SlideShare a Scribd company logo
The Master of IEEE Projects
Copyright © 2015 LeMeniz Infotech. All rights reserved
Page number 1
IEEE Master
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
Privacy-Preserving Location Sharing Services for Social
Networks
Abstract :
A common functionality of many location-based social networking applications is
a location sharing service that allows a group of friends to share their locations.
With a potentially untrusted server, such a location sharing service may threaten
the privacy of users. Existing solutions for Privacy-Preserving Location Sharing
Services (PPLSS) require a trusted third party that has access to the exact location
of all users in the system or rely on expensive algorithms or protocols in terms of
computational or communication overhead. Other solutions can only provide
approximate query answers. To overcome these limitations, we propose a new
encryption notion, called Order-Retrievable Encryption (ORE), for PPLSS for
social networking applications. The distinguishing characteristics of our PPLSS are
that it (1) allows a group of friends to share their exact locations without the need
of any third party or leaking any location information to any server or users outside
the group, (2) achieves low computational and communication cost by allowing
users to receive the exact location of their friends without requiring any direct
communication between users or multiple rounds of communication between a
user and a server, (3) provides efficient query processing by designing an index
The Master of IEEE Projects
Copyright © 2015 LeMeniz Infotech. All rights reserved
Page number 2
IEEE Master
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
structure for our ORE scheme, (4) supports dynamic location updates, and (5)
provides personalized privacy protection within a group of friends by specifying a
maximum distance where a user is willing to be located by his/her friends.
Experimental results show that the computational and communication cost of our
PPLSS is much better than the state-of-the-art solution.
Existing system:
Existing location-based social networking systems with location sharing services
rely on a central server which receives location information from all users in the
system. The problem with this approach is that the central server can generate
a detailed movement profile of each user (e.g., the location, time and frequency of
each place which has been visited by each user) and that raises privacy concerns.
Existing privacy-preserving location sharing schemes aim to protect the user
location privacy against the central server, but they still allow the server to provide
the user with the necessary services. However, in some existing schemes, the
central server still knows the user’s approximate location
Disadvantage :
 Increasing the communication cost and making those schemes less practical
 Only return approximate results less useful
The Master of IEEE Projects
Copyright © 2015 LeMeniz Infotech. All rights reserved
Page number 3
IEEE Master
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
 Difficult to realize in mobile phone networks
 Above Diagram represent System Model
Proposed system:
Proposed encryption notion ORE for geographical data. An ORE scheme is a
symmetric key encryption scheme with two additional functions: one is for
generating encrypted query locations and the other one is for the database server to
determine which one between two encrypted user locations is closer to an
encrypted query location. The scheme is called ORE because the order of the
encrypted user locations in terms of their distances from any given encrypted query
location can be retrieved. Note that the actual distance information is not
retrievable. In the formal definition of ORE below, we assume that each distinct
location in PPLSS can be represented uniquely using an element in a d-
The Master of IEEE Projects
Copyright © 2015 LeMeniz Infotech. All rights reserved
Page number 4
IEEE Master
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
dimensional space and without loss of generality, suppose that R is the space of
each dimension. One additional remark is that the ORE scheme defined below can
be viewed as a collection of one-way functions and this one-way function
has the order retrievability property. In other words, our PPLSS framework does
NOT need the decryption algorithm of the ORE scheme.
Advantages:
 Secure location privacy
 Achieves low communication and computational cost
 Supports dynamic location updates.
Conclusion :
In this paper, we introduce an Order-Retrievable Encryption (ORE) scheme; a new
encryption notion for Privacy-Preserving Location Sharing Services (PPLSS) in
social networking applications. ORE is designed to answer location queries that
allow a user to view the exact location of his/her friends within a user-specified
distance without revealing any location information about the user and his/her
friends to the database server and any other users in the system. The
distinguishing characteristics of ORE compared to existing algorithms are that ORE
provides secure location privacy, achieves low communication and computational
cost, and supports dynamic location updates. To improve query processing
The Master of IEEE Projects
Copyright © 2015 LeMeniz Infotech. All rights reserved
Page number 5
IEEE Master
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
efficiency, we propose a tree-like index structure for our ORE scheme (OREIndex)
to facilitate range searches over the encrypted locations of a group of friends. In
addition, a personalized privacy region scheme is proposed to further improve
user privacy within a group of friends by enabling a user to specify a maximum
distance up to which his/her friends are allowed to locate the user. We also
perform experiments to evaluate ORE and ORE-Index and show that their
performance is much better compared to the state-of-theart cryptography-based
technique designed for spatial queries
Hardware Specification :
 System : Pentium IV 2.4 GHz.
 Hard Disk : 40 GB.
 Floppy Drive : 44 Mb.
 Monitor : 15 VGA Colour.
 Mouse : Logitech
 Ram : 512 Mb.
 MOBILE : ANDROID
The Master of IEEE Projects
Copyright © 2015 LeMeniz Infotech. All rights reserved
Page number 6
IEEE Master
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
Software Specification :
 Operating system : Windows 7.
 Coding Language : Java 1.7
 Tool Kit : Android 2.3 ABOVE
 IDE : Android Studio
Reference :
[1] Facebook Places, “http://www.facebook.com/places/.”
[2] Foursquare, “http://www.foursquare.com.”
[3] Google Plus, “https://plus.google.com.”
[4] Loopt, “http://www.loopt.com.”
[5] L. Barkhuus, B. Brown, M. Bell, S. Sherwood, M. Hall, and M. Chalmers, “From
awareness to repartee: Sharing location within social groups,” in Proceedings of
the ACM Conference on Human Factors in Computing Systems, 2008.

