SlideShare a Scribd company logo
1 of 5
GLOBALSOFT TECHNOLOGIES 
IEEE PROJECTS & SOFTWARE DEVELOPMENTS 
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE 
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS 
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmai l.com 
Preserving Location Privacy in Geosocial Applications 
ABSTRACT: 
Using geosocial applications, such as FourSquare, millions of people interact with 
their surroundings through their friends and their recommendations. Without 
adequate privacy protection, however, these systems can be easily misused, for 
example, to track users or target them for home invasion. In this paper, we 
introduce LocX, a novel alternative that provides significantly improvedlocation 
privacy without adding uncertainty into query results or relying on strong 
assumptions about server security. Our key insight is to apply secure user-specific, 
distance-preserving coordinate transformations to all location data shared with the 
server. The friends of a user share this user’s secrets so they can apply the same 
transformation. This allows all location queries to be evaluated correctly by the 
server, but our privacy mechanisms guarantee that servers are unable to see or infer 
the actual location data from the transformed data or from the data access. We 
show that LocX provides privacy even against a powerful adversary model, and we 
use prototype measurements to show that it provides privacy with very little 
performance overhead, making it suitable for today’s mobile devices.
EXISTING SYSTEM: 
Existing systems have mainly taken three approaches to improving user privacy in 
geosocial systems: 
 Introducing uncertainty or error into location data. 
 Relying on trusted servers or intermediaries to apply anonymization to user 
identities and private data. 
 Relying on heavy-weight cryptographic or private information retrieval 
(PIR) techniques. 
None of them, however, have proven successful on current application platforms. 
Techniques using the first approach fall short because they require both users and 
application providers to introduce uncertainty into their data, which degrades the 
quality of application results returned to the user. In this approach, there is a 
fundamental tradeoff between the amount of error introduced into the time or 
location domain, and the amount of privacy granted to the user. Users dislike the 
loss of accuracy in results, and application providers have a natural disincentive to 
hide user data from themselves, which reduces their ability to monetize the data. 
The second approach relies on the trusted proxies or servers in the system to 
protect user privacy. This is a risky assumption, since private data can be exposed 
by either software bugs and configuration errors at the trusted servers or by 
malicious administrators. Finally, relying on heavy-weight cryptographic 
mechanisms to obtain provable privacy guarantees are too expensive to deploy on 
mobile devices and even on the servers in answering queries such as nearest 
neighbor and range queries.
DISADVANTAGES OF EXISTING SYSTEM: 
 Location data privacy. The servers should not be able to view the content of 
data stored at a location. 
 This new functionality comes with significantly increased risks to personal 
privacy. 
PROPOSED SYSTEM: 
In this paper, we propose LocX(short for location to index mapping), a novel 
approach to achieving user privacy while maintaining full accuracy in location-based 
social applications (LBSAs from here on ward). Our insight is that many 
services do not need to resolve distance-based queries between arbitrary pairs of 
users, but only between friends interested in each other’s locations and data. Thus, 
we can partition location data based on users’ social groups, and then perform 
transformations on the location coordinates before storing them on untrusted 
servers. A user knows the transformation keys of all her friends, allowing her to 
transform her query into the virtual coordinate system that her friends use. Our 
coordinate transformations preserve distance metrics, allowing an application 
server to perform both point and nearest-neighbor queries correctly on transformed 
data. However, the transformation is secure, in that transformed values cannot be 
easily associated with real-world locations without a secret, which is only available 
to the members of the social group. Finally, transformations are efficient, in that 
they incur minimal overhead on the LBSAs. This makes the applications built on 
LocX lightweight and suitable for running on today’s mobile devices.
ADVANTAGES OF PROPOSED SYSTEM: 
 Our goal is to support both query types in an efficient fashion, suitable for 
today’s mobile devices. 
 Flexibility to support point, circular range, and nearest-neighbor queries on 
location data. 
 Strong location privacy. The servers processing the data (and the 
administrators of these servers) should not be able to learn the history of 
locations that a user has visited. 
SYSTEM ARCHITECTURE: 
SYSTEM REQUIREMENTS: 
HARDWARE REQUIREMENTS: 
 System : Pentium IV 2.4 GHz.
 Hard Disk : 40 GB. 
 Floppy Drive : 1.44 Mb. 
 Monitor : 15 VGA Colour. 
 Mouse : Logitech. 
 Ram : 512 Mb. 
SOFTWARE REQUIREMENTS: 
 Operating system : Windows XP/7. 
 Coding Language : ASP.net, C#.net 
 Tool : Visual Studio 2010 
 Database : SQL SERVER 2008 
REFERENCE: 
Krishna P.N. Puttaswamy, Shiyuan Wang, Troy Steinbauer, Divyakant Agrawal, 
Fellow, IEEE, Amr El Abbadi, Christopher Kruegel, and Ben Y. 
Zhao,“Preserving Location Privacy in Geosocial Applications”, IEEE 
TRANSACTIONS ON MOBILE COMPUTING,VOL. 13,NO. 1, JANUARY 
2014.

