Hiding in the mobile crowd location privacy through collaboration
Location-aware smartphones support various location-based services (LBSs): users query the LBS server and learn on the fly about their surroundings. However, such queries give away private information, enabling the LBS to track users. A user-collaborative privacy-preserving approach is proposed for LBSs. This solution does not require changing the LBS server architecture and does not assume third party servers; yet, it significantly improves users’ location privacy. The gain stems from the collaboration of mobile devices: they keep their context information in a buffer and pass it to others seeking such information.
Hiding in the mobile crowd location privacy through collaboration
1. LeMeniz Infotech
36, 100 feet Road, Natesan
Nagar(Near Indira Gandhi Statue, Next
to Fish-O-Fish), Pondicherry-605 005
Call: 0413-4205444, +91 99625 88976,
95663 55386.
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976
/9566355386
Do Your Projects With Domain Experts
HIDING IN THE MOBILE CROWD LOCATION PRIVACY THROUGH COLLABORATION
ABSTRACT
Location-aware smartphones support various location-based services (LBSs): users
query the LBS server and learn on the fly about their surroundings. However, such
queries give away private information, enabling the LBS to track users. A user-collaborative
privacy-preserving approach is proposed for LBSs. This solution does
not require changing the LBS server architecture and does not assume third party
servers; yet, it significantly improves users’ location privacy. The gain stems from
the collaboration of mobile devices: they keep their context information in a
buffer and pass it to others seeking such information. Thus, a user remains hidden
from the server, unless all the collaborative peers in the vicinity lack the sought
information. A novel epidemic model is developed to capture possibly time-dependent,
dynamics of information propagation among users. Used in the
Bayesian inference framework, this model helps analyze the effects of various
parameters, such as users’ querying rates and the lifetime of context information,
on users’ location privacy. The results show that our scheme hides a high fraction
of location-based queries, thus significantly enhancing users’ location privacy.
Finally, implementation indicates that it is lightweight and the cost of
collaboration is negligible.
2. LeMeniz Infotech
36, 100 feet Road, Natesan
Nagar(Near Indira Gandhi Statue, Next
to Fish-O-Fish), Pondicherry-605 005
Call: 0413-4205444, +91 99625 88976,
95663 55386.
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976
/9566355386
Do Your Projects With Domain Experts
EXISTING SYSTEM
To enhance privacy for LBS users several solutions have been proposed and two
main categories are
Centralized and
User-centric
Centralized approaches
Centralized approaches introduce a third party in the system, which protects
users’ privacy by operating between the user and the LBS. Such an intermediary
proxy server could anonymize queries by removing any information that identifies
the user or her device.
It could blend a user’s query with those of other users, so that the LBS server
always sees a group of queries.
User-centric approaches
User-centric approaches operate on the device. Typically they aim to blur the
location information by, for example, having the user’s smartphone submit
inaccurate, noisy GPS coordinates to the LBS server.
3. LeMeniz Infotech
36, 100 feet Road, Natesan
Nagar(Near Indira Gandhi Statue, Next
to Fish-O-Fish), Pondicherry-605 005
Call: 0413-4205444, +91 99625 88976,
95663 55386.
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976
/9566355386
Do Your Projects With Domain Experts
Disadvantages
Centralized approaches
Only shift the problem. The threat of an untrustworthy LBS server is
addressed by the introduction of a new third-party server. Additionally,
new proxy servers become as attractive for attackers as centralized LBSs.
Other centralized approaches require the LBS to change its operation by,
for example, mandating that it process modified queries, or that it store
data differently.
Centralized interventions or substantial changes to the LBS operation would
be hard to adopt, simply because the LBS providers would have little
incentive to fundamentally change their operation.
User centric approaches
Obfuscation approaches that protect user location-privacy can degrade the
user experience if users need high privacy, e.g., LBS responses would be
inaccurate or untimely.
Obfuscation also is not effective against absence disclosure.
4. LeMeniz Infotech
36, 100 feet Road, Natesan
Nagar(Near Indira Gandhi Statue, Next
to Fish-O-Fish), Pondicherry-605 005
Call: 0413-4205444, +91 99625 88976,
95663 55386.
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976
/9566355386
Do Your Projects With Domain Experts
PROPOSED SYSTEM
Proposed system avoids the privacy problems of users by collaborate with
each other to jointly improve their privacy, without the need for a trusted
third-party (TTP).
In effect, the mobile crowd acts as a TTP, and the protection mechanism
becomes a distributed protocol among users.
Mobile users concerned about their location privacy are indeed the most
motivated to engage in protecting themselves.
MobiCrowd, is that users only contact the LBS server if they cannot find the
sought information among their peers, i.e., other nearby reachable user
devices.
The places where people gather are points of interest, where users are
most likely to query an LBS. Thus, MobiCrowd would be used exactly
where it is most effective.
Advantages
Users can minimize their location information leakage by hiding in the
crowd.
MobiCrowd would be most effective when there are many peers gathered
at the same location.
5. LeMeniz Infotech
36, 100 feet Road, Natesan
Nagar(Near Indira Gandhi Statue, Next
to Fish-O-Fish), Pondicherry-605 005
Call: 0413-4205444, +91 99625 88976,
95663 55386.
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976
/9566355386
Do Your Projects With Domain Experts
Hardware requirements:
Processor : Any Processor above 500 MHz.
Ram : 128Mb.
Hard Disk : 10 Gb.
Compact Disk : 650 Mb.
Input device : Standard Keyboard and Mouse.
Output device : VGA and High Resolution Monitor.
Software requirements:
Operating System : Windows Family.
Language : JDK 1.5
Front End : Java Swing
Database : MySQL 5.0