More Related Content

What's hot

USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
Nexgen Technology
 
Exploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search QueriesExploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search Queries
Migrant Systems
 
LPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBS
LPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBSLPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBS
LPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBS
IJNSA Journal
 
SURVEY PAPER ON PRIVACY IN LOCATION BASED SEARCH QUERIES.
SURVEY PAPER ON PRIVACY IN LOCATION BASED SEARCH QUERIES.SURVEY PAPER ON PRIVACY IN LOCATION BASED SEARCH QUERIES.
SURVEY PAPER ON PRIVACY IN LOCATION BASED SEARCH QUERIES.
ijiert bestjournal
 
Privacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesPrivacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devices
Adz91 Digital Ads Pvt Ltd
 
Indoor localization Leveraging Human Perception of Textual Signs
Indoor localization Leveraging Human Perception of Textual SignsIndoor localization Leveraging Human Perception of Textual Signs
Indoor localization Leveraging Human Perception of Textual Signs
Shekhar Vimalendu
 
Ijcnc050210
Ijcnc050210Ijcnc050210
Ijcnc050210
IJCNCJournal
 
A SECURE KEY TRANSFER PROTOCOL FOR GROUP COMMUNICATION
A SECURE KEY TRANSFER PROTOCOL FOR GROUP COMMUNICATIONA SECURE KEY TRANSFER PROTOCOL FOR GROUP COMMUNICATION
A SECURE KEY TRANSFER PROTOCOL FOR GROUP COMMUNICATION
acijjournal
 
Seminar
SeminarSeminar
Seminar
Amala Reddy
 
IRJET- Quantify Mutually Dependent Privacy Risks with Locality Data
IRJET- Quantify Mutually Dependent Privacy Risks with Locality DataIRJET- Quantify Mutually Dependent Privacy Risks with Locality Data
IRJET- Quantify Mutually Dependent Privacy Risks with Locality Data
IRJET Journal
 
Preserving location privacy in geo social applications
Preserving location privacy in geo social applicationsPreserving location privacy in geo social applications
Preserving location privacy in geo social applications
Shakas Technologies
 
Preserving location privacy in geo social applications
Preserving location privacy in geo social applications Preserving location privacy in geo social applications
Preserving location privacy in geo social applications
Adz91 Digital Ads Pvt Ltd
 
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
Editor IJCATR
 
Privacy preserving data sharing with anonymous id assignment
Privacy preserving data sharing with anonymous id assignmentPrivacy preserving data sharing with anonymous id assignment
Privacy preserving data sharing with anonymous id assignment
IEEEFINALYEARPROJECTS
 
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
IJCNCJournal
 
preserving location privacy in geosocial applications
preserving location privacy in geosocial applicationspreserving location privacy in geosocial applications
preserving location privacy in geosocial applications
swathi78
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
IDES Editor
 
Flexible and fine grained attribute-based data storage in cloud computing
Flexible and fine grained attribute-based data storage in cloud computingFlexible and fine grained attribute-based data storage in cloud computing
Flexible and fine grained attribute-based data storage in cloud computing
Shakas Technologies
 
Revisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modificationRevisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modificationiaemedu
 

What's hot (19)

USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
 
Exploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search QueriesExploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search Queries
 
LPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBS
LPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBSLPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBS
LPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBS
 
SURVEY PAPER ON PRIVACY IN LOCATION BASED SEARCH QUERIES.
SURVEY PAPER ON PRIVACY IN LOCATION BASED SEARCH QUERIES.SURVEY PAPER ON PRIVACY IN LOCATION BASED SEARCH QUERIES.
SURVEY PAPER ON PRIVACY IN LOCATION BASED SEARCH QUERIES.
 
Privacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesPrivacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devices
 
Indoor localization Leveraging Human Perception of Textual Signs
Indoor localization Leveraging Human Perception of Textual SignsIndoor localization Leveraging Human Perception of Textual Signs
Indoor localization Leveraging Human Perception of Textual Signs
 
Ijcnc050210
Ijcnc050210Ijcnc050210
Ijcnc050210
 
A SECURE KEY TRANSFER PROTOCOL FOR GROUP COMMUNICATION
A SECURE KEY TRANSFER PROTOCOL FOR GROUP COMMUNICATIONA SECURE KEY TRANSFER PROTOCOL FOR GROUP COMMUNICATION
A SECURE KEY TRANSFER PROTOCOL FOR GROUP COMMUNICATION
 
Seminar
SeminarSeminar
Seminar
 
IRJET- Quantify Mutually Dependent Privacy Risks with Locality Data
IRJET- Quantify Mutually Dependent Privacy Risks with Locality DataIRJET- Quantify Mutually Dependent Privacy Risks with Locality Data
IRJET- Quantify Mutually Dependent Privacy Risks with Locality Data
 
Preserving location privacy in geo social applications
Preserving location privacy in geo social applicationsPreserving location privacy in geo social applications
Preserving location privacy in geo social applications
 
Preserving location privacy in geo social applications
Preserving location privacy in geo social applications Preserving location privacy in geo social applications
Preserving location privacy in geo social applications
 
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
 
Privacy preserving data sharing with anonymous id assignment
Privacy preserving data sharing with anonymous id assignmentPrivacy preserving data sharing with anonymous id assignment
Privacy preserving data sharing with anonymous id assignment
 
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
 
preserving location privacy in geosocial applications
preserving location privacy in geosocial applicationspreserving location privacy in geosocial applications
preserving location privacy in geosocial applications
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Flexible and fine grained attribute-based data storage in cloud computing
Flexible and fine grained attribute-based data storage in cloud computingFlexible and fine grained attribute-based data storage in cloud computing
Flexible and fine grained attribute-based data storage in cloud computing
 
Revisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modificationRevisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modification
 

Viewers also liked

The Holonomics Ecosystem Explained
The Holonomics Ecosystem ExplainedThe Holonomics Ecosystem Explained
The Holonomics Ecosystem Explained
Holonomics
 
The impact of api change and fault-proneness on the user ratings of android ...
The impact of api change  and fault-proneness on the user ratings of android ...The impact of api change  and fault-proneness on the user ratings of android ...
The impact of api change and fault-proneness on the user ratings of android ...
LeMeniz Infotech
 
86248635 determinacion-de-cloruros-en-agua
86248635 determinacion-de-cloruros-en-agua86248635 determinacion-de-cloruros-en-agua
86248635 determinacion-de-cloruros-en-agua
Kevin Rojas Vargas
 
Teddy
TeddyTeddy
Teddy
vinnipukkk
 
Darien Project: Solar Energy in the Wouman Village
Darien Project: Solar Energy in the Wouman VillageDarien Project: Solar Energy in the Wouman Village
Darien Project: Solar Energy in the Wouman Village
The Solar Biz
 
Diary Bert Caron
Diary Bert CaronDiary Bert Caron
Diary Bert Caronmdrouet44
 
BATERIAS ETNA
BATERIAS ETNA BATERIAS ETNA
BATERIAS ETNA
Edwin0102
 
20140702 xu jiaming hashinglearning - lite
20140702 xu jiaming hashinglearning - lite20140702 xu jiaming hashinglearning - lite
20140702 xu jiaming hashinglearning - lite
Jacob Xu
 
A fast fault tolerant architecture for sauvola local image thresholding algor...
A fast fault tolerant architecture for sauvola local image thresholding algor...A fast fault tolerant architecture for sauvola local image thresholding algor...
A fast fault tolerant architecture for sauvola local image thresholding algor...
LeMeniz Infotech
 
Yeni grisales
Yeni grisalesYeni grisales
Yeni grisales
Karito Grisales
 
Hrp 091202140026-phpapp01
Hrp 091202140026-phpapp01Hrp 091202140026-phpapp01
Hrp 091202140026-phpapp01Mahi Soni
 
