SlideShare a Scribd company logo
We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live
chat with us at www.ocularsystems.in or call us on 020 30858066 or
Mail Us: info@ocularsystems.in
Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
Preserving Location Privacy in Geo-Social
Applications
Abstract:
Using geo-social applications, such as FourSquare, millions of people interact with
their surroundings through their friends and their recommendations. Without
adequate privacy protection, however, these systems can be easily misused, e.g., to
track users target them for home invasion. In this paper, we introduce LocX, a
novel alternative that provides significantly-improved locationprivacy without
adding uncertainty into query results or relying on strong assumptions about server
security. Our key insight is to applysecure user-specific, distance-preserving
coordinate transformations to all location data shared with the server. The friends
of a usershare this user’s secrets so they can apply the same transformation. This
allows all location queries to be evaluated correctly by theserver, but our privacy
mechanisms guarantee that servers are unable to see or infer the actual location
data from the transformeddata or from the data access. We show thatLocX
provides privacy even against a powerful adversary model, and we use
prototypemeasurements to show that it provides privacy with very little
performance overhead, making it suitable for today’s mobile devices.
We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live
chat with us at www.ocularsystems.in or call us on 020 30858066 or
Mail Us: info@ocularsystems.in
Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
Architecture Diagram:
Existing System:
Existing systems have mainly taken three approaches to improving user privacy in
geo-social systems:
(a) introducinguncertainty or error into location data .
We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live
chat with us at www.ocularsystems.in or call us on 020 30858066 or
Mail Us: info@ocularsystems.in
Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
(b) relying on trusted servers or intermediaries to apply anonymization to user
identities and private data.
(c) relying on heavy-weight cryptographic or private information retrieval (PIR)
techniques.
The challenge, then, is to design mechanisms that efficiently protect user privacy
without sacrificing the accuracy of the system, or making strong assumptions about
the security or trust worthiness of the application servers. More specifically, we
target geo-social applications, and assume that servers (and any intermediaries) can
be compromised and, therefore, are untrusted.
Proposed System:
To address this challenge, in this paper, we propose LocX (short for location to
index mapping), a novel approach to achieving user privacy while maintaining full
accuracy in location-based social applications (LBSAs from here onwards).
Our insight is that many services do not need to resolve distance-based queries
between arbitrary pairs of users, but only between friends interested in each other’s
locations and data. Thus, we can partition location data based on users’ social
groups, and then perform transformations on the location coordinates before
storing them on un trusted servers. A user knows the transformation keys of all her
friends, allowing her to transform her query into the virtual coordinate system that
her friends use. Our coordinate transformations preserve distance metrics, allowing
an application server to perform both point and nearest-neighbor queries correctly
We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live
chat with us at www.ocularsystems.in or call us on 020 30858066 or
Mail Us: info@ocularsystems.in
Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
on transformed data. However, the transformation is secure, in that transformed
values cannot be easily associated with real world locations without a secret, which
is only available to the members of the social group. Finally, transformations are
efficient, in that they incur minimal overhead on the LBSAs. This makes the
applications built on LocX lightweight and suitable for running on today’s mobile
devices.
Main Modules:
1.Locx module
2.proxy server
3.index server
4.Data Server
LOCX Module:
Loc X builds on top of the basic design, and introduces two new mechanisms to
overcome its limitations. First, in Loc X, we split the mapping between the
location and its data into two pairs: a mapping from the transformed location to an
encrypted index (called L2I), and a mapping from the index to the encrypted
location data (called I2D). This splitting helps in making our system efficient.
Second, users store and retrieve the L2Is via untrusted proxies. This redirection of
We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live
chat with us at www.ocularsystems.in or call us on 020 30858066 or
Mail Us: info@ocularsystems.in
Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
data via proxies, together with splitting, significantly improves privacy in LocX.
For efficiency, I2Ds are not proxied, yet privacy is preserved (as explained later).
Proxying L2Is for location privacy:
Users store their L2Ison the index server via untrusted proxies. These proxies can
be any of the following: Planet Lab nodes, corporate NAT sand email servers in a
user’s work places, a user’s home and office desktops or laptops, or Tor [34]
nodes. We only need a one-hop indirection between the user and the index server.
These diverse types of proxies provide tremendous flexibility in proxying L2Is,
thus a user can store her L2Is via different proxies without restricting herself to a
single proxy. Furthermore, compromising these proxies by an attacker does not
break users’ location privacy, as (a) the proxies also only see transformed location
coordinates and hence do not learn the users’ real locations, and (b) due to the
noise added toL2Is (described later). To simplify the description, for now, we
assume that the proxies are non-malicious and do not collude with the index server.
But we will later describe our solution in detail to even defend against colluding,
malicious proxies. With this high-level overview, we now describe our solution to
store and query data on the servers in detail. We also explain the challenges we
faced, and the tradeoffs we made in making
our solution secure and efficient.
Storing L2I on the index server:
We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live
chat with us at www.ocularsystems.in or call us on 020 30858066 or
Mail Us: info@ocularsystems.in
Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
First consider storing L2I on the index server. This transformation preserves the
distances between points1, so circular range and nearest neighbor queries for a
friend’s location data can be processed in the same way on transformed
coordinates as on real-world coordinates. Then the user generates a random index
(i) using her random number generator and encrypts it with her symmetric key to
obtain at the transformed coordinate on the index server via a proxy. The L2I is
small in size and is application independent, as it always contains the coordinates
and an encrypted random index. Thus the over head due to proxying is very small.
Storing I2Ds on the data server:
The user can directly storeI2Ds (location data) on the data server. This is both
secure and efficient.
1) This is secure because the data server only sees the index stored by the user and
the corresponding encrypted blob of data. In the worst case, the data server can
link all the different indices to the same user device, and then link these indices to
the retrieving user’s device. But this only reveals that one user is interested in
another user’s data, but not any information about the location of the users, or the
content of the I2Ds, or the real-world sites to which the data in the encrypted blob
corresponds to.
2) The content of I2Dis application dependent. For example, a location-based
video or photo sharing service might share multiple MBs of data at each location.
Since this data is not proxied, LocX still maintains the efficiency of today’s
systems.
We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live
chat with us at www.ocularsystems.in or call us on 020 30858066 or
Mail Us: info@ocularsystems.in
Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
Mechanisms:
In this we use Locx Mechanisms is used in this project.
1) Alice and Bob exchange their secrets,
2) Alice generates and L2I and I2D from her review of the restaurant (at (x, y)),
and stores the L2I on the index server via a proxy.
3) She then stores the I2D on the data server directly.
4) Bob later visits the restaurant and fetches for L2Is from his friends by sending
the transformed coordinates via a proxy.
5) he decrypts the L2I obtained and then queries for the corresponding I2D, 6)
finally Bob decrypts Alice’s review.
System Configuration:-
H/W System Configuration:-
Processor - Pentium –III
Speed - 1.1 Ghz
RAM - 256 MB(min)
Hard Disk - 20 GB
Floppy Drive - 1.44 MB
We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live
chat with us at www.ocularsystems.in or call us on 020 30858066 or
Mail Us: info@ocularsystems.in
Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
Key Board - Standard Windows Keyboard
Mouse - Two or Three Button Mouse
Monitor - SVGA
S/W System Configuration:-
 Operating System :Windows95/98/2000/XP
 Front End : java, jdk1.6
 Database : My sqlserver 2005
 Database Connectivity : JDBC.

