Schlegel, Member, IEEE, Chi-Yin Chow, Member, IEEE, Qiong Huang, Member, IEEE, and Duncan S. Wong, Member, IEEE, “User-Defined Privacy Grid System for Continuous Location-Based Services”, IEEE Transactions on Mobile Computing, 2015. [15]Ardagna, C. A., Cremonini, M., Damiani, E., De Capitani di Vimercati S., Samarati, P.: Location privacy protection through obfuscation based techniques. Data and Applications Security XXI, Volume 4602 (2007) [16]Wightman, P.M.; Jimeno, M.A; Jabba, D.; Labrador, M.: Matlock: A location obfuscation technique for accuracy-restricted applications. 2012 IEEE Wireless Communications and Networking Conference (WCNC) (2012) [17]Di Pietro, R., Mandati, R., Verde, N.V.: Track me if you can: Transparent obfuscation for Location based Services. 2013 IEEE 14th International Symposium and Workshops on World of Wireless, Mobile and Multimedia Networks (WoWMoM) (2013)