SlideShare a Scribd company logo
1 of 4
LOCAWARD: A SECURITY AND PRIVACY AWARE LOCATION-BASED 
REWARDING SYSTEM 
ABSTRACT: 
The proliferation of mobile devices has driven the mobile marketing to surge in the past few 
years. Emerging as a new type of mobile marketing, mobile location-based services (MLBSs) 
have attracted intense attention recently. Unfortunately, current MLBSs have a lot of limitations 
and raise many concerns, especially about system security and users’ privacy. In this paper, we 
propose a new location-based rewarding system, called LocaWard, where mobile users can 
collect location-based tokens from token distributors, and then redeem their gathered tokens at 
token collectors for beneficial rewards. Tokens act as virtual currency. The token distributors and 
collectors can be any commercial entities or merchants that wish to attract customers through 
such a promotion system, such as stores, restaurants, and car rental companies. We develop a 
security and privacy aware location-based rewarding protocol for the LocaWard system, and 
prove the completeness and soundness of the protocol. Moreover, we show that the system is 
resilient to various attacks and mobile users’ privacy can be well protected in the meantime. We 
finally implement the system and conduct extensive experiments to validate the system 
efficiency in terms of computation, communication, energy consumption, and storage costs.
EXISTING SYSTEM: 
The location-based social networking is a type of MLBS, such as Facebook Places, where users 
share their locations with friends and find others who are nearby. Another type of MLBSs 
requires the users to provide current or historical location proof to full fill some purposes. Mobile 
commerce is another branch of MLBSs 
There is new type of MLBSs called location based check-in game, which is developed based on 
location based social networking, lets users earn beneficial rewards if they visit certain places. In 
particular, some applications, including Foursquare and Loopt Star , let users check in different 
locales (e.g., coffee shops, restaurants, shopping malls) to not only compete with friends in 
games, but also earn rewards, points, or discounts from retailers and organizations. The rewards 
and reward amounts can be different depending on time of day, how frequently the person has 
checked it in the past, and so on. 
DISADVANTAGES OF EXISTING SYSTEM: 
 Customers can only receive and redeem rewards at the same brand stores or even 
the same store only. This greatly weakens the customers’ motivations for visiting 
the locales. 
 From a service provider’s perspective, security is not guaranteed in the existing 
systems. Since users can receive benefits for visiting some places, they have 
incentives to claim that they are at certain locations even though they are not. 
Most of those location-based check-in applications (e.g., Foursquare) use the GPS 
on a user’s mobile device to verify the location claimed by the user. However, 
users may cheat on their locations.
 Third, from users’ perspective, users’ privacy including identity privacy and 
location privacy has been largely ignored in the current check-in systems. In 
particular, since the current systems use central servers to store all users’ records, 
they can easily know which users have ever been to which places at what times 
for what purposes. 
PROPOSED SYSTEM: 
 The proposed system consists of a trusted third party (TTP), mobile users (MUs), token 
distributors (TDs), token collectors (TCs), and a central controller (CC). The TTP issues 
each MU with a real identity and a corresponding certificate. 
 A legal MU is able to obtain a location-based token when it visits a commercial entity 
that participates in the system, i.e., a TD. The issued tokens at various TDs have the same 
format but possibly different indicated values. With all the collected tokens, an MU can 
redeem them for beneficial rewards not only at the same store or brand stores, but also at 
any other retailers or commercial entities, i.e., TCs, that have joined the system. The 
amount of received rewards depends on the value represented by the collected tokens. 
Besides, the CC stores token audition information sent by TDs and provides it to TCs 
when required. 
 We design a security and privacy aware location based rewarding protocol for the 
proposed LocaWard system. The protocol is composed of three parts: identity initiation, 
token distribution, and token redemption. 
ADVANTAGES OF PROPOSED SYSTEM: 
 System security: Completeness and soundness. Completeness means that honest MUs can 
always successfully obtain tokens from TDs and redeem valid tokens at TCs. Soundness 
refers to that the probability that forged/tampered/stolen tokens can be redeemed is 
negligible.
 Users’ privacy: Users’ private information includes: MUs’ personal information like real 
identities, token information including the value of a token, and location histories 
SYSTEM REQUIREMENTS: 
HARDWARE REQUIREMENTS: 
 System : Pentium IV 2.4 GHz. 
 Hard Disk : 40 GB. 
 Floppy Drive : 1.44 Mb. 
 Monitor : 15 VGA Colour. 
 Mouse : Logitech. 
 Ram : 512 Mb. 
SOFTWARE REQUIREMENTS: 
 Operating system : Windows XP/7. 
 Coding Language : JAVA/J2EE 
 IDE : Netbeans 7.4 
 Database : MYSQL 
REFERENCE: 
Ming Li, Sergio Salinas, and Pan Li, “LocaWard: A Security and Privacy Aware Location-Based 
Rewarding System”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED 
SYSTEMS, VOL. 25, NO. 2, FEBRUARY 2014.

