SlideShare a Scribd company logo
1 of 12
 Location-based services are quickly becoming immensely popular. In addition to services based on
users' current location, many potential services rely on users' location history, or their spatial-
temporal provenance. Malicious users may lie about their spatial-temporal provenance without a
carefully designed security system for users to prove their past locations
 STAMP is designed for ad - hoc mobile users generating location proofs for each other in a
distributed setting. However, it can easily accommodate trusted mobile users and wireless access
points.
 STAMP ensures the integrity and non-transferability of the location proofs and protects users'
privacy. Our prototype implementation on the android plat-form shows that STAMP is low-cost in
terms of computational and storage resources.
 Extensive simulation experiments show that our entropy-based trust model is able to achieve high
collusion detection accuracy.
 In the existing system there is a lot of volunteers are needed and also consuming lot
of time. Location privacy is an extremely important factor that needs to be taken
into consideration when designing any location based systems. Revealing both
identity and location information to an untreated party poses threats to a mobile
users. Today's location-based services solely rely on users' devices to determine
their location, e.g., using GPS.
 DISADVANTAGE:
 Mechanisms to preserve users' privacy and anonymity are not provided.
 Possibility of multiple parties to collude and create fake STP proofs.
 Revealing both identity and location information to an untreated party poses threats
to a mobile users.
 Lack of accuracy. It is very burden to Users.
 In this paper, we propose an STP proof scheme named Spatial-Temporal provenance
Assurance with Mutual Proofs (STAMP). STAMP aims at ensuring the integrity and non-
transferability of the STP proofs, with the capability of protecting users' privacy.
 Most of the existing STP proof schemes rely on wireless infrastructure to create proofs for
mobile users. However, it may not be feasible for all types of applications.
ADVANTAGE:
 A distributed STP proof generation (STAMP) is introduced to achieve integrity and non-
transferability of STP proofs.
 STAMP is designed to maximize users' anonymity and location privacy. Users are given the
control over the location granularity of their STP proofs.
 STAMP is collusion-resistant. The system is integrated into STAMP to prevent a user from
collecting proofs on behalf of another user. An entropy-based trust model is proposed to
detect users mutually generating fake proofs for each other.
 A security analysis is presented to prove STAMP achieves the security and privacy objectives.
MODULES:
 The location proof application consists of two modules .They are:
 Admin
 User
ADMIN:
 The admin module consists of three categories they are:
 User details
 Location details
 Sending SMS
User details:
 The admin can view the details of the registered user .From that he can access or perform
further processing that he wants to do.
Location details:
 The user share their location details to admin from there admin can view the location with the
time and date that the user has shared from there the admin will verify his distance
 By verifying the distance in the Google map the admin will come to the conclusion that
who are all eligible for the gift voucher and send message to the users.
USER:
 My location
 Finding route
 Sharing location
 Sharing password
My Location:
 In the My location the user will find his current location in the Google map on single
button click helps him to find his current location.
Finding Route:
 Finding route the user can find his route with distance to reach his destination along with
the time taken to reach the distance.
 Our proposed entropy-based trust model guards from P-W Collusion by giving
lower trust values to STP proofs generated by common or repeating witnesses.
 Then, it follows the standard zero-knowledge proof protocol. Note that in many
situations the AP is a part of the verifier, in which case the above message exchange
will be done locally at the verifier.







HARDWARE REQUIREMENTS:
 System : Pentium IV 2.4 GHz.
 Hard Disk : 40 GB.
 Floppy Drive : 1.44 Mb.
 Monitor : 14’ Colour Monitor.
 Mouse : Optical Mouse.
 Ram : 512 Mb.
 Operating system : Windows 7 Ultimate.
 Coding Languag : Java.
 Front-End : Eclipse.
 Data Base : SQLite Manger.
 STAMP ensures the integrity and non-transferability of the location proofs and protects users'
privacy. Most of the existing STP proof schemes rely on wireless infrastructure to create
proofs for mobile users. However, it may not be feasible for all types of applications.
 A security analysis is presented to prove STAMP achieves the security and privacy objectives
 A prototype application is implemented on the Android platform. Experiments show that
STAMP requires preferably low computational time and storage. Reduce time for searching
the route between the locations.
 Gives accurate details about the current location. User friendly. Reduces paper works.
 Easy communication between user and the admin. Thus STAMP called the location proof is
explained