More Related Content

What's hot

Privacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesPrivacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devices
Adz91 Digital Ads Pvt Ltd
 
exploiting service similarity for privacy in location-based search queries
exploiting service similarity for privacy in location-based search queriesexploiting service similarity for privacy in location-based search queries
exploiting service similarity for privacy in location-based search queries
swathi78
 
User defined privacy grid system for continuous location based services abstract
User defined privacy grid system for continuous location based services abstractUser defined privacy grid system for continuous location based services abstract
User defined privacy grid system for continuous location based services abstract
Softroniics india
 
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
Nexgen Technology
 
User defined privacy grid system for continuous location-based services
User defined privacy grid system for continuous location-based servicesUser defined privacy grid system for continuous location-based services
User defined privacy grid system for continuous location-based services
LeMeniz Infotech
 
Securing Location of User in Geo Social Networking
Securing Location of User in Geo Social NetworkingSecuring Location of User in Geo Social Networking
Securing Location of User in Geo Social Networking
IRJET Journal
 
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
Oruta: Privacy-Preserving Public Auditing for Shared Data in the CloudOruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
Migrant Systems
 
Location based spatial query processing in wireless broadcast environments(sy...
Location based spatial query processing in wireless broadcast environments(sy...Location based spatial query processing in wireless broadcast environments(sy...
Location based spatial query processing in wireless broadcast environments(sy...Mumbai Academisc
 
Exploiting service similarity for privacy in location based search queries
Exploiting service similarity for privacy in location based search queriesExploiting service similarity for privacy in location based search queries
Exploiting service similarity for privacy in location based search queries
Shakas Technologies
 
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
Migrant Systems
 
privacy preserving abstract
 privacy preserving abstract privacy preserving abstract
privacy preserving abstract
muhammed jassim k
 
