SlideShare a Scribd company logo
1 of 6
Toward Privacy Preserving and Collusion Resistance in a
Location Proof Updating System
ABSTRACT:
Today’s location-sensitive service relies on user’s mobile device to determine the
current location. This allows malicious users to access a restricted resource or
provide bogus alibis by cheating on their locations. To address this issue, we
propose A Privacy-Preserving Location proof Updating System (APPLAUS) in
which co-located Bluetooth enabled mobile devices mutually generate location
proofs and send updates to a location proof server. Periodically changed
pseudonyms are used by the mobile devices to protect source location privacy from
each other, and from the untrusted location proof server. We also develop user-
centric location privacy model in which individual users evaluate their location
privacy levels and decide whether and when to accept the location proof requests.
In order to defend against colluding attacks, we also present between’s ranking-
based and correlation clustering-based approaches for outlier detection. APPLAUS
can be implemented with existing network infrastructure, and can be easily
deployed in Bluetooth enabled mobile devices with little computation or power
cost. Extensive experimental results show that APPLAUS can effectively provide
location proofs, significantly preserve the source location privacy, and effectively
detect colluding attacks.
EXISTING SYSTEM:
There are many kinds of location-sensitive applications. One category is location-
based access control. For example, a hospital may allow patient information access
only when doctors or nurses can prove that they are in a particular room of the
hospital. Another class of location-sensitive applications requires users to provide
past location proofs such as auto insurance quote in which auto insurance
companies offer discounts to drivers who can prove that they take safe routes
during their daily commutes, police investigations in which detectives are
interested in finding out if a person was at a murder scene at some time, and
location-based social networking in which a user can ask for a location proof from
the service requester and accepts the request only if the sender is able to present a
valid location proof. The common theme across these location sensitive
applications is that they offer a reward or benefit to users located in a certain
geographical location at a certain time. Thus, users have the incentive to cheat on
their locations.
DISADVANTAGES OF EXISTING SYSTEM:
 In the location-sensitive applications there is a lack of secure mechanism to
provide their current or past locations to applications and services.
 Although cellular service providers have tracking services that can help verify
the locations of mobile users in real time, the accuracy is not good enough and
the location history cannot be verified.
PROPOSED SYSTEM:
In this paper, we propose A Privacy-Preserving Location proof Updating System
(APPLAUS), which does not rely on the wide deployment of network
infrastructure or the expensive trusted computing module. In APPLAUS, Bluetooth
enabled mobile devices in range mutually generate location proofs, which are
uploaded to an untrusted location proof server that can verify the trust level of each
location proof. An authorized verifier can query and retrieve location proofs from
the server. Moreover, our location proof system guarantees user location privacy
from every party. More specifically, we use statistically updated pseudonyms at
each mobile device to protect location privacy from each other, and from the
untrusted location proof server. We develop a user-centric location privacy model
in which individual users evaluate their location privacy levels in real time and
decide whether and when to accept a location proof request. In order to defend
against colluding attacks, we also present between’s ranking-based and correlation
clustering-based approaches for outlier detection.
ADVANTAGES OF PROPOSED SYSTEM:
APPLAUS can effectively provide location proofs, significantly preserve the
sourcelocation privacy, and effectively detect colluding attacks.
SYSTEM ARCHITECTURE:
SYSTEM PROTOCOL:
ALGORITHMS USED:
Algorithm 1. Location ProofUpdate Scheduling for the prover
SYSTEM CONFIGURATION:-
HARDWARE CONFIGURATION:-
 Processor - Pentium –IV
 Speed - 1.1 Ghz
 RAM - 256 MB(min)
 Hard Disk - 20 GB
 Key Board - Standard Windows Keyboard
 Mouse - Two or Three Button Mouse
 Monitor - SVGA
SOFTWARE CONFIGURATION:-
 Operating System : Windows XP
 Programming Language : JAVA/J2EE.
 Java Version : JDK 1.6 & above.
 Database : MYSQL
REFERENCE:
Zhichao Zhu, Student Member, IEEE, and Guohong Cao, Fellow, IEEE “Toward
Privacy Preserving and Collusion Resistance in a Location Proof Updating
System”- IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 12,
NO. 1, JANUARY 2013.

