SlideShare a Scribd company logo
1 of 5
LocaWard A Security and Privacy Aware Location-Based Rewarding System 
Local Ward A Security and Privacy Aware Location-Based 
Rewarding System 
The proliferation of mobile devices has driven the mobile marketing to surge in the past few 
years. Emerging as a new type of mobile marketing, mobile location-based services (MLBSs) 
have attracted intense attention recently. Unfortunately, current MLBSs have a lot of limitations 
and raise many concerns, especially about system security and users’ privac y. In this paper, we 
propose a new location-based rewarding system, called LocaWard, where mobile users can 
collect location-based tokens from token distributors, and then redeem their gathered tokens at 
token collectors for beneficial rewards. Tokens act as virtual currency. The token distributors and 
collectors can be any commercial entities or merchants that wish to attract customers through 
such a promotion system, such as stores, restaurants, and car rental companies. We develop a 
security and privacy aware location-based rewarding protocol for the LocaWard system, and 
prove the completeness and soundness of the protocol. Moreover, we show that the system is 
resilient to various attacks and mobile users’ privacy can be well protected in the meantime. We 
finally implement the system and conduct extensive experiments to validate the system 
efficiency in terms of computation, communication, energy consumption, and storage costs. 
The location-based social networking is a type of MLBS, such as Facebook Places, where users 
share their locations with friends and find others who are nearby. Another type of MLBSs 
requires the users to provide current or historical location proof to full fill some purposes. Mobile 
commerce is another branch of MLBSs 
There is new type of MLBSs called location based check- in game, which is developed based on 
location based social networking, lets users earn beneficial rewards if they visit certain places. In 
particular, some applications, including Foursquare and Loopt Star , let users check in different 
locales (e.g., coffee shops, restaurants, shopping malls) to not only compete with friends in 
games, but also earn rewards, points, or discounts from retailers and organizations. The rewards 
Contact: 9703109334, 9533694296 
ABSTRACT: 
EXISTING SYSTEM: 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
LocaWard A Security and Privacy Aware Location-Based Rewarding System 
and reward amounts can be different depending on time of day, how frequently the person has 
checked it in the past, and so on. 
DISADVANTAGES OF EXISTING SYSTEM: 
 Customers can only receive and redeem rewards at the same brand stores or even 
the same store only. This greatly weakens the customers’ motivations for visiting 
the locales. 
 From a service provider’s perspective, security is not guaranteed in the existing 
systems. Since users can receive benefits for visiting some places, they have 
incentives to claim that they are at certain locations even though they are not. 
Most of those location-based check- in applications (e.g., Foursquare) use the GPS 
on a user’s mobile device to verify the location claimed by the user. However, 
users may cheat on their locations. 
 Third, from users’ perspective, users’ privacy including identity privacy and 
location privacy has been largely ignored in the current check- in systems. In 
particular, since the current systems use central servers to store all users’ records, 
they can easily know which users have ever been to which places at what times 
for what purposes. 
 The proposed system consists of a trusted third party (TTP), mobile users (MUs), token 
distributors (TDs), token collectors (TCs), and a central controller (CC). The TTP issues 
each MU with a real identity and a corresponding certificate. 
 A legal MU is able to obtain a location-based token when it visits a commercial entity 
that participates in the system, i.e., a TD. The issued tokens at various TDs have the same 
format but possibly different indicated values. With all the collected tokens, an MU can 
redeem them for beneficial rewards not only at the same store or brand stores, but also at 
any other retailers or commercial entities, i.e., TCs, that have joined the system. The 
Contact: 9703109334, 9533694296 
PROPOSED SYSTEM: 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
LocaWard A Security and Privacy Aware Location-Based Rewarding System 
amount of received rewards depends on the value represented by the collected tokens. 
Besides, the CC stores token audition information sent by TDs and provides it to TCs 
when required. 
 We design a security and privacy aware location based rewarding protocol for the 
proposed LocaWard system. The protocol is composed of three parts: identity initiation, 
token distribution, and token redemption. 
ADVANTAGES OF PROPOSED SYSTEM: 
 System security: Completeness and soundness. Completeness means that honest MUs can 
always successfully obtain tokens from TDs and redeem valid tokens at TCs. Soundness 
refers to that the probability that forged/tampered/stolen tokens can be redeemed is 
negligible. 
 Users’ privacy: Users’ private information includes: MUs’ personal information like real 
identities, token information including the value of a token, and location histories 
SYSTEM REQUIREMENTS: 
HARDWARE REQUIREMENTS: 
 System : Pentium IV 2.4 GHz. 
 Hard Disk : 40 GB. 
 Floppy Drive : 1.44 Mb. 
 Monitor : 15 VGA Colour. 
 Mouse : Logitech. 
 Ram : 512 Mb. 
SOFTWARE REQUIREMENTS: 
 Operating system : Windows XP/7. 
 Coding Language : JAVA/J2EE 
 IDE : Netbeans 7.4 
 Database : MYSQL 
Contact: 9703109334, 9533694296 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
LocaWard A Security and Privacy Aware Location-Based Rewarding System 
Contact: 9703109334, 9533694296 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
LocaWard A Security and Privacy Aware Location-Based Rewarding System 
Ming Li, Sergio Salinas, and Pan Li, “LocaWard: A Security and Privacy Aware Location-Based 
Rewarding System”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED 
SYSTEMS, VOL. 25, NO. 2, FEBRUARY 2014 
Contact: 9703109334, 9533694296 
REFERENCE: 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in