Privacy Preservation And Data Security In Location Based Services
Privacy Preservation And Data Security In Location Based ServicesPrivacy Preservation And Data Security In Location Based Services
Privacy Preservation And Data Security In Location Based Services
EditorJST
 
JPD1435 Preserving Location Privacy in Geosocial Applications
JPD1435   Preserving Location Privacy in Geosocial ApplicationsJPD1435   Preserving Location Privacy in Geosocial Applications
JPD1435 Preserving Location Privacy in Geosocial Applications
chennaijp
 
Control cloud data access privilege and anonymity with fully anonymous attrib...
Control cloud data access privilege and anonymity with fully anonymous attrib...Control cloud data access privilege and anonymity with fully anonymous attrib...
Control cloud data access privilege and anonymity with fully anonymous attrib...
Pvrtechnologies Nellore
 
Privacy preserving location sharing services for social networks(1)
Privacy preserving location sharing services for social networks(1)Privacy preserving location sharing services for social networks(1)
Privacy preserving location sharing services for social networks(1)
Kamal Spring
 
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
eSAT Journals
 
Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...
Pvrtechnologies Nellore
 
Privacy - Preserving Reputation with Content Protecting Location Based Queries
Privacy - Preserving Reputation with Content Protecting Location Based QueriesPrivacy - Preserving Reputation with Content Protecting Location Based Queries
Privacy - Preserving Reputation with Content Protecting Location Based Queries
iosrjce
 

What's hot (18)

Privacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesPrivacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devices
 
exploiting service similarity for privacy in location-based search queries
exploiting service similarity for privacy in location-based search queriesexploiting service similarity for privacy in location-based search queries
exploiting service similarity for privacy in location-based search queries
 
User defined privacy grid system for continuous location based services abstract
User defined privacy grid system for continuous location based services abstractUser defined privacy grid system for continuous location based services abstract
User defined privacy grid system for continuous location based services abstract
 
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
 
User defined privacy grid system for continuous location-based services
User defined privacy grid system for continuous location-based servicesUser defined privacy grid system for continuous location-based services
User defined privacy grid system for continuous location-based services
 
Securing Location of User in Geo Social Networking
Securing Location of User in Geo Social NetworkingSecuring Location of User in Geo Social Networking
Securing Location of User in Geo Social Networking
 
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
Oruta: Privacy-Preserving Public Auditing for Shared Data in the CloudOruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
 
Location based spatial query processing in wireless broadcast environments(sy...
Location based spatial query processing in wireless broadcast environments(sy...Location based spatial query processing in wireless broadcast environments(sy...
Location based spatial query processing in wireless broadcast environments(sy...
 
Exploiting service similarity for privacy in location based search queries
Exploiting service similarity for privacy in location based search queriesExploiting service similarity for privacy in location based search queries
Exploiting service similarity for privacy in location based search queries
 
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
 
privacy preserving abstract
 privacy preserving abstract privacy preserving abstract
privacy preserving abstract
 
Privacy Preservation And Data Security In Location Based Services
Privacy Preservation And Data Security In Location Based ServicesPrivacy Preservation And Data Security In Location Based Services
Privacy Preservation And Data Security In Location Based Services
 
JPD1435 Preserving Location Privacy in Geosocial Applications
JPD1435   Preserving Location Privacy in Geosocial ApplicationsJPD1435   Preserving Location Privacy in Geosocial Applications
JPD1435 Preserving Location Privacy in Geosocial Applications
 
Control cloud data access privilege and anonymity with fully anonymous attrib...
Control cloud data access privilege and anonymity with fully anonymous attrib...Control cloud data access privilege and anonymity with fully anonymous attrib...
Control cloud data access privilege and anonymity with fully anonymous attrib...
 
Privacy preserving location sharing services for social networks(1)
Privacy preserving location sharing services for social networks(1)Privacy preserving location sharing services for social networks(1)
Privacy preserving location sharing services for social networks(1)
 
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
 
Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...
 
