SlideShare a Scribd company logo
1 of 6
Privacy-Preserving Location Sharing Services
For Social Networks
ABSTRACT:
A common functionality of many location-based social networking
applications is a location sharing service that allows a group of friends to
share their locations. With a potentially un-trusted server, such a
location sharing service may threaten the privacy of users. Existing
solutions for Privacy-Preserving Location Sharing Services (PPLSS)
require a trusted third party that has access to the exact location of all
users in the system or rely on expensive algorithms or protocols in terms
of computational or communication overhead. Other solutions can only
provide approximate query answers. To overcome these limitations, we
propose a new encryption notion, called Order-Retrievable Encryption
(ORE), for PPLSS for social networking applications. The
distinguishing characteristics of our PPLSS are that it allows a group of
friends to share their exact locations without the need of any third party
or leaking any location information to any server or users outside the
group, achieves low computational and communication cost by
allowing users to receive the exact location of their friends without
requiring any direct communication between users or multiple rounds of
communication between a user and a server, provides efficient query
processing by designing an index structure for our ORE scheme,
supports dynamic location updates, and provides personalized privacy
protection within a group of friends by specifying a maximum distance
where a user is willing to be located by his/her friends. Experimental
results show that the computational and communication cost of our
PPLSS is much better than the state-of-the-art solution.
The privacy preserving location sharing services for social networks can
be demonstrated by our application called LSS.A user is having a group
of friends every friend is updating his location from which the user can
retrieve the location of the friend and send him message. But Sharing
must be private it should not known to the third party. So here the friend
is sharing the location encrypted. The encryption is carried on using a
password. Without the password the location cannot be decrypted. The
friend will share the password to the user through email. And the user
has to take the password from the mail to decrypt the location of his
friend and know the distance and route between him and his friend. Then
he can send message to the friend through two options they are through
face book or SMS. Thus the privacy preserving is shown in our project.
The project consists of three modules. They are:
 Sharing location.
 Sharing password
 Finding friends.
 Where I am?
The friends can update the location in the sharing location module to the
user and then have to share the password in the sharing password
module through the email service. The user can find the friends based on
the location. On choosing the location the group of friends in that
location will be displayed. By choosing the friend the friend details will
be displayed which will be in the form of encrypted type. The user has to
get the password from the email and has to decrypt the location. And by
giving the user location the route and the distance between the user and
his friend will be displayed .The user can send message to his friend
either with face book or through message.
EXISTING SYSTEM:
Existing location-based social networking systems with location sharing
services rely on a central server which receives location information
from all users in the system. The problem with this approach is that the
central server can generate a detailed movement profile of each user
(e.g., the location, time and frequency of each place which has been
visited by each user) and that raises privacy concerns. Existing privacy-
preserving location sharing schemes aim to protect the user location
privacy against the central server, but they still allow the server to
provide the user with the necessary services. However, in some existing
schemes, the central server still knows the user’s approximate location.
Other schemes require several messages to be exchanged not only
between the user and the central server but also directly between the user
and the user’s friends, increasing the communication cost and making
those schemes less practical. Other schemes only return approximate
results, making them less useful. Peer-to-peer (P2P) systems, where
users’ devices would directly communicate without an intermediate
server are inherently difficult to realize in mobile phone networks as
they typically make use of NAT (network address translation),
restricting direct communication between devices in the process.
DISADVANTAGE:
 A detailed movement profile of each user such as the location, time
and frequency of each user raises privacy concerns.
 Existing privacy-preserving location sharing schemes aim to
protect the user location privacy, but they still allow the server to
provide the user with the necessary services.
 Increases the communication cost and making those schemes less
practical.
 Only return approximate results, making them less useful.
 Revealing both identity and location information to an untreated
party poses threats to a mobile users.
 Lack of accuracy. It is very burden to Users.
 Lot of paper works.
PROPOSED SYSTEM:
Our Privacy-Preserving Location Sharing Services for social
networking systems. In particular, our scheme enables users to
browse their friends’ exact locations within a certain distance without
revealing any information about their locations to any other users or a
social networking service provider. The users send their location
information in encrypted form to the database server according to our
scheme. When a user wants to locate his/her friends in the vicinity,
the user logs onto the application and find the user encrypted location.
The user then recovers the actual location of his/her friend by
decrypting with the password.
ADVANTAGE:
 Secure location privacy.
 Low computational and communication cost.
 Efficient data updates.
 Personalized privacy within a group of friends.
MODULES:
The LSS application consists of four modules .They are:
 Sharing location.
 Sharing password
 Finding friends.
 Where I am?
SHARING LOCATION:
The friends will update their location to the friend in this module for
privacy preserving they will share the location with a password
encrypted. The friend will update his location, name, number and
address. On encryption the location of the user will be encrypted.
SHARING PASSWORD:
The password must be shared with the user then only he can know how
to decrypt the friend’s location. So the friend will send the password in a
message to the user through email. Thus the password will be shared
your friend.
FINDING FRIENDS:
In the finding friends module the user will find a list of places and on
choosing the place the list of friends in that location will be shown. And
on choosing the friend name the details of the friends will be displayed
with the encrypted location. To decrypt the location the user has to get
the password which is used by his friend to encrypt the location. The
password is sent to him through email service he has to retrieve the
password and has to use that to decrypt the location. On giving his
current location the distance between him and his friend location will be
displayed with the route and time taken to reach the place.
WHERE I AM?
In this module there are two categories they are my location and route.
In the my location category your current location will be displayed and
in the route the distance ,time and route between two places will be
displayed.
SYSTEM SPECIFICATION:
HARDWARE REQUIREMENTS:
 System : Pentium IV 2.4 GHz.
 Hard Disk : 40 GB.
 Floppy Drive : 1.44 Mb.
 Monitor : 14’ Colour Monitor.
 Mouse : Optical Mouse.
 Ram : 512 Mb.
SOFTWARE REQUIREMENTS:
 Operating system : Windows 7 Ultimate.
 Coding Language : Java.
 Front-End : Eclipse.
 Data Base : SQLite Manger.