More Related Content

What's hot

Context aware applications
Context aware applicationsContext aware applications
Context aware applicationsRifad Mohamed
 
UbiComp2011: ContextCapture (Poster)
UbiComp2011: ContextCapture (Poster)UbiComp2011: ContextCapture (Poster)
UbiComp2011: ContextCapture (Poster)Ville Antila
 
Macro and micro aspects in RE for AOSE
Macro and micro aspects in RE for AOSEMacro and micro aspects in RE for AOSE
Macro and micro aspects in RE for AOSEEhsan Alirezaei
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...IEEEFINALYEARSTUDENTPROJECTS
 
Security analysis of a privacy preserving decentralized key-policy attribute-...
Security analysis of a privacy preserving decentralized key-policy attribute-...Security analysis of a privacy preserving decentralized key-policy attribute-...
Security analysis of a privacy preserving decentralized key-policy attribute-...JPINFOTECH JAYAPRAKASH
 

What's hot (7)

Crime security.
Crime security.Crime security.
Crime security.
 
Context aware applications
Context aware applicationsContext aware applications
Context aware applications
 
Terrance A. 10.20.15
Terrance A. 10.20.15Terrance A. 10.20.15
Terrance A. 10.20.15
 
UbiComp2011: ContextCapture (Poster)
UbiComp2011: ContextCapture (Poster)UbiComp2011: ContextCapture (Poster)
UbiComp2011: ContextCapture (Poster)
 
Macro and micro aspects in RE for AOSE
Macro and micro aspects in RE for AOSEMacro and micro aspects in RE for AOSE
Macro and micro aspects in RE for AOSE
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...
 
Security analysis of a privacy preserving decentralized key-policy attribute-...
Security analysis of a privacy preserving decentralized key-policy attribute-...Security analysis of a privacy preserving decentralized key-policy attribute-...
Security analysis of a privacy preserving decentralized key-policy attribute-...
 

Similar to IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geosocial-applications

preserving location privacy in geosocial applications
preserving location privacy in geosocial applicationspreserving location privacy in geosocial applications
preserving location privacy in geosocial applicationsswathi78
 
Privacy preserving location sharing services for social networks(1)
Privacy preserving location sharing services for social networks(1)Privacy preserving location sharing services for social networks(1)
Privacy preserving location sharing services for social networks(1)Kamal Spring
 
Securing Location of User in Geo Social Networking
Securing Location of User in Geo Social NetworkingSecuring Location of User in Geo Social Networking
Securing Location of User in Geo Social NetworkingIRJET Journal
 
JPJ1437 Exploiting Service Similarity for Privacy in Location-Based Search Q...
JPJ1437  Exploiting Service Similarity for Privacy in Location-Based Search Q...JPJ1437  Exploiting Service Similarity for Privacy in Location-Based Search Q...
JPJ1437 Exploiting Service Similarity for Privacy in Location-Based Search Q...chennaijp
 