Privacy - Preserving Reputation with Content Protecting Location Based Queries
Privacy - Preserving Reputation with Content Protecting Location Based QueriesPrivacy - Preserving Reputation with Content Protecting Location Based Queries
Privacy - Preserving Reputation with Content Protecting Location Based Queries
 

Viewers also liked

Supporting the Sink mobility: a case study for WSN
Supporting the Sink mobility: a case study for WSNSupporting the Sink mobility: a case study for WSN
Supporting the Sink mobility: a case study for WSN
CoRehab
 
20081114 friday food i labt ingrid moerman
20081114 friday food i labt ingrid moerman20081114 friday food i labt ingrid moerman
20081114 friday food i labt ingrid moermanguestbd4497
 
Context Aware interactions for diagnosis of Bipolar Disorder
Context Aware interactions for diagnosis of Bipolar DisorderContext Aware interactions for diagnosis of Bipolar Disorder
Context Aware interactions for diagnosis of Bipolar Disorder
CoRehab
 
Arquam_reportfinal
Arquam_reportfinalArquam_reportfinal
Arquam_reportfinalArquam Md
 
Intelligent Data Processing for the Internet of Things
Intelligent Data Processing for the Internet of Things Intelligent Data Processing for the Internet of Things
Intelligent Data Processing for the Internet of Things
PayamBarnaghi
 
Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.
Rahul Kumar
 
PROFILR : Toward Preserving Privacy and Functionality in Geosocial Networks
PROFILR : Toward Preserving Privacy and Functionality in Geosocial NetworksPROFILR : Toward Preserving Privacy and Functionality in Geosocial Networks
PROFILR : Toward Preserving Privacy and Functionality in Geosocial NetworksAmarnath Reddy
 

Viewers also liked (7)

Supporting the Sink mobility: a case study for WSN
Supporting the Sink mobility: a case study for WSNSupporting the Sink mobility: a case study for WSN
Supporting the Sink mobility: a case study for WSN
 
20081114 friday food i labt ingrid moerman
20081114 friday food i labt ingrid moerman20081114 friday food i labt ingrid moerman
20081114 friday food i labt ingrid moerman
 
Context Aware interactions for diagnosis of Bipolar Disorder
Context Aware interactions for diagnosis of Bipolar DisorderContext Aware interactions for diagnosis of Bipolar Disorder
Context Aware interactions for diagnosis of Bipolar Disorder
 
Arquam_reportfinal
Arquam_reportfinalArquam_reportfinal
Arquam_reportfinal
 
Intelligent Data Processing for the Internet of Things
Intelligent Data Processing for the Internet of Things Intelligent Data Processing for the Internet of Things
Intelligent Data Processing for the Internet of Things
 
Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.
 
PROFILR : Toward Preserving Privacy and Functionality in Geosocial Networks
PROFILR : Toward Preserving Privacy and Functionality in Geosocial NetworksPROFILR : Toward Preserving Privacy and Functionality in Geosocial Networks
PROFILR : Toward Preserving Privacy and Functionality in Geosocial Networks
 

Similar to Preserving location privacy in geo social applications

2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...
IEEEFINALYEARSTUDENTSPROJECTS
 
2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...
IEEEFINALYEARSTUDENTPROJECT
 
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
IEEEMEMTECHSTUDENTPROJECTS
 
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
IEEEFINALYEARSTUDENTSPROJECTS
 
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Adz91 Digital Ads Pvt Ltd
 
Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloud Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloud
Adz91 Digital Ads Pvt Ltd
 
User-Defined Privacy Grid System for Continuous Location-Based Services
User-Defined Privacy Grid System for Continuous Location-Based ServicesUser-Defined Privacy Grid System for Continuous Location-Based Services
User-Defined Privacy Grid System for Continuous Location-Based Services
1crore projects
 
IEEE 2014 JAVA DATA MINING PROJECTS Privacy preserving and content-protecting...
IEEE 2014 JAVA DATA MINING PROJECTS Privacy preserving and content-protecting...IEEE 2014 JAVA DATA MINING PROJECTS Privacy preserving and content-protecting...
IEEE 2014 JAVA DATA MINING PROJECTS Privacy preserving and content-protecting...
IEEEFINALYEARSTUDENTPROJECTS
 
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...
IEEEMEMTECHSTUDENTSPROJECTS
 
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...
IEEEFINALYEARSTUDENTPROJECT
 
Privacy preserving location sharing services for social networks
Privacy preserving location sharing services for social networksPrivacy preserving location sharing services for social networks
Privacy preserving location sharing services for social networks
LeMeniz Infotech
 
Indoor localization Leveraging Human Perception of Textual Signs
Indoor localization Leveraging Human Perception of Textual SignsIndoor localization Leveraging Human Perception of Textual Signs
Indoor localization Leveraging Human Perception of Textual Signs
Shekhar Vimalendu
 
IRJET - Improving Password System using Blockchain
IRJET - Improving Password System using BlockchainIRJET - Improving Password System using Blockchain
IRJET - Improving Password System using Blockchain
IRJET Journal
 
Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditability Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditability
Adz91 Digital Ads Pvt Ltd
 