More Related Content

Viewers also liked

Pack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction systemPack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction systemJPINFOTECH JAYAPRAKASH
 
A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...JPINFOTECH JAYAPRAKASH
 
Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...JPINFOTECH JAYAPRAKASH
 
Hiding in the mobile crowd location privacy through collaboration
Hiding in the mobile crowd location privacy through collaborationHiding in the mobile crowd location privacy through collaboration
Hiding in the mobile crowd location privacy through collaborationJPINFOTECH JAYAPRAKASH
 
Mobile relay configuration in data intensive wireless sensor networks
Mobile relay configuration in data intensive wireless sensor networksMobile relay configuration in data intensive wireless sensor networks
Mobile relay configuration in data intensive wireless sensor networksJPINFOTECH JAYAPRAKASH
 
A new algorithm for inferring user search goals with feedback sessions
A new algorithm for inferring user search goals with feedback sessionsA new algorithm for inferring user search goals with feedback sessions
A new algorithm for inferring user search goals with feedback sessionsJPINFOTECH JAYAPRAKASH
 
Green droid automated diagnosis of energy inefficiency for smartphone applica...
Green droid automated diagnosis of energy inefficiency for smartphone applica...Green droid automated diagnosis of energy inefficiency for smartphone applica...
Green droid automated diagnosis of energy inefficiency for smartphone applica...JPINFOTECH JAYAPRAKASH
 
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based EncryptionSecuring Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based EncryptionJPINFOTECH JAYAPRAKASH
 
Crowdsourcing predictors of behavioral outcomes
Crowdsourcing predictors of behavioral outcomesCrowdsourcing predictors of behavioral outcomes
Crowdsourcing predictors of behavioral outcomesJPINFOTECH JAYAPRAKASH
 
A stochastic model to investigate data center performance and qo s in iaas cl...
A stochastic model to investigate data center performance and qo s in iaas cl...A stochastic model to investigate data center performance and qo s in iaas cl...
A stochastic model to investigate data center performance and qo s in iaas cl...JPINFOTECH JAYAPRAKASH
 
Karamel's Pitch deck
Karamel's Pitch deckKaramel's Pitch deck
Karamel's Pitch deckAditya Putra
 
EducaçãO Em Portugal
EducaçãO Em PortugalEducaçãO Em Portugal
EducaçãO Em Portugalpatiodostolos
 
Reunió KET PET 24 d'abril
Reunió KET PET 24 d'abrilReunió KET PET 24 d'abril
Reunió KET PET 24 d'abrilmediasinguerlin
 
Vivir con los ojos cerrados
Vivir con los ojos cerradosVivir con los ojos cerrados
Vivir con los ojos cerradosenarosetti
 

Viewers also liked (20)

Pack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction systemPack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction system
 
A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...
 
Bulk ieee projects
Bulk ieee projectsBulk ieee projects
Bulk ieee projects
 
Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...
 
Hiding in the mobile crowd location privacy through collaboration
Hiding in the mobile crowd location privacy through collaborationHiding in the mobile crowd location privacy through collaboration
Hiding in the mobile crowd location privacy through collaboration
 
Mobile relay configuration in data intensive wireless sensor networks
Mobile relay configuration in data intensive wireless sensor networksMobile relay configuration in data intensive wireless sensor networks
Mobile relay configuration in data intensive wireless sensor networks
 
ieee projects for cse 2013
ieee projects for cse 2013ieee projects for cse 2013
ieee projects for cse 2013
 
A new algorithm for inferring user search goals with feedback sessions
A new algorithm for inferring user search goals with feedback sessionsA new algorithm for inferring user search goals with feedback sessions
A new algorithm for inferring user search goals with feedback sessions
 
Green droid automated diagnosis of energy inefficiency for smartphone applica...
Green droid automated diagnosis of energy inefficiency for smartphone applica...Green droid automated diagnosis of energy inefficiency for smartphone applica...
Green droid automated diagnosis of energy inefficiency for smartphone applica...
 
