SlideShare a Scribd company logo
Toward Privacy Preserving and Collusion Resistance in a
Location Proof Updating System
ABSTRACT:
Today’s location-sensitive service relies on user’s mobile device to determine the
current location. This allows malicious users to access a restricted resource or
provide bogus alibis by cheating on their locations. To address this issue, we
propose A Privacy-Preserving Location proof Updating System (APPLAUS) in
which co-located Bluetooth enabled mobile devices mutually generate location
proofs and send updates to a location proof server. Periodically changed
pseudonyms are used by the mobile devices to protect source location privacy from
each other, and from the untrusted location proof server. We also develop user-
centric location privacy model in which individual users evaluate their location
privacy levels and decide whether and when to accept the location proof requests.
In order to defend against colluding attacks, we also present between’s ranking-
based and correlation clustering-based approaches for outlier detection. APPLAUS
can be implemented with existing network infrastructure, and can be easily
deployed in Bluetooth enabled mobile devices with little computation or power
cost. Extensive experimental results show that APPLAUS can effectively provide
location proofs, significantly preserve the source location privacy, and effectively
detect colluding attacks.
EXISTING SYSTEM:
There are many kinds of location-sensitive applications. One category is location-
based access control. For example, a hospital may allow patient information access
only when doctors or nurses can prove that they are in a particular room of the
hospital. Another class of location-sensitive applications requires users to provide
past location proofs such as auto insurance quote in which auto insurance
companies offer discounts to drivers who can prove that they take safe routes
during their daily commutes, police investigations in which detectives are
interested in finding out if a person was at a murder scene at some time, and
location-based social networking in which a user can ask for a location proof from
the service requester and accepts the request only if the sender is able to present a
valid location proof. The common theme across these location sensitive
applications is that they offer a reward or benefit to users located in a certain
geographical location at a certain time. Thus, users have the incentive to cheat on
their locations.
DISADVANTAGES OF EXISTING SYSTEM:
 In the location-sensitive applications there is a lack of secure mechanism to
provide their current or past locations to applications and services.
 Although cellular service providers have tracking services that can help verify
the locations of mobile users in real time, the accuracy is not good enough and
the location history cannot be verified.
PROPOSED SYSTEM:
In this paper, we propose A Privacy-Preserving Location proof Updating System
(APPLAUS), which does not rely on the wide deployment of network
infrastructure or the expensive trusted computing module. In APPLAUS, Bluetooth
enabled mobile devices in range mutually generate location proofs, which are
uploaded to an untrusted location proof server that can verify the trust level of each
location proof. An authorized verifier can query and retrieve location proofs from
the server. Moreover, our location proof system guarantees user location privacy
from every party. More specifically, we use statistically updated pseudonyms at
each mobile device to protect location privacy from each other, and from the
untrusted location proof server. We develop a user-centric location privacy model
in which individual users evaluate their location privacy levels in real time and
decide whether and when to accept a location proof request. In order to defend
against colluding attacks, we also present between’s ranking-based and correlation
clustering-based approaches for outlier detection.
ADVANTAGES OF PROPOSED SYSTEM:
APPLAUS can effectively provide location proofs, significantly preserve the
sourcelocation privacy, and effectively detect colluding attacks.
SYSTEM ARCHITECTURE:
SYSTEM PROTOCOL:
ALGORITHMS USED:
Algorithm 1. Location ProofUpdate Scheduling for the prover
SYSTEM CONFIGURATION:-
HARDWARE CONFIGURATION:-
 Processor - Pentium –IV
 Speed - 1.1 Ghz
 RAM - 256 MB(min)
 Hard Disk - 20 GB
 Key Board - Standard Windows Keyboard
 Mouse - Two or Three Button Mouse
 Monitor - SVGA
SOFTWARE CONFIGURATION:-
 Operating System : Windows XP
 Programming Language : JAVA/J2EE.
 Java Version : JDK 1.6 & above.
 Database : MYSQL
REFERENCE:
Zhichao Zhu, Student Member, IEEE, and Guohong Cao, Fellow, IEEE “Toward
Privacy Preserving and Collusion Resistance in a Location Proof Updating
System”- IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 12,
NO. 1, JANUARY 2013.