More Related Content

Viewers also liked

Efficient instant fuzzy search with proximity ranking
Efficient instant fuzzy search with proximity rankingEfficient instant fuzzy search with proximity ranking
Efficient instant fuzzy search with proximity rankingShakas Technologies
 
Tradeoff between reliability and security in multiple access relay networks u...
Tradeoff between reliability and security in multiple access relay networks u...Tradeoff between reliability and security in multiple access relay networks u...
Tradeoff between reliability and security in multiple access relay networks u...Shakas Technologies
 
On false data injection attacks against power system
On false data injection attacks against power systemOn false data injection attacks against power system
On false data injection attacks against power systemShakas Technologies
 
Dealing with concept drifts in process mining
Dealing with concept drifts in process miningDealing with concept drifts in process mining
Dealing with concept drifts in process miningShakas Technologies
 
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing Shakas Technologies
 
Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryptionSecuring broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryptionShakas Technologies
 
Building confidential and efficient query services in the cloud with rasp dat...
Building confidential and efficient query services in the cloud with rasp dat...Building confidential and efficient query services in the cloud with rasp dat...
Building confidential and efficient query services in the cloud with rasp dat...Shakas Technologies
 
Xs path navigation on xml schemas made easy
Xs path navigation on xml schemas made easyXs path navigation on xml schemas made easy
Xs path navigation on xml schemas made easyShakas Technologies
 
Cooperative caching for efficient data access in
Cooperative caching for efficient data access inCooperative caching for efficient data access in
Cooperative caching for efficient data access inShakas Technologies
 
Security evaluation of pattern classifiers under attack
Security evaluation of pattern classifiers under attackSecurity evaluation of pattern classifiers under attack
Security evaluation of pattern classifiers under attackShakas Technologies
 
Mining weakly labeled web facial images for search based face annotation
Mining weakly labeled web facial images for search based face annotationMining weakly labeled web facial images for search based face annotation
Mining weakly labeled web facial images for search based face annotationShakas Technologies
 
Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryptionSecuring broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryptionShakas Technologies
 

Viewers also liked (13)

Efficient instant fuzzy search with proximity ranking
Efficient instant fuzzy search with proximity rankingEfficient instant fuzzy search with proximity ranking
Efficient instant fuzzy search with proximity ranking
 
Tradeoff between reliability and security in multiple access relay networks u...
Tradeoff between reliability and security in multiple access relay networks u...Tradeoff between reliability and security in multiple access relay networks u...
Tradeoff between reliability and security in multiple access relay networks u...
 
On false data injection attacks against power system
On false data injection attacks against power systemOn false data injection attacks against power system
On false data injection attacks against power system
 
Dealing with concept drifts in process mining
Dealing with concept drifts in process miningDealing with concept drifts in process mining
Dealing with concept drifts in process mining
 
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing
 
Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryptionSecuring broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryption
 
Building confidential and efficient query services in the cloud with rasp dat...
Building confidential and efficient query services in the cloud with rasp dat...Building confidential and efficient query services in the cloud with rasp dat...
Building confidential and efficient query services in the cloud with rasp dat...
 