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...IEEEMEMTECHSTUDENTSPROJECTS
 
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...IEEEFINALYEARSTUDENTPROJECT
 
2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...IEEEFINALYEARSTUDENTSPROJECTS
 
2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...IEEEFINALYEARSTUDENTPROJECT
 
Privacy - Preserving Reputation with Content Protecting Location Based Queries
Privacy - Preserving Reputation with Content Protecting Location Based QueriesPrivacy - Preserving Reputation with Content Protecting Location Based Queries
Privacy - Preserving Reputation with Content Protecting Location Based Queriesiosrjce
 
Live Matches , Streaming , Scores
Live Matches , Streaming , ScoresLive Matches , Streaming , Scores
Live Matches , Streaming , Scoreswebcric .site
 
Indoor localization Leveraging Human Perception of Textual Signs
Indoor localization Leveraging Human Perception of Textual SignsIndoor localization Leveraging Human Perception of Textual Signs
Indoor localization Leveraging Human Perception of Textual SignsShekhar Vimalendu
 
A scalable server architecture for mobile presence services in social network...
A scalable server architecture for mobile presence services in social network...A scalable server architecture for mobile presence services in social network...
A scalable server architecture for mobile presence services in social network...IEEEFINALYEARPROJECTS
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...IEEEGLOBALSOFTTECHNOLOGIES
 
JAVA 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for mob...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for mob...JAVA 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for mob...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for mob...IEEEGLOBALSOFTTECHNOLOGIES
 
exploiting service similarity for privacy in location-based search queries
exploiting service similarity for privacy in location-based search queriesexploiting service similarity for privacy in location-based search queries
exploiting service similarity for privacy in location-based search queriesswathi78
 
Moses supporting and enforcing security profiles on smartphones
Moses supporting and enforcing security profiles on smartphonesMoses supporting and enforcing security profiles on smartphones
Moses supporting and enforcing security profiles on smartphonesJPINFOTECH JAYAPRAKASH
 
JPA1414 MOSES: Supporting and Enforcing Security Profiles on Smartphones
JPA1414  MOSES: Supporting and Enforcing Security Profiles on SmartphonesJPA1414  MOSES: Supporting and Enforcing Security Profiles on Smartphones
JPA1414 MOSES: Supporting and Enforcing Security Profiles on Smartphoneschennaijp
 
Ieee projects-2014-bulk-ieee-projects-2015-title-list-for-me-be-mphil-final-y...
Ieee projects-2014-bulk-ieee-projects-2015-title-list-for-me-be-mphil-final-y...Ieee projects-2014-bulk-ieee-projects-2015-title-list-for-me-be-mphil-final-y...
Ieee projects-2014-bulk-ieee-projects-2015-title-list-for-me-be-mphil-final-y...birdsking
 

Similar to IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geosocial-applications (20)

preserving location privacy in geosocial applications
preserving location privacy in geosocial applicationspreserving location privacy in geosocial applications
preserving location privacy in geosocial applications
 
Privacy preserving location sharing services for social networks(1)
Privacy preserving location sharing services for social networks(1)Privacy preserving location sharing services for social networks(1)
Privacy preserving location sharing services for social networks(1)
 
Securing Location of User in Geo Social Networking
Securing Location of User in Geo Social NetworkingSecuring Location of User in Geo Social Networking
Securing Location of User in Geo Social Networking
 
JPJ1437 Exploiting Service Similarity for Privacy in Location-Based Search Q...
JPJ1437  Exploiting Service Similarity for Privacy in Location-Based Search Q...JPJ1437  Exploiting Service Similarity for Privacy in Location-Based Search Q...
JPJ1437 Exploiting Service Similarity for Privacy in Location-Based Search Q...
 
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...
 
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...
 
2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...
 