Decentralized access control of data stored in cloud using key policy attribu...
Decentralized access control of data stored in cloud using key policy attribu...Decentralized access control of data stored in cloud using key policy attribu...
Decentralized access control of data stored in cloud using key policy attribu...
Adz91 Digital Ads Pvt Ltd
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
Adz91 Digital Ads Pvt Ltd
 
Building confidential and efficient query services in the cloud with rasp dat...
Building confidential and efficient query services in the cloud with rasp dat...Building confidential and efficient query services in the cloud with rasp dat...
Building confidential and efficient query services in the cloud with rasp dat...
Adz91 Digital Ads Pvt Ltd
 
Behavioral malware detection in delay tolerant networks
Behavioral malware detection in delay tolerant networks Behavioral malware detection in delay tolerant networks
Behavioral malware detection in delay tolerant networks
Adz91 Digital Ads Pvt Ltd
 
710201940
710201940710201940
710201940
IJRAT
 
J018145862
J018145862J018145862
J018145862
IOSR Journals
 

Similar to Preserving location privacy in geo social applications (20)

2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...
 
2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...
 
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
 
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
 
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...
 
Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloud Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloud
 
User-Defined Privacy Grid System for Continuous Location-Based Services
User-Defined Privacy Grid System for Continuous Location-Based ServicesUser-Defined Privacy Grid System for Continuous Location-Based Services
User-Defined Privacy Grid System for Continuous Location-Based Services
 
IEEE 2014 JAVA DATA MINING PROJECTS Privacy preserving and content-protecting...
IEEE 2014 JAVA DATA MINING PROJECTS Privacy preserving and content-protecting...IEEE 2014 JAVA DATA MINING PROJECTS Privacy preserving and content-protecting...
IEEE 2014 JAVA DATA MINING PROJECTS Privacy preserving and content-protecting...
 
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...
 
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...
 
Privacy preserving location sharing services for social networks
Privacy preserving location sharing services for social networksPrivacy preserving location sharing services for social networks
Privacy preserving location sharing services for social networks
 
Indoor localization Leveraging Human Perception of Textual Signs
Indoor localization Leveraging Human Perception of Textual SignsIndoor localization Leveraging Human Perception of Textual Signs
Indoor localization Leveraging Human Perception of Textual Signs
 
IRJET - Improving Password System using Blockchain
IRJET - Improving Password System using BlockchainIRJET - Improving Password System using Blockchain
IRJET - Improving Password System using Blockchain
 
Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditability Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditability
 
Decentralized access control of data stored in cloud using key policy attribu...
Decentralized access control of data stored in cloud using key policy attribu...Decentralized access control of data stored in cloud using key policy attribu...
Decentralized access control of data stored in cloud using key policy attribu...
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
 
Building confidential and efficient query services in the cloud with rasp dat...
Building confidential and efficient query services in the cloud with rasp dat...Building confidential and efficient query services in the cloud with rasp dat...
Building confidential and efficient query services in the cloud with rasp dat...
 
Behavioral malware detection in delay tolerant networks
Behavioral malware detection in delay tolerant networks Behavioral malware detection in delay tolerant networks
Behavioral malware detection in delay tolerant networks
 
710201940
710201940710201940
710201940
 
J018145862
J018145862J018145862
J018145862
 

More from Adz91 Digital Ads Pvt Ltd

2016 ieee java .net project titles
2016 ieee java .net project titles2016 ieee java .net project titles
2016 ieee java .net project titles
Adz91 Digital Ads Pvt Ltd
 
Java project ideas topics for computer engineering students
Java project ideas topics for computer engineering studentsJava project ideas topics for computer engineering students
Java project ideas topics for computer engineering students
Adz91 Digital Ads Pvt Ltd
 
Dotnet 2015 2016 2017 ieee project list-with abstract
Dotnet 2015 2016 2017 ieee project list-with abstractDotnet 2015 2016 2017 ieee project list-with abstract
Dotnet 2015 2016 2017 ieee project list-with abstract
Adz91 Digital Ads Pvt Ltd
 
Adz91 business opportunity presentation
Adz91 business opportunity presentationAdz91 business opportunity presentation
Adz91 business opportunity presentation
Adz91 Digital Ads Pvt Ltd
 
Efficient instant fuzzy search with proximity ranking
Efficient instant fuzzy search with proximity rankingEfficient instant fuzzy search with proximity ranking
Efficient instant fuzzy search with proximity ranking
Adz91 Digital Ads Pvt Ltd
 
BE/ ME / MTech / BTech Computer Engineering Project titles IEEE 2014 IEEE 2015
BE/ ME / MTech / BTech Computer Engineering Project titles IEEE 2014 IEEE 2015BE/ ME / MTech / BTech Computer Engineering Project titles IEEE 2014 IEEE 2015
BE/ ME / MTech / BTech Computer Engineering Project titles IEEE 2014 IEEE 2015
Adz91 Digital Ads Pvt Ltd
 