More Related Content

Viewers also liked

Pack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction systemPack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction system
JPINFOTECH JAYAPRAKASH
 
A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...
JPINFOTECH JAYAPRAKASH
 
Bulk ieee projects
Bulk ieee projectsBulk ieee projects
Bulk ieee projects
JPINFOTECH JAYAPRAKASH
 
Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...
JPINFOTECH JAYAPRAKASH
 
Hiding in the mobile crowd location privacy through collaboration
Hiding in the mobile crowd location privacy through collaborationHiding in the mobile crowd location privacy through collaboration
Hiding in the mobile crowd location privacy through collaboration
JPINFOTECH JAYAPRAKASH
 
Mobile relay configuration in data intensive wireless sensor networks
Mobile relay configuration in data intensive wireless sensor networksMobile relay configuration in data intensive wireless sensor networks
Mobile relay configuration in data intensive wireless sensor networks
JPINFOTECH JAYAPRAKASH
 
ieee projects for cse 2013
ieee projects for cse 2013ieee projects for cse 2013
ieee projects for cse 2013
JPINFOTECH JAYAPRAKASH
 
A new algorithm for inferring user search goals with feedback sessions
A new algorithm for inferring user search goals with feedback sessionsA new algorithm for inferring user search goals with feedback sessions
A new algorithm for inferring user search goals with feedback sessions
JPINFOTECH JAYAPRAKASH
 
Green droid automated diagnosis of energy inefficiency for smartphone applica...
Green droid automated diagnosis of energy inefficiency for smartphone applica...Green droid automated diagnosis of energy inefficiency for smartphone applica...
Green droid automated diagnosis of energy inefficiency for smartphone applica...
JPINFOTECH JAYAPRAKASH
 
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based EncryptionSecuring Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
JPINFOTECH JAYAPRAKASH
 
Collaborative policy administration
Collaborative policy administrationCollaborative policy administration
Collaborative policy administration
JPINFOTECH JAYAPRAKASH
 
Crowdsourcing predictors of behavioral outcomes
Crowdsourcing predictors of behavioral outcomesCrowdsourcing predictors of behavioral outcomes
Crowdsourcing predictors of behavioral outcomes
JPINFOTECH JAYAPRAKASH
 
A stochastic model to investigate data center performance and qo s in iaas cl...
A stochastic model to investigate data center performance and qo s in iaas cl...A stochastic model to investigate data center performance and qo s in iaas cl...
A stochastic model to investigate data center performance and qo s in iaas cl...
JPINFOTECH JAYAPRAKASH
 
Karamel's Pitch deck
Karamel's Pitch deckKaramel's Pitch deck
Karamel's Pitch deck
Aditya Putra
 
1 sistemas unidades
1 sistemas unidades1 sistemas unidades
1 sistemas unidades
Thiago Maldonado
 
EducaçãO Em Portugal
EducaçãO Em PortugalEducaçãO Em Portugal
EducaçãO Em Portugal
patiodostolos
 
Reunió KET PET 24 d'abril
Reunió KET PET 24 d'abrilReunió KET PET 24 d'abril
Reunió KET PET 24 d'abrilmediasinguerlin
 
Vivir con los ojos cerrados
Vivir con los ojos cerradosVivir con los ojos cerrados
Vivir con los ojos cerrados
enarosetti
 
Vocabulário da vida
Vocabulário da vidaVocabulário da vida
Vocabulário da vida
Luciana Vieira
 

Viewers also liked (20)

Pack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction systemPack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction system
 
A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...
 
Bulk ieee projects
Bulk ieee projectsBulk ieee projects
Bulk ieee projects
 
Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...
 
Hiding in the mobile crowd location privacy through collaboration
Hiding in the mobile crowd location privacy through collaborationHiding in the mobile crowd location privacy through collaboration
Hiding in the mobile crowd location privacy through collaboration
 
Mobile relay configuration in data intensive wireless sensor networks
Mobile relay configuration in data intensive wireless sensor networksMobile relay configuration in data intensive wireless sensor networks
Mobile relay configuration in data intensive wireless sensor networks
 
ieee projects for cse 2013
ieee projects for cse 2013ieee projects for cse 2013
ieee projects for cse 2013
 
A new algorithm for inferring user search goals with feedback sessions
A new algorithm for inferring user search goals with feedback sessionsA new algorithm for inferring user search goals with feedback sessions
A new algorithm for inferring user search goals with feedback sessions
 
Green droid automated diagnosis of energy inefficiency for smartphone applica...
Green droid automated diagnosis of energy inefficiency for smartphone applica...Green droid automated diagnosis of energy inefficiency for smartphone applica...
Green droid automated diagnosis of energy inefficiency for smartphone applica...
 