More Related Content

Similar to Privacy preserving location sharing services for social networks(1)

Privacy preserving location sharing services for social networks
Privacy preserving location sharing services for social networksPrivacy preserving location sharing services for social networks
Privacy preserving location sharing services for social networksNexgen Technology
 
User-Defined Privacy Grid System for Continuous Location-Based Services
User-Defined Privacy Grid System for Continuous Location-Based ServicesUser-Defined Privacy Grid System for Continuous Location-Based Services
User-Defined Privacy Grid System for Continuous Location-Based Services1crore projects
 
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...Nexgen Technology
 
Secure-and-Distance-based-Online-Social-Network-OSN.doc
Secure-and-Distance-based-Online-Social-Network-OSN.docSecure-and-Distance-based-Online-Social-Network-OSN.doc
Secure-and-Distance-based-Online-Social-Network-OSN.docRanganathSri1
 
An exploration of geographic authentication schemes abstract
An exploration of geographic authentication schemes abstractAn exploration of geographic authentication schemes abstract
An exploration of geographic authentication schemes abstractKamal Spring
 
sos a distributed mobile q&a system based on social networks
sos a distributed mobile q&a system based on social networkssos a distributed mobile q&a system based on social networks
sos a distributed mobile q&a system based on social networksswathi78
 
Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...
Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...
Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...syeda yasmeen
 
Securing Location of User in Geo Social Networking
Securing Location of User in Geo Social NetworkingSecuring Location of User in Geo Social Networking
Securing Location of User in Geo Social NetworkingIRJET Journal
 
SOS: A DISTRIBUTED MOBILE Q&A SYSTEM BASED ON SOCIAL NETWORKS
SOS: A DISTRIBUTED MOBILE Q&A SYSTEM BASED ON SOCIAL NETWORKSSOS: A DISTRIBUTED MOBILE Q&A SYSTEM BASED ON SOCIAL NETWORKS
SOS: A DISTRIBUTED MOBILE Q&A SYSTEM BASED ON SOCIAL NETWORKSShakas Technologies
 
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...IEEEFINALYEARSTUDENTSPROJECTS
 
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...IEEEMEMTECHSTUDENTPROJECTS
 
Need a project proposal for my computer science 3 course. I dont eve.pdf
Need a project proposal for my computer science 3 course. I dont eve.pdfNeed a project proposal for my computer science 3 course. I dont eve.pdf
Need a project proposal for my computer science 3 course. I dont eve.pdfaristogifts99
 
Meet you – social networking on android
Meet you – social networking on androidMeet you – social networking on android
Meet you – social networking on androidJPINFOTECH JAYAPRAKASH
 
Hiding in the mobile crowd location privacy through collaboration
Hiding in the mobile crowd location privacy through collaborationHiding in the mobile crowd location privacy through collaboration
Hiding in the mobile crowd location privacy through collaborationJPINFOTECH JAYAPRAKASH
 
JPJ1442 SOS: A Distributed Mobile Q&A System Based on Social Networks
JPJ1442 SOS: A Distributed Mobile Q&A System Based on Social NetworksJPJ1442 SOS: A Distributed Mobile Q&A System Based on Social Networks
JPJ1442 SOS: A Distributed Mobile Q&A System Based on Social Networkschennaijp
 
Exploiting service similarity for privacy in location based search queries
Exploiting service similarity for privacy in location based search queriesExploiting service similarity for privacy in location based search queries
Exploiting service similarity for privacy in location based search queriesShakas Technologies
 
Privacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesPrivacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesIGEEKS TECHNOLOGIES
 
LPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBS
LPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBSLPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBS
LPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBSIJNSA Journal
 
Pppppppppttttttttttttttttttttt
PpppppppptttttttttttttttttttttPppppppppttttttttttttttttttttt
PpppppppptttttttttttttttttttttRahul kulshrestha
 

Similar to Privacy preserving location sharing services for social networks(1) (20)

Privacy preserving location sharing services for social networks
Privacy preserving location sharing services for social networksPrivacy preserving location sharing services for social networks
Privacy preserving location sharing services for social networks
 
User-Defined Privacy Grid System for Continuous Location-Based Services
User-Defined Privacy Grid System for Continuous Location-Based ServicesUser-Defined Privacy Grid System for Continuous Location-Based Services
User-Defined Privacy Grid System for Continuous Location-Based Services
 
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
 
Secure-and-Distance-based-Online-Social-Network-OSN.doc
Secure-and-Distance-based-Online-Social-Network-OSN.docSecure-and-Distance-based-Online-Social-Network-OSN.doc
Secure-and-Distance-based-Online-Social-Network-OSN.doc
 
An exploration of geographic authentication schemes abstract
An exploration of geographic authentication schemes abstractAn exploration of geographic authentication schemes abstract
An exploration of geographic authentication schemes abstract
 
sos a distributed mobile q&a system based on social networks
sos a distributed mobile q&a system based on social networkssos a distributed mobile q&a system based on social networks
sos a distributed mobile q&a system based on social networks
 
Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...
Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...
Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...
 
Securing Location of User in Geo Social Networking
Securing Location of User in Geo Social NetworkingSecuring Location of User in Geo Social Networking
Securing Location of User in Geo Social Networking
 
SOS: A DISTRIBUTED MOBILE Q&A SYSTEM BASED ON SOCIAL NETWORKS
SOS: A DISTRIBUTED MOBILE Q&A SYSTEM BASED ON SOCIAL NETWORKSSOS: A DISTRIBUTED MOBILE Q&A SYSTEM BASED ON SOCIAL NETWORKS
SOS: A DISTRIBUTED MOBILE Q&A SYSTEM BASED ON SOCIAL NETWORKS
 
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
 
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
 
Need a project proposal for my computer science 3 course. I dont eve.pdf
Need a project proposal for my computer science 3 course. I dont eve.pdfNeed a project proposal for my computer science 3 course. I dont eve.pdf
Need a project proposal for my computer science 3 course. I dont eve.pdf
 
Meet you – social networking on android
Meet you – social networking on androidMeet you – social networking on android
Meet you – social networking on android
 
Hiding in the mobile crowd location privacy through collaboration
Hiding in the mobile crowd location privacy through collaborationHiding in the mobile crowd location privacy through collaboration
Hiding in the mobile crowd location privacy through collaboration
 
JPJ1442 SOS: A Distributed Mobile Q&A System Based on Social Networks
JPJ1442 SOS: A Distributed Mobile Q&A System Based on Social NetworksJPJ1442 SOS: A Distributed Mobile Q&A System Based on Social Networks
JPJ1442 SOS: A Distributed Mobile Q&A System Based on Social Networks
 
Exploiting service similarity for privacy in location based search queries
Exploiting service similarity for privacy in location based search queriesExploiting service similarity for privacy in location based search queries
Exploiting service similarity for privacy in location based search queries
 
Privacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesPrivacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devices
 
LPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBS
LPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBSLPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBS
LPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBS
 
Pppppppppttttttttttttttttttttt
PpppppppptttttttttttttttttttttPppppppppttttttttttttttttttttt
Pppppppppttttttttttttttttttttt
 
azd document
azd documentazd document
azd document
 

Recently uploaded

Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 

Recently uploaded (20)

Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 

Privacy preserving location sharing services for social networks(1)