2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...
 
azd document
azd documentazd document
azd document
 
H017665256
H017665256H017665256
H017665256
 
Privacy - Preserving Reputation with Content Protecting Location Based Queries
Privacy - Preserving Reputation with Content Protecting Location Based QueriesPrivacy - Preserving Reputation with Content Protecting Location Based Queries
Privacy - Preserving Reputation with Content Protecting Location Based Queries
 
Live Matches , Streaming , Scores
Live Matches , Streaming , ScoresLive Matches , Streaming , Scores
Live Matches , Streaming , Scores
 
Indoor localization Leveraging Human Perception of Textual Signs
Indoor localization Leveraging Human Perception of Textual SignsIndoor localization Leveraging Human Perception of Textual Signs
Indoor localization Leveraging Human Perception of Textual Signs
 
A scalable server architecture for mobile presence services in social network...
A scalable server architecture for mobile presence services in social network...A scalable server architecture for mobile presence services in social network...
A scalable server architecture for mobile presence services in social network...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
 
JAVA 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for mob...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for mob...JAVA 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for mob...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for mob...
 
exploiting service similarity for privacy in location-based search queries
exploiting service similarity for privacy in location-based search queriesexploiting service similarity for privacy in location-based search queries
exploiting service similarity for privacy in location-based search queries
 
Moses supporting and enforcing security profiles on smartphones
Moses supporting and enforcing security profiles on smartphonesMoses supporting and enforcing security profiles on smartphones
Moses supporting and enforcing security profiles on smartphones
 
JPA1414 MOSES: Supporting and Enforcing Security Profiles on Smartphones
JPA1414  MOSES: Supporting and Enforcing Security Profiles on SmartphonesJPA1414  MOSES: Supporting and Enforcing Security Profiles on Smartphones
JPA1414 MOSES: Supporting and Enforcing Security Profiles on Smartphones
 
Ieee projects-2014-bulk-ieee-projects-2015-title-list-for-me-be-mphil-final-y...
Ieee projects-2014-bulk-ieee-projects-2015-title-list-for-me-be-mphil-final-y...Ieee projects-2014-bulk-ieee-projects-2015-title-list-for-me-be-mphil-final-y...
Ieee projects-2014-bulk-ieee-projects-2015-title-list-for-me-be-mphil-final-y...
 

More from IEEEMEMTECHSTUDENTPROJECTS

IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Web image re ranking using query-sp...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Web image re ranking using query-sp...IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Web image re ranking using query-sp...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Web image re ranking using query-sp...IEEEMEMTECHSTUDENTPROJECTS
 
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Scalable analytics for iaa s cloud ...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Scalable analytics for iaa s cloud ...IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Scalable analytics for iaa s cloud ...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Scalable analytics for iaa s cloud ...IEEEMEMTECHSTUDENTPROJECTS
 
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Qos aware geographic opportunistic ...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Qos aware geographic opportunistic ...IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Qos aware geographic opportunistic ...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Qos aware geographic opportunistic ...IEEEMEMTECHSTUDENTPROJECTS
 
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search overIEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search overIEEEMEMTECHSTUDENTPROJECTS
 
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Dynamic cloud pricing for revenue m...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Dynamic cloud pricing for revenue m...IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Dynamic cloud pricing for revenue m...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Dynamic cloud pricing for revenue m...IEEEMEMTECHSTUDENTPROJECTS
 
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Distributed -concurrent--and-indepe...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Distributed -concurrent--and-indepe...IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Distributed -concurrent--and-indepe...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Distributed -concurrent--and-indepe...IEEEMEMTECHSTUDENTPROJECTS
 
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...IEEEMEMTECHSTUDENTPROJECTS
 
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Automatic scaling of internet appli...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Automatic scaling of internet appli...IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Automatic scaling of internet appli...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Automatic scaling of internet appli...IEEEMEMTECHSTUDENTPROJECTS
 
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS A scientometric analysis of cloud c...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS A scientometric analysis of cloud c...IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS A scientometric analysis of cloud c...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS A scientometric analysis of cloud c...IEEEMEMTECHSTUDENTPROJECTS
 
