SlideShare a Scribd company logo
1 of 1
Download to read offline
TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE
IN A LOCATION PROOF UPDATING SYSTEM
ABSTRACT:
Today's location-sensitive service relies on user's mobile device to determine the current
location. This allows malicious users to access a restricted resource or provide bogus alibis by
cheating on their locations. To address this issue, we propose A Privacy-Preserving LocAtion
proof Updating System (APPLAUS) in which colocated Bluetooth enabled mobile devices
mutually generate location proofs and send updates to a location proof server. Periodically
changed pseudonyms are used by the mobile devices to protect source location privacy from
each other, and from the untrusted location proof server.
We develop user-centric location privacy model in which individual users evaluate their location
privacy levels and decide whether and when to accept the location proof requests. In order to
defend against colluding attacks, we also present betweenness ranking-based and correlation
clustering-based approaches for outlier detection. APPLAUS can be implemented with existing
network infrastructure, and can be easily deployed in Bluetooth enabled mobile devices with
little computation or power cost. Extensive experimental results show that APPLAUS can
effectively provide location proofs, significantly preserve the source location privacy, and
effectively detect colluding attacks.
ECWAY TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE
CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111
VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com

More Related Content

Similar to Privacy Preserving Location Proof System

Android toward privacy preserving and collusion resistance in a location pro...
Android  toward privacy preserving and collusion resistance in a location pro...Android  toward privacy preserving and collusion resistance in a location pro...
Android toward privacy preserving and collusion resistance in a location pro...Ecwaytechnoz
 
Android toward privacy preserving and collusion resistance in a location pro...
Android  toward privacy preserving and collusion resistance in a location pro...Android  toward privacy preserving and collusion resistance in a location pro...
Android toward privacy preserving and collusion resistance in a location pro...Ecway2004
 
Android toward privacy preserving and collusion resistance in a location pro...
Android  toward privacy preserving and collusion resistance in a location pro...Android  toward privacy preserving and collusion resistance in a location pro...
Android toward privacy preserving and collusion resistance in a location pro...Ecwaytechnoz
 
Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...Ecwayt
 
Android toward privacy preserving and collusion resistance in a location pro...
Android  toward privacy preserving and collusion resistance in a location pro...Android  toward privacy preserving and collusion resistance in a location pro...
Android toward privacy preserving and collusion resistance in a location pro...Ecwaytech
 
Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...Ecwaytech
 
Android toward privacy preserving and collusion resistance in a location pro...
Android  toward privacy preserving and collusion resistance in a location pro...Android  toward privacy preserving and collusion resistance in a location pro...
Android toward privacy preserving and collusion resistance in a location pro...Ecwaytechnoz
 
Android toward privacy preserving and collusion resistance in a location pro...
Android  toward privacy preserving and collusion resistance in a location pro...Android  toward privacy preserving and collusion resistance in a location pro...
Android toward privacy preserving and collusion resistance in a location pro...Ecwayt
 
Dotnet toward privacy preserving and collusion resistance in a location proo...
Dotnet  toward privacy preserving and collusion resistance in a location proo...Dotnet  toward privacy preserving and collusion resistance in a location proo...
Dotnet toward privacy preserving and collusion resistance in a location proo...Ecwaytech
 
Android toward privacy preserving and collusion resistance in a location pro...
Android  toward privacy preserving and collusion resistance in a location pro...Android  toward privacy preserving and collusion resistance in a location pro...
Android toward privacy preserving and collusion resistance in a location pro...Ecway2004
 
ON THE VULNERABILITIES OF VORONOI-BASED APPROACHES TO MOBILE SENSOR DEPLOYMENT
ON THE VULNERABILITIES OF VORONOI-BASED  APPROACHES TO MOBILE SENSOR DEPLOYMENTON THE VULNERABILITIES OF VORONOI-BASED  APPROACHES TO MOBILE SENSOR DEPLOYMENT
ON THE VULNERABILITIES OF VORONOI-BASED APPROACHES TO MOBILE SENSOR DEPLOYMENTNexgen Technology
 
Hiding in the mobile crowd location privacy through collaboration
Hiding in the mobile crowd location privacy through collaborationHiding in the mobile crowd location privacy through collaboration
Hiding in the mobile crowd location privacy through collaborationJPINFOTECH JAYAPRAKASH
 
Woral Seminar port
Woral Seminar portWoral Seminar port
Woral Seminar portAmar Raj
 
Woral seminar report
Woral seminar reportWoral seminar report
Woral seminar reportAmar Raj
 
Discovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networksDiscovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networksIEEEFINALYEARPROJECTS
 
JPD1435 Preserving Location Privacy in Geosocial Applications
JPD1435   Preserving Location Privacy in Geosocial ApplicationsJPD1435   Preserving Location Privacy in Geosocial Applications
JPD1435 Preserving Location Privacy in Geosocial Applicationschennaijp
 
Mobile Computing IEEE 2014 Projects
Mobile Computing IEEE 2014 ProjectsMobile Computing IEEE 2014 Projects
Mobile Computing IEEE 2014 ProjectsVijay Karan
 
The three tier security scheme in wireless
The three tier security scheme in wirelessThe three tier security scheme in wireless
The three tier security scheme in wirelessIMPULSE_TECHNOLOGY
 

Similar to Privacy Preserving Location Proof System (20)

Android toward privacy preserving and collusion resistance in a location pro...
Android  toward privacy preserving and collusion resistance in a location pro...Android  toward privacy preserving and collusion resistance in a location pro...
Android toward privacy preserving and collusion resistance in a location pro...
 