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based EncryptionSecuring Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
 
Collaborative policy administration
Collaborative policy administrationCollaborative policy administration
Collaborative policy administration
 
Crowdsourcing predictors of behavioral outcomes
Crowdsourcing predictors of behavioral outcomesCrowdsourcing predictors of behavioral outcomes
Crowdsourcing predictors of behavioral outcomes
 
A stochastic model to investigate data center performance and qo s in iaas cl...
A stochastic model to investigate data center performance and qo s in iaas cl...A stochastic model to investigate data center performance and qo s in iaas cl...
A stochastic model to investigate data center performance and qo s in iaas cl...
 
Karamel's Pitch deck
Karamel's Pitch deckKaramel's Pitch deck
Karamel's Pitch deck
 
Slide antoine guillaume
Slide antoine guillaumeSlide antoine guillaume
Slide antoine guillaume
 
1 sistemas unidades
1 sistemas unidades1 sistemas unidades
1 sistemas unidades
 
EducaçãO Em Portugal
EducaçãO Em PortugalEducaçãO Em Portugal
EducaçãO Em Portugal
 
Reunió KET PET 24 d'abril
Reunió KET PET 24 d'abrilReunió KET PET 24 d'abril
Reunió KET PET 24 d'abril
 
Vivir con los ojos cerrados
Vivir con los ojos cerradosVivir con los ojos cerrados
Vivir con los ojos cerrados
 
Vocabulário da vida
Vocabulário da vidaVocabulário da vida
Vocabulário da vida
 

Similar to Toward privacy preserving and collusion resistance in a location proof updating system

Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...
Ecway Technologies
 
Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...
Ecway Technologies
 
Android toward privacy preserving and collusion resistance in a location pro...
Android  toward privacy preserving and collusion resistance in a location pro...Android  toward privacy preserving and collusion resistance in a location pro...
Android toward privacy preserving and collusion resistance in a location pro...
ecway
 
Android toward privacy preserving and collusion resistance in a location pro...
Android  toward privacy preserving and collusion resistance in a location pro...Android  toward privacy preserving and collusion resistance in a location pro...
Android toward privacy preserving and collusion resistance in a location pro...
ecway
 
Java toward privacy preserving and collusion resistance in a location proof ...
Java  toward privacy preserving and collusion resistance in a location proof ...Java  toward privacy preserving and collusion resistance in a location proof ...
Java toward privacy preserving and collusion resistance in a location proof ...
ecwayerode
 
Location proof
Location proofLocation proof
Location proof
Kamal Spring
 
Location proof
Location proof Location proof
Location proof
Kamal Spring
 
azd document
azd documentazd document
azd document
azeed shaik
 
Exploiting service similarity for privacy in location based search queries
Exploiting service similarity for privacy in location based search queriesExploiting service similarity for privacy in location based search queries
Exploiting service similarity for privacy in location based search queries
Shakas Technologies
 
Location Provider with Privacy Using Localized Server and GPS
  Location Provider with Privacy Using Localized Server and GPS   Location Provider with Privacy Using Localized Server and GPS
Location Provider with Privacy Using Localized Server and GPS
Editor IJCATR
 
Context based access control systems for mobile devices
Context based access control systems for mobile devicesContext based access control systems for mobile devices
Context based access control systems for mobile devices
shanofa sanu
 
Middleware.pptx
Middleware.pptxMiddleware.pptx
Middleware.pptx
yudragispi
 
Android toward privacy preserving and collusion resistance in a location pro...
Android  toward privacy preserving and collusion resistance in a location pro...Android  toward privacy preserving and collusion resistance in a location pro...
Android toward privacy preserving and collusion resistance in a location pro...
Ecwayt
 
Android toward privacy preserving and collusion resistance in a location pro...
Android  toward privacy preserving and collusion resistance in a location pro...Android  toward privacy preserving and collusion resistance in a location pro...
Android toward privacy preserving and collusion resistance in a location pro...
Ecwaytechnoz
 