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based EncryptionSecuring Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
 
Collaborative policy administration
Collaborative policy administrationCollaborative policy administration
Collaborative policy administration
 
Crowdsourcing predictors of behavioral outcomes
Crowdsourcing predictors of behavioral outcomesCrowdsourcing predictors of behavioral outcomes
Crowdsourcing predictors of behavioral outcomes
 
A stochastic model to investigate data center performance and qo s in iaas cl...
A stochastic model to investigate data center performance and qo s in iaas cl...A stochastic model to investigate data center performance and qo s in iaas cl...
A stochastic model to investigate data center performance and qo s in iaas cl...
 
Karamel's Pitch deck
Karamel's Pitch deckKaramel's Pitch deck
Karamel's Pitch deck
 
Slide antoine guillaume
Slide antoine guillaumeSlide antoine guillaume
Slide antoine guillaume
 
1 sistemas unidades
1 sistemas unidades1 sistemas unidades
1 sistemas unidades
 
EducaçãO Em Portugal
EducaçãO Em PortugalEducaçãO Em Portugal
EducaçãO Em Portugal
 
Reunió KET PET 24 d'abril
Reunió KET PET 24 d'abrilReunió KET PET 24 d'abril
Reunió KET PET 24 d'abril
 
Vivir con los ojos cerrados
Vivir con los ojos cerradosVivir con los ojos cerrados
Vivir con los ojos cerrados
 
Vocabulário da vida
Vocabulário da vidaVocabulário da vida
Vocabulário da vida
 

Similar to Toward privacy preserving and collusion resistance in a location proof updating system

Java toward privacy preserving and collusion resistance in a location proof ...
Java  toward privacy preserving and collusion resistance in a location proof ...Java  toward privacy preserving and collusion resistance in a location proof ...
Java toward privacy preserving and collusion resistance in a location proof ...ecwayerode
 
Android toward privacy preserving and collusion resistance in a location pro...
Android  toward privacy preserving and collusion resistance in a location pro...Android  toward privacy preserving and collusion resistance in a location pro...
Android toward privacy preserving and collusion resistance in a location pro...ecway
 
Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...Ecway Technologies
 
Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...Ecway Technologies
 
Android toward privacy preserving and collusion resistance in a location pro...
Android  toward privacy preserving and collusion resistance in a location pro...Android  toward privacy preserving and collusion resistance in a location pro...
Android toward privacy preserving and collusion resistance in a location pro...ecway
 
Exploiting service similarity for privacy in location based search queries
Exploiting service similarity for privacy in location based search queriesExploiting service similarity for privacy in location based search queries
Exploiting service similarity for privacy in location based search queriesShakas Technologies
 
Location Provider with Privacy Using Localized Server and GPS
  Location Provider with Privacy Using Localized Server and GPS   Location Provider with Privacy Using Localized Server and GPS
Location Provider with Privacy Using Localized Server and GPS Editor IJCATR
 
Context based access control systems for mobile devices
Context based access control systems for mobile devicesContext based access control systems for mobile devices
Context based access control systems for mobile devicesshanofa sanu
 
Middleware.pptx
Middleware.pptxMiddleware.pptx
Middleware.pptxyudragispi
 
Android toward privacy preserving and collusion resistance in a location pro...
Android  toward privacy preserving and collusion resistance in a location pro...Android  toward privacy preserving and collusion resistance in a location pro...
Android toward privacy preserving and collusion resistance in a location pro...Ecwayt
 
Android toward privacy preserving and collusion resistance in a location pro...
Android  toward privacy preserving and collusion resistance in a location pro...Android  toward privacy preserving and collusion resistance in a location pro...
Android toward privacy preserving and collusion resistance in a location pro...Ecwaytechnoz
 
Android toward privacy preserving and collusion resistance in a location pro...
Android  toward privacy preserving and collusion resistance in a location pro...Android  toward privacy preserving and collusion resistance in a location pro...
Android toward privacy preserving and collusion resistance in a location pro...Ecway2004
 