Highly reliable transformerless photovoltaic inverters with leakage current a...
Highly reliable transformerless photovoltaic inverters with leakage current a...Highly reliable transformerless photovoltaic inverters with leakage current a...
Highly reliable transformerless photovoltaic inverters with leakage current a...
LeMeniz Infotech
 
Kontribusi pemerintah dan masyarakat dalam melestarikan kebudayaan
Kontribusi pemerintah dan masyarakat dalam melestarikan kebudayaanKontribusi pemerintah dan masyarakat dalam melestarikan kebudayaan
Kontribusi pemerintah dan masyarakat dalam melestarikan kebudayaanBabyHenry
 

Viewers also liked (14)

The Holonomics Ecosystem Explained
The Holonomics Ecosystem ExplainedThe Holonomics Ecosystem Explained
The Holonomics Ecosystem Explained
 
The impact of api change and fault-proneness on the user ratings of android ...
The impact of api change  and fault-proneness on the user ratings of android ...The impact of api change  and fault-proneness on the user ratings of android ...
The impact of api change and fault-proneness on the user ratings of android ...
 
86248635 determinacion-de-cloruros-en-agua
86248635 determinacion-de-cloruros-en-agua86248635 determinacion-de-cloruros-en-agua
86248635 determinacion-de-cloruros-en-agua
 
Teddy
TeddyTeddy
Teddy
 
Q3
Q3Q3
Q3
 
Darien Project: Solar Energy in the Wouman Village
Darien Project: Solar Energy in the Wouman VillageDarien Project: Solar Energy in the Wouman Village
Darien Project: Solar Energy in the Wouman Village
 
Diary Bert Caron
Diary Bert CaronDiary Bert Caron
Diary Bert Caron
 
BATERIAS ETNA
BATERIAS ETNA BATERIAS ETNA
BATERIAS ETNA
 
20140702 xu jiaming hashinglearning - lite
20140702 xu jiaming hashinglearning - lite20140702 xu jiaming hashinglearning - lite
20140702 xu jiaming hashinglearning - lite
 
A fast fault tolerant architecture for sauvola local image thresholding algor...
A fast fault tolerant architecture for sauvola local image thresholding algor...A fast fault tolerant architecture for sauvola local image thresholding algor...
A fast fault tolerant architecture for sauvola local image thresholding algor...
 
Yeni grisales
Yeni grisalesYeni grisales
Yeni grisales
 
Hrp 091202140026-phpapp01
Hrp 091202140026-phpapp01Hrp 091202140026-phpapp01
Hrp 091202140026-phpapp01
 
Highly reliable transformerless photovoltaic inverters with leakage current a...
Highly reliable transformerless photovoltaic inverters with leakage current a...Highly reliable transformerless photovoltaic inverters with leakage current a...
Highly reliable transformerless photovoltaic inverters with leakage current a...
 
Kontribusi pemerintah dan masyarakat dalam melestarikan kebudayaan
Kontribusi pemerintah dan masyarakat dalam melestarikan kebudayaanKontribusi pemerintah dan masyarakat dalam melestarikan kebudayaan
Kontribusi pemerintah dan masyarakat dalam melestarikan kebudayaan
 

Similar to Privacy preserving location sharing services for social networks

Eplq efficient privacy preserving location-based query over outsourced encryp...
Eplq efficient privacy preserving location-based query over outsourced encryp...Eplq efficient privacy preserving location-based query over outsourced encryp...
Eplq efficient privacy preserving location-based query over outsourced encryp...
LeMeniz Infotech
 
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
IEEEMEMTECHSTUDENTPROJECTS
 
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
IEEEFINALYEARSTUDENTSPROJECTS
 
JPD1435 Preserving Location Privacy in Geosocial Applications
JPD1435   Preserving Location Privacy in Geosocial ApplicationsJPD1435   Preserving Location Privacy in Geosocial Applications
JPD1435 Preserving Location Privacy in Geosocial Applications
chennaijp
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
LeMeniz Infotech
 
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
1crore projects
 
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
1crore projects
 
Location Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data SecurityLocation Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data Security
Editor IJCATR
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Editor IJMTER
 
Stamp enabling privacy preserving location proofs for mobile users
Stamp enabling privacy preserving location proofs for mobile usersStamp enabling privacy preserving location proofs for mobile users
Stamp enabling privacy preserving location proofs for mobile users
LeMeniz Infotech
 