Dotnet toward privacy preserving and collusion resistance in a location proo...
Dotnet  toward privacy preserving and collusion resistance in a location proo...Dotnet  toward privacy preserving and collusion resistance in a location proo...
Dotnet toward privacy preserving and collusion resistance in a location proo...
Ecwaytech
 
Android toward privacy preserving and collusion resistance in a location pro...
Android  toward privacy preserving and collusion resistance in a location pro...Android  toward privacy preserving and collusion resistance in a location pro...
Android toward privacy preserving and collusion resistance in a location pro...
Ecwayt
 
Android toward privacy preserving and collusion resistance in a location pro...
Android  toward privacy preserving and collusion resistance in a location pro...Android  toward privacy preserving and collusion resistance in a location pro...
Android toward privacy preserving and collusion resistance in a location pro...
Ecway2004
 
Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...
Ecwaytech
 
Android toward privacy preserving and collusion resistance in a location pro...
Android  toward privacy preserving and collusion resistance in a location pro...Android  toward privacy preserving and collusion resistance in a location pro...
Android toward privacy preserving and collusion resistance in a location pro...
Ecwaytechnoz
 
Android toward privacy preserving and collusion resistance in a location pro...
Android  toward privacy preserving and collusion resistance in a location pro...Android  toward privacy preserving and collusion resistance in a location pro...
Android toward privacy preserving and collusion resistance in a location pro...
Ecway2004
 

Similar to Toward privacy preserving and collusion resistance in a location proof updating system (20)

Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...
 
Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...
 
Android toward privacy preserving and collusion resistance in a location pro...
Android  toward privacy preserving and collusion resistance in a location pro...Android  toward privacy preserving and collusion resistance in a location pro...
Android toward privacy preserving and collusion resistance in a location pro...
 
Android toward privacy preserving and collusion resistance in a location pro...
Android  toward privacy preserving and collusion resistance in a location pro...Android  toward privacy preserving and collusion resistance in a location pro...
Android toward privacy preserving and collusion resistance in a location pro...
 
Java toward privacy preserving and collusion resistance in a location proof ...
Java  toward privacy preserving and collusion resistance in a location proof ...Java  toward privacy preserving and collusion resistance in a location proof ...
Java toward privacy preserving and collusion resistance in a location proof ...
 
Location proof
Location proofLocation proof
Location proof
 
Location proof
Location proof Location proof
Location proof
 
azd document
azd documentazd document
azd document
 
Exploiting service similarity for privacy in location based search queries
Exploiting service similarity for privacy in location based search queriesExploiting service similarity for privacy in location based search queries
Exploiting service similarity for privacy in location based search queries
 
Location Provider with Privacy Using Localized Server and GPS
  Location Provider with Privacy Using Localized Server and GPS   Location Provider with Privacy Using Localized Server and GPS
Location Provider with Privacy Using Localized Server and GPS
 
Context based access control systems for mobile devices
Context based access control systems for mobile devicesContext based access control systems for mobile devices
Context based access control systems for mobile devices
 
Middleware.pptx
Middleware.pptxMiddleware.pptx
Middleware.pptx
 
Android toward privacy preserving and collusion resistance in a location pro...
Android  toward privacy preserving and collusion resistance in a location pro...Android  toward privacy preserving and collusion resistance in a location pro...
Android toward privacy preserving and collusion resistance in a location pro...
 
Android toward privacy preserving and collusion resistance in a location pro...
Android  toward privacy preserving and collusion resistance in a location pro...Android  toward privacy preserving and collusion resistance in a location pro...
Android toward privacy preserving and collusion resistance in a location pro...
 
Dotnet toward privacy preserving and collusion resistance in a location proo...
Dotnet  toward privacy preserving and collusion resistance in a location proo...Dotnet  toward privacy preserving and collusion resistance in a location proo...
Dotnet toward privacy preserving and collusion resistance in a location proo...
 
Android toward privacy preserving and collusion resistance in a location pro...
Android  toward privacy preserving and collusion resistance in a location pro...Android  toward privacy preserving and collusion resistance in a location pro...
Android toward privacy preserving and collusion resistance in a location pro...
 
Android toward privacy preserving and collusion resistance in a location pro...
Android  toward privacy preserving and collusion resistance in a location pro...Android  toward privacy preserving and collusion resistance in a location pro...
Android toward privacy preserving and collusion resistance in a location pro...
 
Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...
 