Android toward privacy preserving and collusion resistance in a location pro...
Android  toward privacy preserving and collusion resistance in a location pro...Android  toward privacy preserving and collusion resistance in a location pro...
Android toward privacy preserving and collusion resistance in a location pro...Ecwaytechnoz
 
Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...Ecwayt
 
Android toward privacy preserving and collusion resistance in a location pro...
Android  toward privacy preserving and collusion resistance in a location pro...Android  toward privacy preserving and collusion resistance in a location pro...
Android toward privacy preserving and collusion resistance in a location pro...Ecwaytech
 
Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...Ecwaytech
 
Android toward privacy preserving and collusion resistance in a location pro...
Android  toward privacy preserving and collusion resistance in a location pro...Android  toward privacy preserving and collusion resistance in a location pro...
Android toward privacy preserving and collusion resistance in a location pro...Ecwaytechnoz
 

Similar to Toward privacy preserving and collusion resistance in a location proof updating system (20)

Java toward privacy preserving and collusion resistance in a location proof ...
Java  toward privacy preserving and collusion resistance in a location proof ...Java  toward privacy preserving and collusion resistance in a location proof ...
Java toward privacy preserving and collusion resistance in a location proof ...
 
Android toward privacy preserving and collusion resistance in a location pro...
Android  toward privacy preserving and collusion resistance in a location pro...Android  toward privacy preserving and collusion resistance in a location pro...
Android toward privacy preserving and collusion resistance in a location pro...
 
Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...
 
Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...
 
Android toward privacy preserving and collusion resistance in a location pro...
Android  toward privacy preserving and collusion resistance in a location pro...Android  toward privacy preserving and collusion resistance in a location pro...
Android toward privacy preserving and collusion resistance in a location pro...
 
Location proof
Location proofLocation proof
Location proof
 
Location proof
Location proof Location proof
Location proof
 
azd document
azd documentazd document
azd document
 
Exploiting service similarity for privacy in location based search queries
Exploiting service similarity for privacy in location based search queriesExploiting service similarity for privacy in location based search queries
Exploiting service similarity for privacy in location based search queries
 
Location Provider with Privacy Using Localized Server and GPS
  Location Provider with Privacy Using Localized Server and GPS   Location Provider with Privacy Using Localized Server and GPS
Location Provider with Privacy Using Localized Server and GPS
 
Context based access control systems for mobile devices
Context based access control systems for mobile devicesContext based access control systems for mobile devices
Context based access control systems for mobile devices
 
Middleware.pptx
Middleware.pptxMiddleware.pptx
Middleware.pptx
 
Android toward privacy preserving and collusion resistance in a location pro...
Android  toward privacy preserving and collusion resistance in a location pro...Android  toward privacy preserving and collusion resistance in a location pro...
Android toward privacy preserving and collusion resistance in a location pro...
 
Android toward privacy preserving and collusion resistance in a location pro...
Android  toward privacy preserving and collusion resistance in a location pro...Android  toward privacy preserving and collusion resistance in a location pro...
Android toward privacy preserving and collusion resistance in a location pro...
 
Android toward privacy preserving and collusion resistance in a location pro...
Android  toward privacy preserving and collusion resistance in a location pro...Android  toward privacy preserving and collusion resistance in a location pro...
Android toward privacy preserving and collusion resistance in a location pro...
 
Android toward privacy preserving and collusion resistance in a location pro...
Android  toward privacy preserving and collusion resistance in a location pro...Android  toward privacy preserving and collusion resistance in a location pro...
Android toward privacy preserving and collusion resistance in a location pro...
 
Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...
 
Android toward privacy preserving and collusion resistance in a location pro...
Android  toward privacy preserving and collusion resistance in a location pro...Android  toward privacy preserving and collusion resistance in a location pro...
Android toward privacy preserving and collusion resistance in a location pro...
 
Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...
 
Android toward privacy preserving and collusion resistance in a location pro...
Android  toward privacy preserving and collusion resistance in a location pro...Android  toward privacy preserving and collusion resistance in a location pro...
Android toward privacy preserving and collusion resistance in a location pro...
 