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS A mechanism design approach to reso...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS A mechanism design approach to reso...IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS A mechanism design approach to reso...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS A mechanism design approach to reso...IEEEMEMTECHSTUDENTPROJECTS
 
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Smart dc mobility prediction based...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Smart dc mobility prediction based...IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Smart dc mobility prediction based...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Smart dc mobility prediction based...IEEEMEMTECHSTUDENTPROJECTS
 
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Autonomous mobile-mesh-networks
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Autonomous mobile-mesh-networksIEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Autonomous mobile-mesh-networks
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Autonomous mobile-mesh-networksIEEEMEMTECHSTUDENTPROJECTS
 
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS A qos-oriented-distributed-routing...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS A qos-oriented-distributed-routing...IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS A qos-oriented-distributed-routing...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS A qos-oriented-distributed-routing...IEEEMEMTECHSTUDENTPROJECTS
 
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS An active resource orchestration f...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS An active resource orchestration f...IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS An active resource orchestration f...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS An active resource orchestration f...IEEEMEMTECHSTUDENTPROJECTS
 
IEEE 2014 DOTNET NETWORKING PROJECTS Secure data-retrieval-for-decentralized-...
IEEE 2014 DOTNET NETWORKING PROJECTS Secure data-retrieval-for-decentralized-...IEEE 2014 DOTNET NETWORKING PROJECTS Secure data-retrieval-for-decentralized-...
IEEE 2014 DOTNET NETWORKING PROJECTS Secure data-retrieval-for-decentralized-...IEEEMEMTECHSTUDENTPROJECTS
 
IEEE 2014 DOTNET NETWORKING PROJECTS Qos aware geographic opportunistic routi...
IEEE 2014 DOTNET NETWORKING PROJECTS Qos aware geographic opportunistic routi...IEEE 2014 DOTNET NETWORKING PROJECTS Qos aware geographic opportunistic routi...
IEEE 2014 DOTNET NETWORKING PROJECTS Qos aware geographic opportunistic routi...IEEEMEMTECHSTUDENTPROJECTS
 
IEEE 2014 DOTNET NETWORKING PROJECTS Pricing under constraints_in_access_netw...
IEEE 2014 DOTNET NETWORKING PROJECTS Pricing under constraints_in_access_netw...IEEE 2014 DOTNET NETWORKING PROJECTS Pricing under constraints_in_access_netw...
IEEE 2014 DOTNET NETWORKING PROJECTS Pricing under constraints_in_access_netw...IEEEMEMTECHSTUDENTPROJECTS
 
IEEE 2014 DOTNET NETWORKING PROJECTS Network intrusion detection system using...
IEEE 2014 DOTNET NETWORKING PROJECTS Network intrusion detection system using...IEEE 2014 DOTNET NETWORKING PROJECTS Network intrusion detection system using...
IEEE 2014 DOTNET NETWORKING PROJECTS Network intrusion detection system using...IEEEMEMTECHSTUDENTPROJECTS
 
IEEE 2014 DOTNET NETWORKING PROJECTS Leveraging social networks for p2 p cont...
IEEE 2014 DOTNET NETWORKING PROJECTS Leveraging social networks for p2 p cont...IEEE 2014 DOTNET NETWORKING PROJECTS Leveraging social networks for p2 p cont...
IEEE 2014 DOTNET NETWORKING PROJECTS Leveraging social networks for p2 p cont...IEEEMEMTECHSTUDENTPROJECTS
 
IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...
IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...
IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...IEEEMEMTECHSTUDENTPROJECTS
 

More from IEEEMEMTECHSTUDENTPROJECTS (20)

IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Web image re ranking using query-sp...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Web image re ranking using query-sp...IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Web image re ranking using query-sp...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Web image re ranking using query-sp...
 
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Scalable analytics for iaa s cloud ...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Scalable analytics for iaa s cloud ...IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Scalable analytics for iaa s cloud ...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Scalable analytics for iaa s cloud ...
 
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Qos aware geographic opportunistic ...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Qos aware geographic opportunistic ...IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Qos aware geographic opportunistic ...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Qos aware geographic opportunistic ...
 