An exploration of geographic authentication scheme
An exploration of geographic authentication schemeAn exploration of geographic authentication scheme
An exploration of geographic authentication scheme
LeMeniz Infotech
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud assisted mobile-access of healt...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud assisted mobile-access of healt...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud assisted mobile-access of healt...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud assisted mobile-access of healt...
IEEEGLOBALSOFTSTUDENTPROJECTS
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...
IEEEFINALYEARSTUDENTPROJECTS
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT Cloud assisted mobile-access of health...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Cloud assisted mobile-access of health...2014 IEEE JAVA CLOUD COMPUTING PROJECT Cloud assisted mobile-access of health...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Cloud assisted mobile-access of health...
IEEEFINALSEMSTUDENTPROJECTS
 
2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...
IEEEFINALYEARSTUDENTSPROJECTS
 
J017547478
J017547478J017547478
J017547478
IOSR Journals
 
Enforcing multi user access policies in cloud computing
Enforcing multi user access policies in cloud computingEnforcing multi user access policies in cloud computing
Enforcing multi user access policies in cloud computingIAEME Publication
 
.Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com .Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com msudan92
 
IEEE 2014 JAVA DATA MINING PROJECTS Privacy preserving and content-protecting...
IEEE 2014 JAVA DATA MINING PROJECTS Privacy preserving and content-protecting...IEEE 2014 JAVA DATA MINING PROJECTS Privacy preserving and content-protecting...
IEEE 2014 JAVA DATA MINING PROJECTS Privacy preserving and content-protecting...
IEEEFINALYEARSTUDENTPROJECTS
 

Similar to Privacy preserving location sharing services for social networks (20)

Eplq efficient privacy preserving location-based query over outsourced encryp...
Eplq efficient privacy preserving location-based query over outsourced encryp...Eplq efficient privacy preserving location-based query over outsourced encryp...
Eplq efficient privacy preserving location-based query over outsourced encryp...
 
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
 
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
 
JPD1435 Preserving Location Privacy in Geosocial Applications
JPD1435   Preserving Location Privacy in Geosocial ApplicationsJPD1435   Preserving Location Privacy in Geosocial Applications
JPD1435 Preserving Location Privacy in Geosocial Applications
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
 
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
 
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
 
Location Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data SecurityLocation Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data Security
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
 
Stamp enabling privacy preserving location proofs for mobile users
Stamp enabling privacy preserving location proofs for mobile usersStamp enabling privacy preserving location proofs for mobile users
Stamp enabling privacy preserving location proofs for mobile users
 
An exploration of geographic authentication scheme
An exploration of geographic authentication schemeAn exploration of geographic authentication scheme
An exploration of geographic authentication scheme
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud assisted mobile-access of healt...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud assisted mobile-access of healt...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud assisted mobile-access of healt...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud assisted mobile-access of healt...
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT Cloud assisted mobile-access of health...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Cloud assisted mobile-access of health...2014 IEEE JAVA CLOUD COMPUTING PROJECT Cloud assisted mobile-access of health...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Cloud assisted mobile-access of health...
 
2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...
 
J017547478
J017547478J017547478
J017547478
 
Enforcing multi user access policies in cloud computing
Enforcing multi user access policies in cloud computingEnforcing multi user access policies in cloud computing
Enforcing multi user access policies in cloud computing
 
.Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com .Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com
 
50120130405028
5012013040502850120130405028
50120130405028
 
IEEE 2014 JAVA DATA MINING PROJECTS Privacy preserving and content-protecting...
IEEE 2014 JAVA DATA MINING PROJECTS Privacy preserving and content-protecting...IEEE 2014 JAVA DATA MINING PROJECTS Privacy preserving and content-protecting...
IEEE 2014 JAVA DATA MINING PROJECTS Privacy preserving and content-protecting...
 

