SlideShare a Scribd company logo
1 of 5
Hiding in the Mobile Crowd: Location Privacy through 
Collaboration 
ABSTRACT: 
Location-aware smartphones support various location-based services (LBSs): users 
query the LBS server and learn on the fly about their surroundings. However, such 
queries give away private information, enabling the LBS to track users. We 
address this problem by proposing a user-collaborative privacy-preserving 
approach for LBSs. Our solution does not require changing the LBS server 
architecture and does not assume third party servers; yet, it significantly improves 
users’ location privacy. The gain stems from the collaboration of mobile devices: 
they keep their context information in a buffer and pass it to others seeking such 
information. Thus, a user remains hidden from the server, unless all the 
collaborative peers in the vicinity lack the sought information. We evaluate our 
scheme against the Bayesian localization attacks that allow for strong adversaries 
who can incorporate prior knowledge in their attacks. We develop a novel 
epidemic model to capture the, possibly time-dependent, dynamics of information 
propagation among users. Used in the Bayesian inference framework, this model 
helps analyze the effects of various parameters, such as users’ querying rates and
the lifetime of context information, on users’ location privacy. The results show 
that our scheme hides a high fraction of location-based queries, thus significantly 
enhancing users’ location privacy. Our simulations with real mobility traces 
corroborate our model-based findings. Finally, our implementation on mobile 
platforms indicates that it is lightweight and the cost of collaboration is negligible. 
EXISTING SYSTEM: 
Among other increasingly powerful mobile computing devices, offer various 
methods of localization. Integrated GPS receivers, or positioning services based on 
nearby communication infrastructure (Wi-Fi access points or base stations of 
cellular networks), enable users to position themselves fairly accurately, which has 
led to a wide offering of Location-based Services (LBSs). Such services can be 
queried by users to provide real-time information related to the current position 
and surroundings of the device, e.g., contextual data about points of interest such 
as petrol stations, or more dynamic information such as traffic conditions. The 
value of LBSs is in their ability to obtain on the fly up-to-date information. 
Although LBSs are convenient, disclosing location information can be dangerous. 
Each time an LBS query is submitted, private information is revealed. Users can be 
linked to their locations, and multiple pieces of such information can be linked
together. They can then be profiled, which leads to unsolicited targeted 
advertisements or price discrimination. 
DISADVANTAGES OF EXISTING SYSTEM: 
 Can be inferred from a user’s whereabouts. This could make user the target 
of blackmail or harassment. 
 A stalker can also exploit the location information. 
 Misuse their rich data by, e.g., selling it to advertisers or to private 
investigators. 
PROPOSED SYSTEM: 
We propose a novel location-privacy preserving mechanism for LBSs. To take 
advantage of the high effectiveness of hiding user queries from the server, which 
minimizes the exposed information about the users’ location to the server, we 
propose a mechanism in which a user can hide in the mobile crowd while using the 
service. The rationale behind our scheme is that users who already have some 
location-specific information (originally given by the service provider) can pass it 
to other users who are seeking such information. They can do so in a wireless peer-to- 
peer manner. Simply put, information about a location can “remain” around the
location it relates to and change hands several times before it expires. Our 
proposed collaborative scheme enables many users to get such location-specific 
information from each other without contacting the server, hence minimizing the 
disclosure of their location information to the adversary 
ADVANTAGES OF PROPOSED SYSTEM: 
 The System is attached to the information and protected with the digital 
signature. 
 Malicious users cannot mislead others into receiving fake information, 
because messages are digitally signed by the LBS. 
 A user’s query becomes hidden from the server due to MobiCrowd protocol. 
SYSTEM REQUIREMENTS: 
HARDWARE REQUIREMENTS: 
 System : Pentium IV 2.4 GHz. 
 Hard Disk : 40 GB. 
 Floppy Drive : 1.44 Mb. 
 Monitor : 15 VGA Colour. 
 Mouse : Logitech.
 Ram : 512 Mb. 
 MOBILE : ANDROID 
SOFTWARE REQUIREMENTS: 
 Operating system : Windows XP/7. 
 Coding Language : Java 1.7 
 Tool Kit : Android 2.3 ABOVE 
 IDE : Eclipse 
REFERENCE: 
Reza Shokri, George Theodorakopoulos, Panos Papadimitratos, Ehsan Kazemi, 
and Jean-Pierre Hubaux, Fellow, IEEE “Hiding in the Mobile Crowd: Location 
Privacy through Collaboration” IEEE TRANSACTIONS ON DEPENDABLE 
AND SECURE COMPUTING, VOL. 11, NO. 3, MAY-JUNE 2014

More Related Content

More from chennaijp

More from chennaijp (20)

JPN1411 Secure Continuous Aggregation in Wireless Sensor Networks
JPN1411   Secure Continuous Aggregation in Wireless Sensor NetworksJPN1411   Secure Continuous Aggregation in Wireless Sensor Networks
JPN1411 Secure Continuous Aggregation in Wireless Sensor Networks
 
JPN1414 Distributed Deployment Algorithms for Improved Coverage in a Networ...
JPN1414   Distributed Deployment Algorithms for Improved Coverage in a Networ...JPN1414   Distributed Deployment Algorithms for Improved Coverage in a Networ...
JPN1414 Distributed Deployment Algorithms for Improved Coverage in a Networ...
 