More Related Content

Similar to Location proof

Location Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data SecurityLocation Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data Security
Editor IJCATR
 
Privacy preserving location sharing services for social networks(1)
Privacy preserving location sharing services for social networks(1)Privacy preserving location sharing services for social networks(1)
Privacy preserving location sharing services for social networks(1)
Kamal Spring
 
Iaetsd future polling system using cloud computing in support with smart clie...
Iaetsd future polling system using cloud computing in support with smart clie...Iaetsd future polling system using cloud computing in support with smart clie...
Iaetsd future polling system using cloud computing in support with smart clie...
Iaetsd Iaetsd
 

Similar to Location proof (20)

Location proof
Location proof Location proof
Location proof
 
JPD1435 Preserving Location Privacy in Geosocial Applications
JPD1435   Preserving Location Privacy in Geosocial ApplicationsJPD1435   Preserving Location Privacy in Geosocial Applications
JPD1435 Preserving Location Privacy in Geosocial Applications
 
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
 
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...
 
Location Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data SecurityLocation Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data Security
 
Privacy preserving location sharing services for social networks(1)
Privacy preserving location sharing services for social networks(1)Privacy preserving location sharing services for social networks(1)
Privacy preserving location sharing services for social networks(1)
 
Pppppppppttttttttttttttttttttt
PpppppppptttttttttttttttttttttPppppppppttttttttttttttttttttt
Pppppppppttttttttttttttttttttt
 
JPJ1429 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
JPJ1429 Efficient and Privacy-Aware Data Aggregation in Mobile SensingJPJ1429 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
JPJ1429 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
 
Stamp enabling privacy preserving location proofs for mobile users
Stamp enabling privacy preserving location proofs for mobile usersStamp enabling privacy preserving location proofs for mobile users
Stamp enabling privacy preserving location proofs for mobile users
 
preserving location privacy in geosocial applications
preserving location privacy in geosocial applicationspreserving location privacy in geosocial applications
preserving location privacy in geosocial applications
 
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin AlgorithmA Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
 
IEEE Projects 2012-2013 Network Security
IEEE Projects 2012-2013 Network SecurityIEEE Projects 2012-2013 Network Security
IEEE Projects 2012-2013 Network Security
 
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...
 
Location Provider with Privacy Using Localized Server and GPS
  Location Provider with Privacy Using Localized Server and GPS   Location Provider with Privacy Using Localized Server and GPS
Location Provider with Privacy Using Localized Server and GPS
 
Android titles adrit solutions
Android titles adrit solutionsAndroid titles adrit solutions
Android titles adrit solutions
 
Smartphone Remote Detection and Wipe System using SMS
Smartphone Remote Detection and Wipe System using SMSSmartphone Remote Detection and Wipe System using SMS
Smartphone Remote Detection and Wipe System using SMS
 
Iaetsd future polling system using cloud computing in support with smart clie...
Iaetsd future polling system using cloud computing in support with smart clie...Iaetsd future polling system using cloud computing in support with smart clie...
Iaetsd future polling system using cloud computing in support with smart clie...
 