Recently uploaded

CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 

Recently uploaded (20)

CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 

Toward privacy preserving and collusion resistance in a location proof updating system

  • 1. Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System ABSTRACT: Today’s location-sensitive service relies on user’s mobile device to determine the current location. This allows malicious users to access a restricted resource or provide bogus alibis by cheating on their locations. To address this issue, we propose A Privacy-Preserving Location proof Updating System (APPLAUS) in which co-located Bluetooth enabled mobile devices mutually generate location proofs and send updates to a location proof server. Periodically changed pseudonyms are used by the mobile devices to protect source location privacy from each other, and from the untrusted location proof server. We also develop user- centric location privacy model in which individual users evaluate their location privacy levels and decide whether and when to accept the location proof requests. In order to defend against colluding attacks, we also present between’s ranking- based and correlation clustering-based approaches for outlier detection. APPLAUS can be implemented with existing network infrastructure, and can be easily deployed in Bluetooth enabled mobile devices with little computation or power cost. Extensive experimental results show that APPLAUS can effectively provide
  • 2. location proofs, significantly preserve the source location privacy, and effectively detect colluding attacks. EXISTING SYSTEM: There are many kinds of location-sensitive applications. One category is location- based access control. For example, a hospital may allow patient information access only when doctors or nurses can prove that they are in a particular room of the hospital. Another class of location-sensitive applications requires users to provide past location proofs such as auto insurance quote in which auto insurance companies offer discounts to drivers who can prove that they take safe routes during their daily commutes, police investigations in which detectives are interested in finding out if a person was at a murder scene at some time, and location-based social networking in which a user can ask for a location proof from the service requester and accepts the request only if the sender is able to present a valid location proof. The common theme across these location sensitive applications is that they offer a reward or benefit to users located in a certain geographical location at a certain time. Thus, users have the incentive to cheat on their locations.
  • 3. DISADVANTAGES OF EXISTING SYSTEM:  In the location-sensitive applications there is a lack of secure mechanism to provide their current or past locations to applications and services.  Although cellular service providers have tracking services that can help verify the locations of mobile users in real time, the accuracy is not good enough and the location history cannot be verified. PROPOSED SYSTEM: In this paper, we propose A Privacy-Preserving Location proof Updating System (APPLAUS), which does not rely on the wide deployment of network infrastructure or the expensive trusted computing module. In APPLAUS, Bluetooth enabled mobile devices in range mutually generate location proofs, which are uploaded to an untrusted location proof server that can verify the trust level of each location proof. An authorized verifier can query and retrieve location proofs from the server. Moreover, our location proof system guarantees user location privacy from every party. More specifically, we use statistically updated pseudonyms at each mobile device to protect location privacy from each other, and from the untrusted location proof server. We develop a user-centric location privacy model in which individual users evaluate their location privacy levels in real time and
  • 4. decide whether and when to accept a location proof request. In order to defend against colluding attacks, we also present between’s ranking-based and correlation clustering-based approaches for outlier detection. ADVANTAGES OF PROPOSED SYSTEM: APPLAUS can effectively provide location proofs, significantly preserve the sourcelocation privacy, and effectively detect colluding attacks. SYSTEM ARCHITECTURE:
  • 5. SYSTEM PROTOCOL: ALGORITHMS USED: Algorithm 1. Location ProofUpdate Scheduling for the prover SYSTEM CONFIGURATION:- HARDWARE CONFIGURATION:-  Processor - Pentium –IV  Speed - 1.1 Ghz  RAM - 256 MB(min)  Hard Disk - 20 GB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - SVGA
  • 6. SOFTWARE CONFIGURATION:-  Operating System : Windows XP  Programming Language : JAVA/J2EE.  Java Version : JDK 1.6 & above.  Database : MYSQL REFERENCE: Zhichao Zhu, Student Member, IEEE, and Guohong Cao, Fellow, IEEE “Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System”- IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 12, NO. 1, JANUARY 2013.