More from LeMeniz Infotech

A fast acquisition all-digital delay-locked loop using a starting-bit predict...
A fast acquisition all-digital delay-locked loop using a starting-bit predict...A fast acquisition all-digital delay-locked loop using a starting-bit predict...
A fast acquisition all-digital delay-locked loop using a starting-bit predict...
LeMeniz Infotech
 
A dynamically reconfigurable multi asip architecture for multistandard and mu...
A dynamically reconfigurable multi asip architecture for multistandard and mu...A dynamically reconfigurable multi asip architecture for multistandard and mu...
A dynamically reconfigurable multi asip architecture for multistandard and mu...
LeMeniz Infotech
 
Interleaved digital power factor correction based on the sliding mode approach
Interleaved digital power factor correction based on the sliding mode approachInterleaved digital power factor correction based on the sliding mode approach
Interleaved digital power factor correction based on the sliding mode approach
LeMeniz Infotech
 
Bumpless control for reduced thd in power factor correction circuits
Bumpless control for reduced thd in power factor correction circuitsBumpless control for reduced thd in power factor correction circuits
Bumpless control for reduced thd in power factor correction circuits
LeMeniz Infotech
 
A bidirectional single stage three phase rectifier with high-frequency isolat...
A bidirectional single stage three phase rectifier with high-frequency isolat...A bidirectional single stage three phase rectifier with high-frequency isolat...
A bidirectional single stage three phase rectifier with high-frequency isolat...
LeMeniz Infotech
 
A bidirectional three level llc resonant converter with pwam control
A bidirectional three level llc resonant converter with pwam controlA bidirectional three level llc resonant converter with pwam control
A bidirectional three level llc resonant converter with pwam control
LeMeniz Infotech
 
Efficient single phase transformerless inverter for grid tied pvg system with...
Efficient single phase transformerless inverter for grid tied pvg system with...Efficient single phase transformerless inverter for grid tied pvg system with...
Efficient single phase transformerless inverter for grid tied pvg system with...
LeMeniz Infotech
 
Grid current-feedback active damping for lcl resonance in grid-connected volt...
Grid current-feedback active damping for lcl resonance in grid-connected volt...Grid current-feedback active damping for lcl resonance in grid-connected volt...
Grid current-feedback active damping for lcl resonance in grid-connected volt...
LeMeniz Infotech
 
Delay dependent stability of single-loop controlled grid-connected inverters ...
Delay dependent stability of single-loop controlled grid-connected inverters ...Delay dependent stability of single-loop controlled grid-connected inverters ...
Delay dependent stability of single-loop controlled grid-connected inverters ...
LeMeniz Infotech
 
Connection of converters to a low and medium power dc network using an induct...
Connection of converters to a low and medium power dc network using an induct...Connection of converters to a low and medium power dc network using an induct...
Connection of converters to a low and medium power dc network using an induct...
LeMeniz Infotech
 
Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesSbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphones
LeMeniz Infotech
 
Read2 me a cloud based reading aid for the visually impaired
Read2 me a cloud based reading aid for the visually impairedRead2 me a cloud based reading aid for the visually impaired
Read2 me a cloud based reading aid for the visually impaired
LeMeniz Infotech
 
Pass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwordsPass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwords
LeMeniz Infotech
 
Analyzing ad library updates in android apps
Analyzing ad library updates in android appsAnalyzing ad library updates in android apps
Analyzing ad library updates in android apps
LeMeniz Infotech
 
Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017
Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017
Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017
LeMeniz Infotech
 
Context based access control systems for mobile devices
Context based access control systems for mobile devicesContext based access control systems for mobile devices
Context based access control systems for mobile devices
LeMeniz Infotech
 
Android security a survey of issues, malware penetration, and defenses
Android security a survey of issues, malware penetration, and defensesAndroid security a survey of issues, malware penetration, and defenses
Android security a survey of issues, malware penetration, and defenses
LeMeniz Infotech
 
A location and diversity-aware news feed system for mobile users
A location  and diversity-aware news feed system for mobile usersA location  and diversity-aware news feed system for mobile users
A location and diversity-aware news feed system for mobile users
LeMeniz Infotech
 
User defined privacy grid system for continuous location-based services
User defined privacy grid system for continuous location-based servicesUser defined privacy grid system for continuous location-based services
User defined privacy grid system for continuous location-based services
LeMeniz Infotech
 
User privacy and data trustworthiness in mobile crowd sensing
User privacy and data trustworthiness in mobile crowd sensingUser privacy and data trustworthiness in mobile crowd sensing
User privacy and data trustworthiness in mobile crowd sensing
LeMeniz Infotech
 

More from LeMeniz Infotech (20)

A fast acquisition all-digital delay-locked loop using a starting-bit predict...
A fast acquisition all-digital delay-locked loop using a starting-bit predict...A fast acquisition all-digital delay-locked loop using a starting-bit predict...
A fast acquisition all-digital delay-locked loop using a starting-bit predict...
 
A dynamically reconfigurable multi asip architecture for multistandard and mu...
A dynamically reconfigurable multi asip architecture for multistandard and mu...A dynamically reconfigurable multi asip architecture for multistandard and mu...
A dynamically reconfigurable multi asip architecture for multistandard and mu...
 