Xs path navigation on xml schemas made easy
Xs path navigation on xml schemas made easy Xs path navigation on xml schemas made easy
Xs path navigation on xml schemas made easy
Adz91 Digital Ads Pvt Ltd
 
Supporting privacy protection in personalized web search
Supporting privacy protection in personalized web search Supporting privacy protection in personalized web search
Supporting privacy protection in personalized web search
Adz91 Digital Ads Pvt Ltd
 
Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryption Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryption
Adz91 Digital Ads Pvt Ltd
 
Secure outsourced attribute based signatures
Secure outsourced attribute based signatures Secure outsourced attribute based signatures
Secure outsourced attribute based signatures
Adz91 Digital Ads Pvt Ltd
 
Mining weakly labeled web facial images for search based face annotation
Mining weakly labeled web facial images for search based face annotation Mining weakly labeled web facial images for search based face annotation
Mining weakly labeled web facial images for search based face annotation
Adz91 Digital Ads Pvt Ltd
 
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing
Adz91 Digital Ads Pvt Ltd
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
Adz91 Digital Ads Pvt Ltd
 
Dealing with concept drifts in process mining
Dealing with concept drifts in process mining Dealing with concept drifts in process mining
Dealing with concept drifts in process mining
Adz91 Digital Ads Pvt Ltd
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
Adz91 Digital Ads Pvt Ltd
 
Latest Android topics for Computer Engineering Students
Latest Android topics for Computer Engineering StudentsLatest Android topics for Computer Engineering Students
Latest Android topics for Computer Engineering Students
Adz91 Digital Ads Pvt Ltd
 
IEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS Diploma
IEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS DiplomaIEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS Diploma
IEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS Diploma
Adz91 Digital Ads Pvt Ltd
 
IEEE 2014 java and android BE, MCA, ME Computer Engineering Projects
IEEE 2014 java and android BE, MCA, ME Computer Engineering ProjectsIEEE 2014 java and android BE, MCA, ME Computer Engineering Projects
IEEE 2014 java and android BE, MCA, ME Computer Engineering Projects
Adz91 Digital Ads Pvt Ltd
 
Embedded based projects ocular systems pune
Embedded based projects ocular systems puneEmbedded based projects ocular systems pune
Embedded based projects ocular systems pune
Adz91 Digital Ads Pvt Ltd
 
Ready project list final
Ready project list finalReady project list final
Ready project list final
Adz91 Digital Ads Pvt Ltd
 

More from Adz91 Digital Ads Pvt Ltd (20)

2016 ieee java .net project titles
2016 ieee java .net project titles2016 ieee java .net project titles
2016 ieee java .net project titles
 
Java project ideas topics for computer engineering students
Java project ideas topics for computer engineering studentsJava project ideas topics for computer engineering students
Java project ideas topics for computer engineering students
 
Dotnet 2015 2016 2017 ieee project list-with abstract
Dotnet 2015 2016 2017 ieee project list-with abstractDotnet 2015 2016 2017 ieee project list-with abstract
Dotnet 2015 2016 2017 ieee project list-with abstract
 
Adz91 business opportunity presentation
Adz91 business opportunity presentationAdz91 business opportunity presentation
Adz91 business opportunity presentation
 
Efficient instant fuzzy search with proximity ranking
Efficient instant fuzzy search with proximity rankingEfficient instant fuzzy search with proximity ranking
Efficient instant fuzzy search with proximity ranking
 
BE/ ME / MTech / BTech Computer Engineering Project titles IEEE 2014 IEEE 2015
BE/ ME / MTech / BTech Computer Engineering Project titles IEEE 2014 IEEE 2015BE/ ME / MTech / BTech Computer Engineering Project titles IEEE 2014 IEEE 2015
BE/ ME / MTech / BTech Computer Engineering Project titles IEEE 2014 IEEE 2015
 
Xs path navigation on xml schemas made easy
Xs path navigation on xml schemas made easy Xs path navigation on xml schemas made easy
Xs path navigation on xml schemas made easy
 
Supporting privacy protection in personalized web search
Supporting privacy protection in personalized web search Supporting privacy protection in personalized web search
Supporting privacy protection in personalized web search
 
Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryption Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryption
 
Secure outsourced attribute based signatures
Secure outsourced attribute based signatures Secure outsourced attribute based signatures
Secure outsourced attribute based signatures
 