JPN1413 An Energy-Balanced Routing Method Based on Forward-Aware Factor for...
JPN1413   An Energy-Balanced Routing Method Based on Forward-Aware Factor for...JPN1413   An Energy-Balanced Routing Method Based on Forward-Aware Factor for...
JPN1413 An Energy-Balanced Routing Method Based on Forward-Aware Factor for...
 
JPN1412 Transmission-Efficient Clustering Method for Wireless Sensor Networ...
JPN1412   Transmission-Efficient Clustering Method for Wireless Sensor Networ...JPN1412   Transmission-Efficient Clustering Method for Wireless Sensor Networ...
JPN1412 Transmission-Efficient Clustering Method for Wireless Sensor Networ...
 
JPN1410 Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
JPN1410  Secure and Efficient Data Transmission for Cluster-Based Wireless Se...JPN1410  Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
JPN1410 Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
 
JPN1409 Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless Networks
JPN1409  Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless NetworksJPN1409  Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless Networks
JPN1409 Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless Networks
 
JPN1408 Hop-by-Hop Message Authentication and Source Privacy in Wireless Sen...
JPN1408  Hop-by-Hop Message Authentication and Source Privacy in Wireless Sen...JPN1408  Hop-by-Hop Message Authentication and Source Privacy in Wireless Sen...
JPN1408 Hop-by-Hop Message Authentication and Source Privacy in Wireless Sen...
 
JPN1406 Snapshot and Continuous Data Collection in Probabilistic Wireless S...
JPN1406   Snapshot and Continuous Data Collection in Probabilistic Wireless S...JPN1406   Snapshot and Continuous Data Collection in Probabilistic Wireless S...
JPN1406 Snapshot and Continuous Data Collection in Probabilistic Wireless S...
 
JPN1405 RBTP: Low-Power Mobile Discovery Protocol through Recursive Binary T...
JPN1405  RBTP: Low-Power Mobile Discovery Protocol through Recursive Binary T...JPN1405  RBTP: Low-Power Mobile Discovery Protocol through Recursive Binary T...
JPN1405 RBTP: Low-Power Mobile Discovery Protocol through Recursive Binary T...
 
JPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETs
JPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETsJPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETs
JPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETs
 
JPM1410 Images as Occlusions of Textures: A Framework for Segmentation
JPM1410   Images as Occlusions of Textures: A Framework for SegmentationJPM1410   Images as Occlusions of Textures: A Framework for Segmentation
JPM1410 Images as Occlusions of Textures: A Framework for Segmentation
 
JPM1407 Exposing Digital Image Forgeries by Illumination Color Classification
JPM1407   Exposing Digital Image Forgeries by Illumination Color ClassificationJPM1407   Exposing Digital Image Forgeries by Illumination Color Classification
JPM1407 Exposing Digital Image Forgeries by Illumination Color Classification
 
JPM1417 Characterness: An Indicator of Text in the Wild
JPM1417   Characterness: An Indicator of Text in the WildJPM1417   Characterness: An Indicator of Text in the Wild
JPM1417 Characterness: An Indicator of Text in the Wild
 
JPM1416 A Unified Data Embedding and Scrambling Method
JPM1416   A Unified Data Embedding and Scrambling MethodJPM1416   A Unified Data Embedding and Scrambling Method
JPM1416 A Unified Data Embedding and Scrambling Method
 
JPM1415 Scene Text Recognition in Mobile Applications by Character Descripto...
JPM1415  Scene Text Recognition in Mobile Applications by Character Descripto...JPM1415  Scene Text Recognition in Mobile Applications by Character Descripto...
JPM1415 Scene Text Recognition in Mobile Applications by Character Descripto...
 
JPM1414 Progressive Image Denoising Through Hybrid Graph Laplacian Regulariz...
JPM1414  Progressive Image Denoising Through Hybrid Graph Laplacian Regulariz...JPM1414  Progressive Image Denoising Through Hybrid Graph Laplacian Regulariz...
JPM1414 Progressive Image Denoising Through Hybrid Graph Laplacian Regulariz...
 
JPM1413 Phase-Based Binarization of Ancient Document Images: Model and Appl...
JPM1413   Phase-Based Binarization of Ancient Document Images: Model and Appl...JPM1413   Phase-Based Binarization of Ancient Document Images: Model and Appl...
JPM1413 Phase-Based Binarization of Ancient Document Images: Model and Appl...
 