  • 1. Privacy-Preserving Location Sharing Services For Social Networks ABSTRACT: A common functionality of many location-based social networking applications is a location sharing service that allows a group of friends to share their locations. With a potentially un-trusted server, such a location sharing service may threaten the privacy of users. Existing solutions for Privacy-Preserving Location Sharing Services (PPLSS) require a trusted third party that has access to the exact location of all users in the system or rely on expensive algorithms or protocols in terms of computational or communication overhead. Other solutions can only provide approximate query answers. To overcome these limitations, we propose a new encryption notion, called Order-Retrievable Encryption (ORE), for PPLSS for social networking applications. The distinguishing characteristics of our PPLSS are that it allows a group of friends to share their exact locations without the need of any third party or leaking any location information to any server or users outside the group, achieves low computational and communication cost by allowing users to receive the exact location of their friends without requiring any direct communication between users or multiple rounds of communication between a user and a server, provides efficient query processing by designing an index structure for our ORE scheme, supports dynamic location updates, and provides personalized privacy protection within a group of friends by specifying a maximum distance where a user is willing to be located by his/her friends. Experimental results show that the computational and communication cost of our PPLSS is much better than the state-of-the-art solution.
  • 2. The privacy preserving location sharing services for social networks can be demonstrated by our application called LSS.A user is having a group of friends every friend is updating his location from which the user can retrieve the location of the friend and send him message. But Sharing must be private it should not known to the third party. So here the friend is sharing the location encrypted. The encryption is carried on using a password. Without the password the location cannot be decrypted. The friend will share the password to the user through email. And the user has to take the password from the mail to decrypt the location of his friend and know the distance and route between him and his friend. Then he can send message to the friend through two options they are through face book or SMS. Thus the privacy preserving is shown in our project. The project consists of three modules. They are:  Sharing location.  Sharing password  Finding friends.  Where I am? The friends can update the location in the sharing location module to the user and then have to share the password in the sharing password module through the email service. The user can find the friends based on the location. On choosing the location the group of friends in that location will be displayed. By choosing the friend the friend details will be displayed which will be in the form of encrypted type. The user has to get the password from the email and has to decrypt the location. And by giving the user location the route and the distance between the user and his friend will be displayed .The user can send message to his friend either with face book or through message.
  • 3. EXISTING SYSTEM: Existing location-based social networking systems with location sharing services rely on a central server which receives location information from all users in the system. The problem with this approach is that the central server can generate a detailed movement profile of each user (e.g., the location, time and frequency of each place which has been visited by each user) and that raises privacy concerns. Existing privacy- preserving location sharing schemes aim to protect the user location privacy against the central server, but they still allow the server to provide the user with the necessary services. However, in some existing schemes, the central server still knows the user’s approximate location. Other schemes require several messages to be exchanged not only between the user and the central server but also directly between the user and the user’s friends, increasing the communication cost and making those schemes less practical. Other schemes only return approximate results, making them less useful. Peer-to-peer (P2P) systems, where users’ devices would directly communicate without an intermediate server are inherently difficult to realize in mobile phone networks as they typically make use of NAT (network address translation), restricting direct communication between devices in the process. DISADVANTAGE:  A detailed movement profile of each user such as the location, time and frequency of each user raises privacy concerns.  Existing privacy-preserving location sharing schemes aim to protect the user location privacy, but they still allow the server to provide the user with the necessary services.  Increases the communication cost and making those schemes less practical.  Only return approximate results, making them less useful.
  • 4.  Revealing both identity and location information to an untreated party poses threats to a mobile users.  Lack of accuracy. It is very burden to Users.  Lot of paper works. PROPOSED SYSTEM: Our Privacy-Preserving Location Sharing Services for social networking systems. In particular, our scheme enables users to browse their friends’ exact locations within a certain distance without revealing any information about their locations to any other users or a social networking service provider. The users send their location information in encrypted form to the database server according to our scheme. When a user wants to locate his/her friends in the vicinity, the user logs onto the application and find the user encrypted location. The user then recovers the actual location of his/her friend by decrypting with the password. ADVANTAGE:  Secure location privacy.  Low computational and communication cost.  Efficient data updates.  Personalized privacy within a group of friends.
  • 5. MODULES: The LSS application consists of four modules .They are:  Sharing location.  Sharing password  Finding friends.  Where I am? SHARING LOCATION: The friends will update their location to the friend in this module for privacy preserving they will share the location with a password encrypted. The friend will update his location, name, number and address. On encryption the location of the user will be encrypted. SHARING PASSWORD: The password must be shared with the user then only he can know how to decrypt the friend’s location. So the friend will send the password in a message to the user through email. Thus the password will be shared your friend. FINDING FRIENDS: In the finding friends module the user will find a list of places and on choosing the place the list of friends in that location will be shown. And on choosing the friend name the details of the friends will be displayed with the encrypted location. To decrypt the location the user has to get the password which is used by his friend to encrypt the location. The password is sent to him through email service he has to retrieve the password and has to use that to decrypt the location. On giving his current location the distance between him and his friend location will be displayed with the route and time taken to reach the place.
  • 6. WHERE I AM? In this module there are two categories they are my location and route. In the my location category your current location will be displayed and in the route the distance ,time and route between two places will be displayed. SYSTEM SPECIFICATION: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 14’ Colour Monitor.  Mouse : Optical Mouse.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating system : Windows 7 Ultimate.  Coding Language : Java.  Front-End : Eclipse.  Data Base : SQLite Manger.