Mining weakly labeled web facial images for search based face annotation
Mining weakly labeled web facial images for search based face annotation Mining weakly labeled web facial images for search based face annotation
Mining weakly labeled web facial images for search based face annotation
 
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
 
Dealing with concept drifts in process mining
Dealing with concept drifts in process mining Dealing with concept drifts in process mining
Dealing with concept drifts in process mining
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
 
Latest Android topics for Computer Engineering Students
Latest Android topics for Computer Engineering StudentsLatest Android topics for Computer Engineering Students
Latest Android topics for Computer Engineering Students
 
IEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS Diploma
IEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS DiplomaIEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS Diploma
IEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS Diploma
 
IEEE 2014 java and android BE, MCA, ME Computer Engineering Projects
IEEE 2014 java and android BE, MCA, ME Computer Engineering ProjectsIEEE 2014 java and android BE, MCA, ME Computer Engineering Projects
IEEE 2014 java and android BE, MCA, ME Computer Engineering Projects
 
Embedded based projects ocular systems pune
Embedded based projects ocular systems puneEmbedded based projects ocular systems pune
Embedded based projects ocular systems pune
 
Ready project list final
Ready project list finalReady project list final
Ready project list final
 

Recently uploaded

ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
Online aptitude test management system project report.pdf
Online aptitude test management system project report.pdfOnline aptitude test management system project report.pdf
Online aptitude test management system project report.pdf
Kamal Acharya
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.pptPROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
bhadouriyakaku
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
dxobcob
 
Low power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniquesLow power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniques
nooriasukmaningtyas
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
heavyhaig
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Soumen Santra
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
Divyam548318
 
Series of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.pptSeries of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.ppt
PauloRodrigues104553
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
ihlasbinance2003
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
drwaing
 

Recently uploaded (20)

ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
Online aptitude test management system project report.pdf
Online aptitude test management system project report.pdfOnline aptitude test management system project report.pdf
Online aptitude test management system project report.pdf
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.pptPROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
 
Low power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniquesLow power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniques
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
 
Series of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.pptSeries of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.ppt
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
 