Xs path navigation on xml schemas made easy
Xs path navigation on xml schemas made easyXs path navigation on xml schemas made easy
Xs path navigation on xml schemas made easy
 
Cooperative caching for efficient data access in
Cooperative caching for efficient data access inCooperative caching for efficient data access in
Cooperative caching for efficient data access in
 
Security evaluation of pattern classifiers under attack
Security evaluation of pattern classifiers under attackSecurity evaluation of pattern classifiers under attack
Security evaluation of pattern classifiers under attack
 
Mining weakly labeled web facial images for search based face annotation
Mining weakly labeled web facial images for search based face annotationMining weakly labeled web facial images for search based face annotation
Mining weakly labeled web facial images for search based face annotation
 
Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryptionSecuring broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryption
 
Shakas project titles 2014 2015
Shakas project titles 2014 2015Shakas project titles 2014 2015
Shakas project titles 2014 2015
 

Similar to LOCAWARD A SECURITY AND PRIVACY AWARE LOCATION-BASED REWARDING SYSTEM

IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS A security and privacy aware loc...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS A security and privacy aware loc...IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS A security and privacy aware loc...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS A security and privacy aware loc...IEEEGLOBALSOFTSTUDENTPROJECTS
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT A security and privacy aware loca...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT A security and privacy aware loca...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT A security and privacy aware loca...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT A security and privacy aware loca...IEEEGLOBALSOFTSTUDENTSPROJECTS
 
Connect DApp Whitepaper v 1.0
Connect DApp Whitepaper v 1.0Connect DApp Whitepaper v 1.0
Connect DApp Whitepaper v 1.0Ahmed Omar
 
Broker Pattern Backbone of Distributed Processing
Broker Pattern Backbone of Distributed ProcessingBroker Pattern Backbone of Distributed Processing
Broker Pattern Backbone of Distributed ProcessingNilay Mishra
 
Two aspect authentication system using secure
Two aspect authentication system using secureTwo aspect authentication system using secure
Two aspect authentication system using secureUvaraj Shan
 
Two aspect authentication system using secure
Two aspect authentication system using secureTwo aspect authentication system using secure
Two aspect authentication system using secureUvaraj Shan
 
IMAGE CONTENT IN LOCATION-BASED SHOPPING RECOMMENDER SYSTEMS FOR MOBILE USERS
IMAGE CONTENT IN LOCATION-BASED SHOPPING RECOMMENDER SYSTEMS FOR MOBILE USERSIMAGE CONTENT IN LOCATION-BASED SHOPPING RECOMMENDER SYSTEMS FOR MOBILE USERS
IMAGE CONTENT IN LOCATION-BASED SHOPPING RECOMMENDER SYSTEMS FOR MOBILE USERSacijjournal
 
E commerce 2010 section- b
E commerce 2010 section- bE commerce 2010 section- b
E commerce 2010 section- bStudsPlanet.com
 
Blockchain Reputation Management
Blockchain Reputation ManagementBlockchain Reputation Management
Blockchain Reputation ManagementBitBayMarket
 
Momentum class of spring 2013
Momentum class of spring 2013Momentum class of spring 2013
Momentum class of spring 2013mario tapia
 
Tim sloane preparing for rapid payments innovation
Tim sloane preparing for rapid payments innovationTim sloane preparing for rapid payments innovation
Tim sloane preparing for rapid payments innovationCO-OPFinancialServices
 
Location based authentication new words approch secuirity
Location based authentication new words approch secuirityLocation based authentication new words approch secuirity
Location based authentication new words approch secuiritySarath K
 
Geomarketing for enterprises
Geomarketing for enterprisesGeomarketing for enterprises
Geomarketing for enterprisesJorge Canal
 
Two aspect authentication system using secure mobile
Two aspect authentication system using secure mobileTwo aspect authentication system using secure mobile
Two aspect authentication system using secure mobileUvaraj Shan
 
Two aspect authentication system using secure mobile devices
Two aspect authentication system using secure mobile devicesTwo aspect authentication system using secure mobile devices
Two aspect authentication system using secure mobile devicesUvaraj Shan
 

Similar to LOCAWARD A SECURITY AND PRIVACY AWARE LOCATION-BASED REWARDING SYSTEM (20)

IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS A security and privacy aware loc...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS A security and privacy aware loc...IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS A security and privacy aware loc...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS A security and privacy aware loc...
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT A security and privacy aware loca...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT A security and privacy aware loca...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT A security and privacy aware loca...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT A security and privacy aware loca...
 