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search overIEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
 
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Dynamic cloud pricing for revenue m...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Dynamic cloud pricing for revenue m...IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Dynamic cloud pricing for revenue m...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Dynamic cloud pricing for revenue m...
 
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Distributed -concurrent--and-indepe...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Distributed -concurrent--and-indepe...IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Distributed -concurrent--and-indepe...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Distributed -concurrent--and-indepe...
 
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...
 
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Automatic scaling of internet appli...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Automatic scaling of internet appli...IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Automatic scaling of internet appli...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Automatic scaling of internet appli...
 
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS A scientometric analysis of cloud c...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS A scientometric analysis of cloud c...IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS A scientometric analysis of cloud c...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS A scientometric analysis of cloud c...
 
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS A mechanism design approach to reso...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS A mechanism design approach to reso...IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS A mechanism design approach to reso...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS A mechanism design approach to reso...
 
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Smart dc mobility prediction based...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Smart dc mobility prediction based...IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Smart dc mobility prediction based...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Smart dc mobility prediction based...
 
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Autonomous mobile-mesh-networks
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Autonomous mobile-mesh-networksIEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Autonomous mobile-mesh-networks
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Autonomous mobile-mesh-networks
 
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS A qos-oriented-distributed-routing...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS A qos-oriented-distributed-routing...IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS A qos-oriented-distributed-routing...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS A qos-oriented-distributed-routing...
 
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS An active resource orchestration f...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS An active resource orchestration f...IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS An active resource orchestration f...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS An active resource orchestration f...
 
IEEE 2014 DOTNET NETWORKING PROJECTS Secure data-retrieval-for-decentralized-...
IEEE 2014 DOTNET NETWORKING PROJECTS Secure data-retrieval-for-decentralized-...IEEE 2014 DOTNET NETWORKING PROJECTS Secure data-retrieval-for-decentralized-...
IEEE 2014 DOTNET NETWORKING PROJECTS Secure data-retrieval-for-decentralized-...
 
IEEE 2014 DOTNET NETWORKING PROJECTS Qos aware geographic opportunistic routi...
IEEE 2014 DOTNET NETWORKING PROJECTS Qos aware geographic opportunistic routi...IEEE 2014 DOTNET NETWORKING PROJECTS Qos aware geographic opportunistic routi...
IEEE 2014 DOTNET NETWORKING PROJECTS Qos aware geographic opportunistic routi...
 
IEEE 2014 DOTNET NETWORKING PROJECTS Pricing under constraints_in_access_netw...
IEEE 2014 DOTNET NETWORKING PROJECTS Pricing under constraints_in_access_netw...IEEE 2014 DOTNET NETWORKING PROJECTS Pricing under constraints_in_access_netw...
IEEE 2014 DOTNET NETWORKING PROJECTS Pricing under constraints_in_access_netw...
 
IEEE 2014 DOTNET NETWORKING PROJECTS Network intrusion detection system using...
IEEE 2014 DOTNET NETWORKING PROJECTS Network intrusion detection system using...IEEE 2014 DOTNET NETWORKING PROJECTS Network intrusion detection system using...
IEEE 2014 DOTNET NETWORKING PROJECTS Network intrusion detection system using...
 
IEEE 2014 DOTNET NETWORKING PROJECTS Leveraging social networks for p2 p cont...
IEEE 2014 DOTNET NETWORKING PROJECTS Leveraging social networks for p2 p cont...IEEE 2014 DOTNET NETWORKING PROJECTS Leveraging social networks for p2 p cont...
IEEE 2014 DOTNET NETWORKING PROJECTS Leveraging social networks for p2 p cont...
 
IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...
IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...
IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...
 