Preserving location privacy in geo social applications

  • 1. We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live chat with us at www.ocularsystems.in or call us on 020 30858066 or Mail Us: info@ocularsystems.in Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra) Preserving Location Privacy in Geo-Social Applications Abstract: Using geo-social applications, such as FourSquare, millions of people interact with their surroundings through their friends and their recommendations. Without adequate privacy protection, however, these systems can be easily misused, e.g., to track users target them for home invasion. In this paper, we introduce LocX, a novel alternative that provides significantly-improved locationprivacy without adding uncertainty into query results or relying on strong assumptions about server security. Our key insight is to applysecure user-specific, distance-preserving coordinate transformations to all location data shared with the server. The friends of a usershare this user’s secrets so they can apply the same transformation. This allows all location queries to be evaluated correctly by theserver, but our privacy mechanisms guarantee that servers are unable to see or infer the actual location data from the transformeddata or from the data access. We show thatLocX provides privacy even against a powerful adversary model, and we use prototypemeasurements to show that it provides privacy with very little performance overhead, making it suitable for today’s mobile devices.
  • 2. We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live chat with us at www.ocularsystems.in or call us on 020 30858066 or Mail Us: info@ocularsystems.in Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra) Architecture Diagram: Existing System: Existing systems have mainly taken three approaches to improving user privacy in geo-social systems: (a) introducinguncertainty or error into location data .
  • 3. We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live chat with us at www.ocularsystems.in or call us on 020 30858066 or Mail Us: info@ocularsystems.in Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra) (b) relying on trusted servers or intermediaries to apply anonymization to user identities and private data. (c) relying on heavy-weight cryptographic or private information retrieval (PIR) techniques. The challenge, then, is to design mechanisms that efficiently protect user privacy without sacrificing the accuracy of the system, or making strong assumptions about the security or trust worthiness of the application servers. More specifically, we target geo-social applications, and assume that servers (and any intermediaries) can be compromised and, therefore, are untrusted. Proposed System: To address this challenge, in this paper, we propose LocX (short for location to index mapping), a novel approach to achieving user privacy while maintaining full accuracy in location-based social applications (LBSAs from here onwards). Our insight is that many services do not need to resolve distance-based queries between arbitrary pairs of users, but only between friends interested in each other’s locations and data. Thus, we can partition location data based on users’ social groups, and then perform transformations on the location coordinates before storing them on un trusted servers. A user knows the transformation keys of all her friends, allowing her to transform her query into the virtual coordinate system that her friends use. Our coordinate transformations preserve distance metrics, allowing an application server to perform both point and nearest-neighbor queries correctly
  • 4. We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live chat with us at www.ocularsystems.in or call us on 020 30858066 or Mail Us: info@ocularsystems.in Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra) on transformed data. However, the transformation is secure, in that transformed values cannot be easily associated with real world locations without a secret, which is only available to the members of the social group. Finally, transformations are efficient, in that they incur minimal overhead on the LBSAs. This makes the applications built on LocX lightweight and suitable for running on today’s mobile devices. Main Modules: 1.Locx module 2.proxy server 3.index server 4.Data Server LOCX Module: Loc X builds on top of the basic design, and introduces two new mechanisms to overcome its limitations. First, in Loc X, we split the mapping between the location and its data into two pairs: a mapping from the transformed location to an encrypted index (called L2I), and a mapping from the index to the encrypted location data (called I2D). This splitting helps in making our system efficient. Second, users store and retrieve the L2Is via untrusted proxies. This redirection of
  • 5. We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live chat with us at www.ocularsystems.in or call us on 020 30858066 or Mail Us: info@ocularsystems.in Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra) data via proxies, together with splitting, significantly improves privacy in LocX. For efficiency, I2Ds are not proxied, yet privacy is preserved (as explained later). Proxying L2Is for location privacy: Users store their L2Ison the index server via untrusted proxies. These proxies can be any of the following: Planet Lab nodes, corporate NAT sand email servers in a user’s work places, a user’s home and office desktops or laptops, or Tor [34] nodes. We only need a one-hop indirection between the user and the index server. These diverse types of proxies provide tremendous flexibility in proxying L2Is, thus a user can store her L2Is via different proxies without restricting herself to a single proxy. Furthermore, compromising these proxies by an attacker does not break users’ location privacy, as (a) the proxies also only see transformed location coordinates and hence do not learn the users’ real locations, and (b) due to the noise added toL2Is (described later). To simplify the description, for now, we assume that the proxies are non-malicious and do not collude with the index server. But we will later describe our solution in detail to even defend against colluding, malicious proxies. With this high-level overview, we now describe our solution to store and query data on the servers in detail. We also explain the challenges we faced, and the tradeoffs we made in making our solution secure and efficient. Storing L2I on the index server:
  • 6. We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live chat with us at www.ocularsystems.in or call us on 020 30858066 or Mail Us: info@ocularsystems.in Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra) First consider storing L2I on the index server. This transformation preserves the distances between points1, so circular range and nearest neighbor queries for a friend’s location data can be processed in the same way on transformed coordinates as on real-world coordinates. Then the user generates a random index (i) using her random number generator and encrypts it with her symmetric key to obtain at the transformed coordinate on the index server via a proxy. The L2I is small in size and is application independent, as it always contains the coordinates and an encrypted random index. Thus the over head due to proxying is very small. Storing I2Ds on the data server: The user can directly storeI2Ds (location data) on the data server. This is both secure and efficient. 1) This is secure because the data server only sees the index stored by the user and the corresponding encrypted blob of data. In the worst case, the data server can link all the different indices to the same user device, and then link these indices to the retrieving user’s device. But this only reveals that one user is interested in another user’s data, but not any information about the location of the users, or the content of the I2Ds, or the real-world sites to which the data in the encrypted blob corresponds to. 2) The content of I2Dis application dependent. For example, a location-based video or photo sharing service might share multiple MBs of data at each location. Since this data is not proxied, LocX still maintains the efficiency of today’s systems.
  • 7. We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live chat with us at www.ocularsystems.in or call us on 020 30858066 or Mail Us: info@ocularsystems.in Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra) Mechanisms: In this we use Locx Mechanisms is used in this project. 1) Alice and Bob exchange their secrets, 2) Alice generates and L2I and I2D from her review of the restaurant (at (x, y)), and stores the L2I on the index server via a proxy. 3) She then stores the I2D on the data server directly. 4) Bob later visits the restaurant and fetches for L2Is from his friends by sending the transformed coordinates via a proxy. 5) he decrypts the L2I obtained and then queries for the corresponding I2D, 6) finally Bob decrypts Alice’s review. System Configuration:- H/W System Configuration:- Processor - Pentium –III Speed - 1.1 Ghz RAM - 256 MB(min) Hard Disk - 20 GB Floppy Drive - 1.44 MB
  • 8. We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live chat with us at www.ocularsystems.in or call us on 020 30858066 or Mail Us: info@ocularsystems.in Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra) Key Board - Standard Windows Keyboard Mouse - Two or Three Button Mouse Monitor - SVGA S/W System Configuration:-  Operating System :Windows95/98/2000/XP  Front End : java, jdk1.6  Database : My sqlserver 2005  Database Connectivity : JDBC.