87559489 auth
87559489 auth87559489 auth
87559489 auth
 
Connect DApp Whitepaper v 1.0
Connect DApp Whitepaper v 1.0Connect DApp Whitepaper v 1.0
Connect DApp Whitepaper v 1.0
 
Broker Pattern Backbone of Distributed Processing
Broker Pattern Backbone of Distributed ProcessingBroker Pattern Backbone of Distributed Processing
Broker Pattern Backbone of Distributed Processing
 
Two aspect authentication system using secure
Two aspect authentication system using secureTwo aspect authentication system using secure
Two aspect authentication system using secure
 
Two aspect authentication system using secure
Two aspect authentication system using secureTwo aspect authentication system using secure
Two aspect authentication system using secure
 
IMAGE CONTENT IN LOCATION-BASED SHOPPING RECOMMENDER SYSTEMS FOR MOBILE USERS
IMAGE CONTENT IN LOCATION-BASED SHOPPING RECOMMENDER SYSTEMS FOR MOBILE USERSIMAGE CONTENT IN LOCATION-BASED SHOPPING RECOMMENDER SYSTEMS FOR MOBILE USERS
IMAGE CONTENT IN LOCATION-BASED SHOPPING RECOMMENDER SYSTEMS FOR MOBILE USERS
 
Dot staking.pdf
Dot staking.pdfDot staking.pdf
Dot staking.pdf
 
Location proof
Location proof Location proof
Location proof
 
E commerce 2010 section- b
E commerce 2010 section- bE commerce 2010 section- b
E commerce 2010 section- b
 
Blockchain Reputation Management
Blockchain Reputation ManagementBlockchain Reputation Management
Blockchain Reputation Management
 
Momentum class of spring 2013
Momentum class of spring 2013Momentum class of spring 2013
Momentum class of spring 2013
 
Tim sloane preparing for rapid payments innovation
Tim sloane preparing for rapid payments innovationTim sloane preparing for rapid payments innovation
Tim sloane preparing for rapid payments innovation
 
Location based authentication new words approch secuirity
Location based authentication new words approch secuirityLocation based authentication new words approch secuirity
Location based authentication new words approch secuirity
 
Presentation
PresentationPresentation
Presentation
 
Metro Social Platform
 Metro Social Platform Metro Social Platform
Metro Social Platform
 
Geomarketing for enterprises
Geomarketing for enterprisesGeomarketing for enterprises
Geomarketing for enterprises
 
Two aspect authentication system using secure mobile
Two aspect authentication system using secure mobileTwo aspect authentication system using secure mobile
Two aspect authentication system using secure mobile
 
Two aspect authentication system using secure mobile devices
Two aspect authentication system using secure mobile devicesTwo aspect authentication system using secure mobile devices
Two aspect authentication system using secure mobile devices
 

More from Shakas Technologies

A Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying DetectionA Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying DetectionShakas Technologies
 
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...Shakas Technologies
 
A Novel Framework for Credit Card.
A Novel Framework for Credit Card.A Novel Framework for Credit Card.
A Novel Framework for Credit Card.Shakas Technologies
 
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...Shakas Technologies
 
NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024Shakas Technologies
 
MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024Shakas Technologies
 
Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024Shakas Technologies
 
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...Shakas Technologies
 
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSECYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSEShakas Technologies
 
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...Shakas Technologies
 
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTIONCOMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTIONShakas Technologies
 
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCECO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCEShakas Technologies
 
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Shakas Technologies
 
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...Shakas Technologies
 
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...Shakas Technologies
 
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...Shakas Technologies
 
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...Shakas Technologies
 
Fighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docxFighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docxShakas Technologies
 
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...Shakas Technologies
 
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...Shakas Technologies
 

More from Shakas Technologies (20)

A Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying DetectionA Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying Detection
 
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
 
A Novel Framework for Credit Card.
A Novel Framework for Credit Card.A Novel Framework for Credit Card.
A Novel Framework for Credit Card.
 