Recently uploaded

Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 

Recently uploaded (20)

Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 

IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geosocial-applications

  • 1. GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmai l.com Preserving Location Privacy in Geosocial Applications ABSTRACT: Using geosocial applications, such as FourSquare, millions of people interact with their surroundings through their friends and their recommendations. Without adequate privacy protection, however, these systems can be easily misused, for example, to track users or target them for home invasion. In this paper, we introduce LocX, a novel alternative that provides significantly improvedlocation privacy without adding uncertainty into query results or relying on strong assumptions about server security. Our key insight is to apply secure user-specific, distance-preserving coordinate transformations to all location data shared with the server. The friends of a user share this user’s secrets so they can apply the same transformation. This allows all location queries to be evaluated correctly by the server, but our privacy mechanisms guarantee that servers are unable to see or infer the actual location data from the transformed data or from the data access. We show that LocX provides privacy even against a powerful adversary model, and we use prototype measurements to show that it provides privacy with very little performance overhead, making it suitable for today’s mobile devices.
  • 2. EXISTING SYSTEM: Existing systems have mainly taken three approaches to improving user privacy in geosocial systems:  Introducing uncertainty or error into location data.  Relying on trusted servers or intermediaries to apply anonymization to user identities and private data.  Relying on heavy-weight cryptographic or private information retrieval (PIR) techniques. None of them, however, have proven successful on current application platforms. Techniques using the first approach fall short because they require both users and application providers to introduce uncertainty into their data, which degrades the quality of application results returned to the user. In this approach, there is a fundamental tradeoff between the amount of error introduced into the time or location domain, and the amount of privacy granted to the user. Users dislike the loss of accuracy in results, and application providers have a natural disincentive to hide user data from themselves, which reduces their ability to monetize the data. The second approach relies on the trusted proxies or servers in the system to protect user privacy. This is a risky assumption, since private data can be exposed by either software bugs and configuration errors at the trusted servers or by malicious administrators. Finally, relying on heavy-weight cryptographic mechanisms to obtain provable privacy guarantees are too expensive to deploy on mobile devices and even on the servers in answering queries such as nearest neighbor and range queries.
  • 3. DISADVANTAGES OF EXISTING SYSTEM:  Location data privacy. The servers should not be able to view the content of data stored at a location.  This new functionality comes with significantly increased risks to personal privacy. PROPOSED SYSTEM: In this paper, we propose LocX(short for location to index mapping), a novel approach to achieving user privacy while maintaining full accuracy in location-based social applications (LBSAs from here on ward). Our insight is that many services do not need to resolve distance-based queries between arbitrary pairs of users, but only between friends interested in each other’s locations and data. Thus, we can partition location data based on users’ social groups, and then perform transformations on the location coordinates before storing them on untrusted servers. A user knows the transformation keys of all her friends, allowing her to transform her query into the virtual coordinate system that her friends use. Our coordinate transformations preserve distance metrics, allowing an application server to perform both point and nearest-neighbor queries correctly on transformed data. However, the transformation is secure, in that transformed values cannot be easily associated with real-world locations without a secret, which is only available to the members of the social group. Finally, transformations are efficient, in that they incur minimal overhead on the LBSAs. This makes the applications built on LocX lightweight and suitable for running on today’s mobile devices.
  • 4. ADVANTAGES OF PROPOSED SYSTEM:  Our goal is to support both query types in an efficient fashion, suitable for today’s mobile devices.  Flexibility to support point, circular range, and nearest-neighbor queries on location data.  Strong location privacy. The servers processing the data (and the administrators of these servers) should not be able to learn the history of locations that a user has visited. SYSTEM ARCHITECTURE: SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.
  • 5.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7.  Coding Language : ASP.net, C#.net  Tool : Visual Studio 2010  Database : SQL SERVER 2008 REFERENCE: Krishna P.N. Puttaswamy, Shiyuan Wang, Troy Steinbauer, Divyakant Agrawal, Fellow, IEEE, Amr El Abbadi, Christopher Kruegel, and Ben Y. Zhao,“Preserving Location Privacy in Geosocial Applications”, IEEE TRANSACTIONS ON MOBILE COMPUTING,VOL. 13,NO. 1, JANUARY 2014.