JPM1412 Mining Weakly Labeled Web Facial Images for Search-Based Face Annota...
JPM1412  Mining Weakly Labeled Web Facial Images for Search-Based Face Annota...JPM1412  Mining Weakly Labeled Web Facial Images for Search-Based Face Annota...
JPM1412 Mining Weakly Labeled Web Facial Images for Search-Based Face Annota...
 
JPM1406 Dual-Geometric Neighbor Embedding for Image Super Resolution With Sp...
JPM1406  Dual-Geometric Neighbor Embedding for Image Super Resolution With Sp...JPM1406  Dual-Geometric Neighbor Embedding for Image Super Resolution With Sp...
JPM1406 Dual-Geometric Neighbor Embedding for Image Super Resolution With Sp...
 
JPM1404 Designing an Efficient Image Encryption-Then-Compression System via...
JPM1404   Designing an Efficient Image Encryption-Then-Compression System via...JPM1404   Designing an Efficient Image Encryption-Then-Compression System via...
JPM1404 Designing an Efficient Image Encryption-Then-Compression System via...
 

Recently uploaded

AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 

Recently uploaded (20)

MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 

JPA1412 Hiding in the Mobile Crowd: Location Privacy through Collaboration

  • 1. Hiding in the Mobile Crowd: Location Privacy through Collaboration ABSTRACT: Location-aware smartphones support various location-based services (LBSs): users query the LBS server and learn on the fly about their surroundings. However, such queries give away private information, enabling the LBS to track users. We address this problem by proposing a user-collaborative privacy-preserving approach for LBSs. Our solution does not require changing the LBS server architecture and does not assume third party servers; yet, it significantly improves users’ location privacy. The gain stems from the collaboration of mobile devices: they keep their context information in a buffer and pass it to others seeking such information. Thus, a user remains hidden from the server, unless all the collaborative peers in the vicinity lack the sought information. We evaluate our scheme against the Bayesian localization attacks that allow for strong adversaries who can incorporate prior knowledge in their attacks. We develop a novel epidemic model to capture the, possibly time-dependent, dynamics of information propagation among users. Used in the Bayesian inference framework, this model helps analyze the effects of various parameters, such as users’ querying rates and
  • 2. the lifetime of context information, on users’ location privacy. The results show that our scheme hides a high fraction of location-based queries, thus significantly enhancing users’ location privacy. Our simulations with real mobility traces corroborate our model-based findings. Finally, our implementation on mobile platforms indicates that it is lightweight and the cost of collaboration is negligible. EXISTING SYSTEM: Among other increasingly powerful mobile computing devices, offer various methods of localization. Integrated GPS receivers, or positioning services based on nearby communication infrastructure (Wi-Fi access points or base stations of cellular networks), enable users to position themselves fairly accurately, which has led to a wide offering of Location-based Services (LBSs). Such services can be queried by users to provide real-time information related to the current position and surroundings of the device, e.g., contextual data about points of interest such as petrol stations, or more dynamic information such as traffic conditions. The value of LBSs is in their ability to obtain on the fly up-to-date information. Although LBSs are convenient, disclosing location information can be dangerous. Each time an LBS query is submitted, private information is revealed. Users can be linked to their locations, and multiple pieces of such information can be linked
  • 3. together. They can then be profiled, which leads to unsolicited targeted advertisements or price discrimination. DISADVANTAGES OF EXISTING SYSTEM:  Can be inferred from a user’s whereabouts. This could make user the target of blackmail or harassment.  A stalker can also exploit the location information.  Misuse their rich data by, e.g., selling it to advertisers or to private investigators. PROPOSED SYSTEM: We propose a novel location-privacy preserving mechanism for LBSs. To take advantage of the high effectiveness of hiding user queries from the server, which minimizes the exposed information about the users’ location to the server, we propose a mechanism in which a user can hide in the mobile crowd while using the service. The rationale behind our scheme is that users who already have some location-specific information (originally given by the service provider) can pass it to other users who are seeking such information. They can do so in a wireless peer-to- peer manner. Simply put, information about a location can “remain” around the
  • 4. location it relates to and change hands several times before it expires. Our proposed collaborative scheme enables many users to get such location-specific information from each other without contacting the server, hence minimizing the disclosure of their location information to the adversary ADVANTAGES OF PROPOSED SYSTEM:  The System is attached to the information and protected with the digital signature.  Malicious users cannot mislead others into receiving fake information, because messages are digitally signed by the LBS.  A user’s query becomes hidden from the server due to MobiCrowd protocol. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.
  • 5.  Ram : 512 Mb.  MOBILE : ANDROID SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7.  Coding Language : Java 1.7  Tool Kit : Android 2.3 ABOVE  IDE : Eclipse REFERENCE: Reza Shokri, George Theodorakopoulos, Panos Papadimitratos, Ehsan Kazemi, and Jean-Pierre Hubaux, Fellow, IEEE “Hiding in the Mobile Crowd: Location Privacy through Collaboration” IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 11, NO. 3, MAY-JUNE 2014