Interleaved digital power factor correction based on the sliding mode approach
Interleaved digital power factor correction based on the sliding mode approachInterleaved digital power factor correction based on the sliding mode approach
Interleaved digital power factor correction based on the sliding mode approach
 
Bumpless control for reduced thd in power factor correction circuits
Bumpless control for reduced thd in power factor correction circuitsBumpless control for reduced thd in power factor correction circuits
Bumpless control for reduced thd in power factor correction circuits
 
A bidirectional single stage three phase rectifier with high-frequency isolat...
A bidirectional single stage three phase rectifier with high-frequency isolat...A bidirectional single stage three phase rectifier with high-frequency isolat...
A bidirectional single stage three phase rectifier with high-frequency isolat...
 
A bidirectional three level llc resonant converter with pwam control
A bidirectional three level llc resonant converter with pwam controlA bidirectional three level llc resonant converter with pwam control
A bidirectional three level llc resonant converter with pwam control
 
Efficient single phase transformerless inverter for grid tied pvg system with...
Efficient single phase transformerless inverter for grid tied pvg system with...Efficient single phase transformerless inverter for grid tied pvg system with...
Efficient single phase transformerless inverter for grid tied pvg system with...
 
Grid current-feedback active damping for lcl resonance in grid-connected volt...
Grid current-feedback active damping for lcl resonance in grid-connected volt...Grid current-feedback active damping for lcl resonance in grid-connected volt...
Grid current-feedback active damping for lcl resonance in grid-connected volt...
 
Delay dependent stability of single-loop controlled grid-connected inverters ...
Delay dependent stability of single-loop controlled grid-connected inverters ...Delay dependent stability of single-loop controlled grid-connected inverters ...
Delay dependent stability of single-loop controlled grid-connected inverters ...
 
Connection of converters to a low and medium power dc network using an induct...
Connection of converters to a low and medium power dc network using an induct...Connection of converters to a low and medium power dc network using an induct...
Connection of converters to a low and medium power dc network using an induct...
 
Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesSbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphones
 
Read2 me a cloud based reading aid for the visually impaired
Read2 me a cloud based reading aid for the visually impairedRead2 me a cloud based reading aid for the visually impaired
Read2 me a cloud based reading aid for the visually impaired
 
Pass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwordsPass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwords
 
Analyzing ad library updates in android apps
Analyzing ad library updates in android appsAnalyzing ad library updates in android apps
Analyzing ad library updates in android apps
 
Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017
Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017
Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017
 
Context based access control systems for mobile devices
Context based access control systems for mobile devicesContext based access control systems for mobile devices
Context based access control systems for mobile devices
 
Android security a survey of issues, malware penetration, and defenses
Android security a survey of issues, malware penetration, and defensesAndroid security a survey of issues, malware penetration, and defenses
Android security a survey of issues, malware penetration, and defenses
 
A location and diversity-aware news feed system for mobile users
A location  and diversity-aware news feed system for mobile usersA location  and diversity-aware news feed system for mobile users
A location and diversity-aware news feed system for mobile users
 
User defined privacy grid system for continuous location-based services
User defined privacy grid system for continuous location-based servicesUser defined privacy grid system for continuous location-based services
User defined privacy grid system for continuous location-based services
 
User privacy and data trustworthiness in mobile crowd sensing
User privacy and data trustworthiness in mobile crowd sensingUser privacy and data trustworthiness in mobile crowd sensing
User privacy and data trustworthiness in mobile crowd sensing
 

Recently uploaded

Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
GeoBlogs
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 

Recently uploaded (20)

Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 

Privacy preserving location sharing services for social networks

  • 1. The Master of IEEE Projects Copyright © 2015 LeMeniz Infotech. All rights reserved Page number 1 IEEE Master 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com Privacy-Preserving Location Sharing Services for Social Networks Abstract : A common functionality of many location-based social networking applications is a location sharing service that allows a group of friends to share their locations. With a potentially untrusted server, such a location sharing service may threaten the privacy of users. Existing solutions for Privacy-Preserving Location Sharing Services (PPLSS) require a trusted third party that has access to the exact location of all users in the system or rely on expensive algorithms or protocols in terms of computational or communication overhead. Other solutions can only provide approximate query answers. To overcome these limitations, we propose a new encryption notion, called Order-Retrievable Encryption (ORE), for PPLSS for social networking applications. The distinguishing characteristics of our PPLSS are that it (1) allows a group of friends to share their exact locations without the need of any third party or leaking any location information to any server or users outside the group, (2) achieves low computational and communication cost by allowing users to receive the exact location of their friends without requiring any direct communication between users or multiple rounds of communication between a user and a server, (3) provides efficient query processing by designing an index
  • 2. The Master of IEEE Projects Copyright © 2015 LeMeniz Infotech. All rights reserved Page number 2 IEEE Master 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com structure for our ORE scheme, (4) supports dynamic location updates, and (5) provides personalized privacy protection within a group of friends by specifying a maximum distance where a user is willing to be located by his/her friends. Experimental results show that the computational and communication cost of our PPLSS is much better than the state-of-the-art solution. Existing system: Existing location-based social networking systems with location sharing services rely on a central server which receives location information from all users in the system. The problem with this approach is that the central server can generate a detailed movement profile of each user (e.g., the location, time and frequency of each place which has been visited by each user) and that raises privacy concerns. Existing privacy-preserving location sharing schemes aim to protect the user location privacy against the central server, but they still allow the server to provide the user with the necessary services. However, in some existing schemes, the central server still knows the user’s approximate location Disadvantage :  Increasing the communication cost and making those schemes less practical  Only return approximate results less useful
  • 3. The Master of IEEE Projects Copyright © 2015 LeMeniz Infotech. All rights reserved Page number 3 IEEE Master 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com  Difficult to realize in mobile phone networks  Above Diagram represent System Model Proposed system: Proposed encryption notion ORE for geographical data. An ORE scheme is a symmetric key encryption scheme with two additional functions: one is for generating encrypted query locations and the other one is for the database server to determine which one between two encrypted user locations is closer to an encrypted query location. The scheme is called ORE because the order of the encrypted user locations in terms of their distances from any given encrypted query location can be retrieved. Note that the actual distance information is not retrievable. In the formal definition of ORE below, we assume that each distinct location in PPLSS can be represented uniquely using an element in a d-
  • 4. The Master of IEEE Projects Copyright © 2015 LeMeniz Infotech. All rights reserved Page number 4 IEEE Master 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com dimensional space and without loss of generality, suppose that R is the space of each dimension. One additional remark is that the ORE scheme defined below can be viewed as a collection of one-way functions and this one-way function has the order retrievability property. In other words, our PPLSS framework does NOT need the decryption algorithm of the ORE scheme. Advantages:  Secure location privacy  Achieves low communication and computational cost  Supports dynamic location updates. Conclusion : In this paper, we introduce an Order-Retrievable Encryption (ORE) scheme; a new encryption notion for Privacy-Preserving Location Sharing Services (PPLSS) in social networking applications. ORE is designed to answer location queries that allow a user to view the exact location of his/her friends within a user-specified distance without revealing any location information about the user and his/her friends to the database server and any other users in the system. The distinguishing characteristics of ORE compared to existing algorithms are that ORE provides secure location privacy, achieves low communication and computational cost, and supports dynamic location updates. To improve query processing
  • 5. The Master of IEEE Projects Copyright © 2015 LeMeniz Infotech. All rights reserved Page number 5 IEEE Master 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com efficiency, we propose a tree-like index structure for our ORE scheme (OREIndex) to facilitate range searches over the encrypted locations of a group of friends. In addition, a personalized privacy region scheme is proposed to further improve user privacy within a group of friends by enabling a user to specify a maximum distance up to which his/her friends are allowed to locate the user. We also perform experiments to evaluate ORE and ORE-Index and show that their performance is much better compared to the state-of-theart cryptography-based technique designed for spatial queries Hardware Specification :  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech  Ram : 512 Mb.  MOBILE : ANDROID
  • 6. The Master of IEEE Projects Copyright © 2015 LeMeniz Infotech. All rights reserved Page number 6 IEEE Master 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com Software Specification :  Operating system : Windows 7.  Coding Language : Java 1.7  Tool Kit : Android 2.3 ABOVE  IDE : Android Studio Reference : [1] Facebook Places, “http://www.facebook.com/places/.” [2] Foursquare, “http://www.foursquare.com.” [3] Google Plus, “https://plus.google.com.” [4] Loopt, “http://www.loopt.com.” [5] L. Barkhuus, B. Brown, M. Bell, S. Sherwood, M. Hall, and M. Chalmers, “From awareness to repartee: Sharing location within social groups,” in Proceedings of the ACM Conference on Human Factors in Computing Systems, 2008.