Mobile Computing IEEE 2014 Projects
Mobile Computing IEEE 2014 ProjectsMobile Computing IEEE 2014 Projects
Mobile Computing IEEE 2014 Projects
 

Recently uploaded

FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 

Recently uploaded (20)

CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Intro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfIntro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdf
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 

Location proof

  • 1.
  • 2.  Location-based services are quickly becoming immensely popular. In addition to services based on users' current location, many potential services rely on users' location history, or their spatial- temporal provenance. Malicious users may lie about their spatial-temporal provenance without a carefully designed security system for users to prove their past locations  STAMP is designed for ad - hoc mobile users generating location proofs for each other in a distributed setting. However, it can easily accommodate trusted mobile users and wireless access points.  STAMP ensures the integrity and non-transferability of the location proofs and protects users' privacy. Our prototype implementation on the android plat-form shows that STAMP is low-cost in terms of computational and storage resources.  Extensive simulation experiments show that our entropy-based trust model is able to achieve high collusion detection accuracy.
  • 3.  In the existing system there is a lot of volunteers are needed and also consuming lot of time. Location privacy is an extremely important factor that needs to be taken into consideration when designing any location based systems. Revealing both identity and location information to an untreated party poses threats to a mobile users. Today's location-based services solely rely on users' devices to determine their location, e.g., using GPS.  DISADVANTAGE:  Mechanisms to preserve users' privacy and anonymity are not provided.  Possibility of multiple parties to collude and create fake STP proofs.  Revealing both identity and location information to an untreated party poses threats to a mobile users.  Lack of accuracy. It is very burden to Users.
  • 4.  In this paper, we propose an STP proof scheme named Spatial-Temporal provenance Assurance with Mutual Proofs (STAMP). STAMP aims at ensuring the integrity and non- transferability of the STP proofs, with the capability of protecting users' privacy.  Most of the existing STP proof schemes rely on wireless infrastructure to create proofs for mobile users. However, it may not be feasible for all types of applications. ADVANTAGE:  A distributed STP proof generation (STAMP) is introduced to achieve integrity and non- transferability of STP proofs.  STAMP is designed to maximize users' anonymity and location privacy. Users are given the control over the location granularity of their STP proofs.  STAMP is collusion-resistant. The system is integrated into STAMP to prevent a user from collecting proofs on behalf of another user. An entropy-based trust model is proposed to detect users mutually generating fake proofs for each other.  A security analysis is presented to prove STAMP achieves the security and privacy objectives.
  • 5.
  • 6.
  • 7. MODULES:  The location proof application consists of two modules .They are:  Admin  User ADMIN:  The admin module consists of three categories they are:  User details  Location details  Sending SMS User details:  The admin can view the details of the registered user .From that he can access or perform further processing that he wants to do. Location details:  The user share their location details to admin from there admin can view the location with the time and date that the user has shared from there the admin will verify his distance
  • 8.  By verifying the distance in the Google map the admin will come to the conclusion that who are all eligible for the gift voucher and send message to the users. USER:  My location  Finding route  Sharing location  Sharing password My Location:  In the My location the user will find his current location in the Google map on single button click helps him to find his current location. Finding Route:  Finding route the user can find his route with distance to reach his destination along with the time taken to reach the distance.
  • 9.  Our proposed entropy-based trust model guards from P-W Collusion by giving lower trust values to STP proofs generated by common or repeating witnesses.  Then, it follows the standard zero-knowledge proof protocol. Note that in many situations the AP is a part of the verifier, in which case the above message exchange will be done locally at the verifier.       
  • 10. HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 14’ Colour Monitor.  Mouse : Optical Mouse.  Ram : 512 Mb.
  • 11.  Operating system : Windows 7 Ultimate.  Coding Languag : Java.  Front-End : Eclipse.  Data Base : SQLite Manger.
  • 12.  STAMP ensures the integrity and non-transferability of the location proofs and protects users' privacy. Most of the existing STP proof schemes rely on wireless infrastructure to create proofs for mobile users. However, it may not be feasible for all types of applications.  A security analysis is presented to prove STAMP achieves the security and privacy objectives  A prototype application is implemented on the Android platform. Experiments show that STAMP requires preferably low computational time and storage. Reduce time for searching the route between the locations.  Gives accurate details about the current location. User friendly. Reduces paper works.  Easy communication between user and the admin. Thus STAMP called the location proof is explained