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
 
NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024
 
MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024
 
Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024
 
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
 
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSECYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
 
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
 
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTIONCOMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
 
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCECO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
 
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
 
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
 
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
 
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
 
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
 
Fighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docxFighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docx
 
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
 
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
 

LOCAWARD A SECURITY AND PRIVACY AWARE LOCATION-BASED REWARDING SYSTEM

  • 1. LOCAWARD: A SECURITY AND PRIVACY AWARE LOCATION-BASED REWARDING SYSTEM ABSTRACT: The proliferation of mobile devices has driven the mobile marketing to surge in the past few years. Emerging as a new type of mobile marketing, mobile location-based services (MLBSs) have attracted intense attention recently. Unfortunately, current MLBSs have a lot of limitations and raise many concerns, especially about system security and users’ privacy. In this paper, we propose a new location-based rewarding system, called LocaWard, where mobile users can collect location-based tokens from token distributors, and then redeem their gathered tokens at token collectors for beneficial rewards. Tokens act as virtual currency. The token distributors and collectors can be any commercial entities or merchants that wish to attract customers through such a promotion system, such as stores, restaurants, and car rental companies. We develop a security and privacy aware location-based rewarding protocol for the LocaWard system, and prove the completeness and soundness of the protocol. Moreover, we show that the system is resilient to various attacks and mobile users’ privacy can be well protected in the meantime. We finally implement the system and conduct extensive experiments to validate the system efficiency in terms of computation, communication, energy consumption, and storage costs.
  • 2. EXISTING SYSTEM: The location-based social networking is a type of MLBS, such as Facebook Places, where users share their locations with friends and find others who are nearby. Another type of MLBSs requires the users to provide current or historical location proof to full fill some purposes. Mobile commerce is another branch of MLBSs There is new type of MLBSs called location based check-in game, which is developed based on location based social networking, lets users earn beneficial rewards if they visit certain places. In particular, some applications, including Foursquare and Loopt Star , let users check in different locales (e.g., coffee shops, restaurants, shopping malls) to not only compete with friends in games, but also earn rewards, points, or discounts from retailers and organizations. The rewards and reward amounts can be different depending on time of day, how frequently the person has checked it in the past, and so on. DISADVANTAGES OF EXISTING SYSTEM:  Customers can only receive and redeem rewards at the same brand stores or even the same store only. This greatly weakens the customers’ motivations for visiting the locales.  From a service provider’s perspective, security is not guaranteed in the existing systems. Since users can receive benefits for visiting some places, they have incentives to claim that they are at certain locations even though they are not. Most of those location-based check-in applications (e.g., Foursquare) use the GPS on a user’s mobile device to verify the location claimed by the user. However, users may cheat on their locations.
  • 3.  Third, from users’ perspective, users’ privacy including identity privacy and location privacy has been largely ignored in the current check-in systems. In particular, since the current systems use central servers to store all users’ records, they can easily know which users have ever been to which places at what times for what purposes. PROPOSED SYSTEM:  The proposed system consists of a trusted third party (TTP), mobile users (MUs), token distributors (TDs), token collectors (TCs), and a central controller (CC). The TTP issues each MU with a real identity and a corresponding certificate.  A legal MU is able to obtain a location-based token when it visits a commercial entity that participates in the system, i.e., a TD. The issued tokens at various TDs have the same format but possibly different indicated values. With all the collected tokens, an MU can redeem them for beneficial rewards not only at the same store or brand stores, but also at any other retailers or commercial entities, i.e., TCs, that have joined the system. The amount of received rewards depends on the value represented by the collected tokens. Besides, the CC stores token audition information sent by TDs and provides it to TCs when required.  We design a security and privacy aware location based rewarding protocol for the proposed LocaWard system. The protocol is composed of three parts: identity initiation, token distribution, and token redemption. ADVANTAGES OF PROPOSED SYSTEM:  System security: Completeness and soundness. Completeness means that honest MUs can always successfully obtain tokens from TDs and redeem valid tokens at TCs. Soundness refers to that the probability that forged/tampered/stolen tokens can be redeemed is negligible.
  • 4.  Users’ privacy: Users’ private information includes: MUs’ personal information like real identities, token information including the value of a token, and location histories SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7.  Coding Language : JAVA/J2EE  IDE : Netbeans 7.4  Database : MYSQL REFERENCE: Ming Li, Sergio Salinas, and Pan Li, “LocaWard: A Security and Privacy Aware Location-Based Rewarding System”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 25, NO. 2, FEBRUARY 2014.