Android toward privacy preserving and collusion resistance in a location pro...
Android  toward privacy preserving and collusion resistance in a location pro...Android  toward privacy preserving and collusion resistance in a location pro...
Android toward privacy preserving and collusion resistance in a location pro...
 
Android toward privacy preserving and collusion resistance in a location pro...
Android  toward privacy preserving and collusion resistance in a location pro...Android  toward privacy preserving and collusion resistance in a location pro...
Android toward privacy preserving and collusion resistance in a location pro...
 

Recently uploaded

Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 

Recently uploaded (20)

Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 

Toward privacy preserving and collusion resistance in a location proof updating system

  • 1. Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System ABSTRACT: Today’s location-sensitive service relies on user’s mobile device to determine the current location. This allows malicious users to access a restricted resource or provide bogus alibis by cheating on their locations. To address this issue, we propose A Privacy-Preserving Location proof Updating System (APPLAUS) in which co-located Bluetooth enabled mobile devices mutually generate location proofs and send updates to a location proof server. Periodically changed pseudonyms are used by the mobile devices to protect source location privacy from each other, and from the untrusted location proof server. We also develop user- centric location privacy model in which individual users evaluate their location privacy levels and decide whether and when to accept the location proof requests. In order to defend against colluding attacks, we also present between’s ranking- based and correlation clustering-based approaches for outlier detection. APPLAUS can be implemented with existing network infrastructure, and can be easily deployed in Bluetooth enabled mobile devices with little computation or power cost. Extensive experimental results show that APPLAUS can effectively provide
  • 2. location proofs, significantly preserve the source location privacy, and effectively detect colluding attacks. EXISTING SYSTEM: There are many kinds of location-sensitive applications. One category is location- based access control. For example, a hospital may allow patient information access only when doctors or nurses can prove that they are in a particular room of the hospital. Another class of location-sensitive applications requires users to provide past location proofs such as auto insurance quote in which auto insurance companies offer discounts to drivers who can prove that they take safe routes during their daily commutes, police investigations in which detectives are interested in finding out if a person was at a murder scene at some time, and location-based social networking in which a user can ask for a location proof from the service requester and accepts the request only if the sender is able to present a valid location proof. The common theme across these location sensitive applications is that they offer a reward or benefit to users located in a certain geographical location at a certain time. Thus, users have the incentive to cheat on their locations.
  • 3. DISADVANTAGES OF EXISTING SYSTEM:  In the location-sensitive applications there is a lack of secure mechanism to provide their current or past locations to applications and services.  Although cellular service providers have tracking services that can help verify the locations of mobile users in real time, the accuracy is not good enough and the location history cannot be verified. PROPOSED SYSTEM: In this paper, we propose A Privacy-Preserving Location proof Updating System (APPLAUS), which does not rely on the wide deployment of network infrastructure or the expensive trusted computing module. In APPLAUS, Bluetooth enabled mobile devices in range mutually generate location proofs, which are uploaded to an untrusted location proof server that can verify the trust level of each location proof. An authorized verifier can query and retrieve location proofs from the server. Moreover, our location proof system guarantees user location privacy from every party. More specifically, we use statistically updated pseudonyms at each mobile device to protect location privacy from each other, and from the untrusted location proof server. We develop a user-centric location privacy model in which individual users evaluate their location privacy levels in real time and
  • 4. decide whether and when to accept a location proof request. In order to defend against colluding attacks, we also present between’s ranking-based and correlation clustering-based approaches for outlier detection. ADVANTAGES OF PROPOSED SYSTEM: APPLAUS can effectively provide location proofs, significantly preserve the sourcelocation privacy, and effectively detect colluding attacks. SYSTEM ARCHITECTURE:
  • 5. SYSTEM PROTOCOL: ALGORITHMS USED: Algorithm 1. Location ProofUpdate Scheduling for the prover SYSTEM CONFIGURATION:- HARDWARE CONFIGURATION:-  Processor - Pentium –IV  Speed - 1.1 Ghz  RAM - 256 MB(min)  Hard Disk - 20 GB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - SVGA
  • 6. SOFTWARE CONFIGURATION:-  Operating System : Windows XP  Programming Language : JAVA/J2EE.  Java Version : JDK 1.6 & above.  Database : MYSQL REFERENCE: Zhichao Zhu, Student Member, IEEE, and Guohong Cao, Fellow, IEEE “Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System”- IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 12, NO. 1, JANUARY 2013.