Android toward privacy preserving and collusion resistance in a location pro...
Android  toward privacy preserving and collusion resistance in a location pro...Android  toward privacy preserving and collusion resistance in a location pro...
Android toward privacy preserving and collusion resistance in a location pro...
 
Android toward privacy preserving and collusion resistance in a location pro...
Android  toward privacy preserving and collusion resistance in a location pro...Android  toward privacy preserving and collusion resistance in a location pro...
Android toward privacy preserving and collusion resistance in a location pro...
 
Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...
 
Android toward privacy preserving and collusion resistance in a location pro...
Android  toward privacy preserving and collusion resistance in a location pro...Android  toward privacy preserving and collusion resistance in a location pro...
Android toward privacy preserving and collusion resistance in a location pro...
 
Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...
 
Android toward privacy preserving and collusion resistance in a location pro...
Android  toward privacy preserving and collusion resistance in a location pro...Android  toward privacy preserving and collusion resistance in a location pro...
Android toward privacy preserving and collusion resistance in a location pro...
 
Android toward privacy preserving and collusion resistance in a location pro...
Android  toward privacy preserving and collusion resistance in a location pro...Android  toward privacy preserving and collusion resistance in a location pro...
Android toward privacy preserving and collusion resistance in a location pro...
 
Dotnet toward privacy preserving and collusion resistance in a location proo...
Dotnet  toward privacy preserving and collusion resistance in a location proo...Dotnet  toward privacy preserving and collusion resistance in a location proo...
Dotnet toward privacy preserving and collusion resistance in a location proo...
 
Android toward privacy preserving and collusion resistance in a location pro...
Android  toward privacy preserving and collusion resistance in a location pro...Android  toward privacy preserving and collusion resistance in a location pro...
Android toward privacy preserving and collusion resistance in a location pro...
 
azd document
azd documentazd document
azd document
 
ON THE VULNERABILITIES OF VORONOI-BASED APPROACHES TO MOBILE SENSOR DEPLOYMENT
ON THE VULNERABILITIES OF VORONOI-BASED  APPROACHES TO MOBILE SENSOR DEPLOYMENTON THE VULNERABILITIES OF VORONOI-BASED  APPROACHES TO MOBILE SENSOR DEPLOYMENT
ON THE VULNERABILITIES OF VORONOI-BASED APPROACHES TO MOBILE SENSOR DEPLOYMENT
 
Hiding in the mobile crowd location privacy through collaboration
Hiding in the mobile crowd location privacy through collaborationHiding in the mobile crowd location privacy through collaboration
Hiding in the mobile crowd location privacy through collaboration
 
Location proof
Location proofLocation proof
Location proof
 
Woral Seminar port
Woral Seminar portWoral Seminar port
Woral Seminar port
 
Woral seminar report
Woral seminar reportWoral seminar report
Woral seminar report
 
Discovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networksDiscovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networks
 
JPD1435 Preserving Location Privacy in Geosocial Applications
JPD1435   Preserving Location Privacy in Geosocial ApplicationsJPD1435   Preserving Location Privacy in Geosocial Applications
JPD1435 Preserving Location Privacy in Geosocial Applications
 
Mobile Computing IEEE 2014 Projects
Mobile Computing IEEE 2014 ProjectsMobile Computing IEEE 2014 Projects
Mobile Computing IEEE 2014 Projects
 
The three tier security scheme in wireless
The three tier security scheme in wirelessThe three tier security scheme in wireless
The three tier security scheme in wireless
 

Privacy Preserving Location Proof System

  • 1. TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM ABSTRACT: Today's location-sensitive service relies on user's mobile device to determine the current location. This allows malicious users to access a restricted resource or provide bogus alibis by cheating on their locations. To address this issue, we propose A Privacy-Preserving LocAtion proof Updating System (APPLAUS) in which colocated Bluetooth enabled mobile devices mutually generate location proofs and send updates to a location proof server. Periodically changed pseudonyms are used by the mobile devices to protect source location privacy from each other, and from the untrusted location proof server. We develop user-centric location privacy model in which individual users evaluate their location privacy levels and decide whether and when to accept the location proof requests. In order to defend against colluding attacks, we also present betweenness ranking-based and correlation clustering-based approaches for outlier detection. APPLAUS can be implemented with existing network infrastructure, and can be easily deployed in Bluetooth enabled mobile devices with little computation or power cost. Extensive experimental results show that APPLAUS can effectively provide location proofs, significantly preserve the source location privacy, and effectively detect colluding attacks. ECWAY TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111 VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com