More Related Content

What's hot

Mobile Wallet security
Mobile Wallet securityMobile Wallet security
Mobile Wallet securitySuraj Pratap
 
From plastic to secured bits. A mobile wallet for virtual cards on the mobil...
From plastic to secured bits. A mobile wallet for virtual cards on the mobil...From plastic to secured bits. A mobile wallet for virtual cards on the mobil...
From plastic to secured bits. A mobile wallet for virtual cards on the mobil...Axel Nennker
 
160928-27_4th Annual Mobile Wallet Conference 2016_Mobile Wallet Trends
160928-27_4th Annual Mobile Wallet Conference 2016_Mobile Wallet Trends160928-27_4th Annual Mobile Wallet Conference 2016_Mobile Wallet Trends
160928-27_4th Annual Mobile Wallet Conference 2016_Mobile Wallet TrendsSpire Research and Consulting
 
How to use digital wallet effectively
How to use digital wallet effectivelyHow to use digital wallet effectively
How to use digital wallet effectively1payjsc
 
Dentsu Aegis Network’s Innovation Center of Excellence 2019 Blockchain Trend ...
Dentsu Aegis Network’s Innovation Center of Excellence 2019 Blockchain Trend ...Dentsu Aegis Network’s Innovation Center of Excellence 2019 Blockchain Trend ...
Dentsu Aegis Network’s Innovation Center of Excellence 2019 Blockchain Trend ...Dentsu Aegis Network
 
Making The Business Case for a Branded Mobile Payment App
Making The Business Case for a Branded Mobile Payment AppMaking The Business Case for a Branded Mobile Payment App
Making The Business Case for a Branded Mobile Payment AppClearbridge Mobile
 
Dissertation presentation on Digital Wallet
Dissertation presentation on Digital WalletDissertation presentation on Digital Wallet
Dissertation presentation on Digital WalletHardikBhandari7
 
What is all about Mobile Wallet?
What is all about Mobile Wallet?What is all about Mobile Wallet?
What is all about Mobile Wallet?Devashish Pradhan
 
Docu world cms cross media solution
Docu world cms cross media solutionDocu world cms cross media solution
Docu world cms cross media solutionsk-pakr
 
Secure QR code payment
Secure QR code paymentSecure QR code payment
Secure QR code paymentJames Wu
 
FinX Digital Wallet Platform
FinX Digital Wallet PlatformFinX Digital Wallet Platform
FinX Digital Wallet PlatformAnurag Rastogi
 

What's hot (20)

Mobile Wallet security
Mobile Wallet securityMobile Wallet security
Mobile Wallet security
 
Bank Mobile Wallet
Bank Mobile WalletBank Mobile Wallet
Bank Mobile Wallet
 
From plastic to secured bits. A mobile wallet for virtual cards on the mobil...
From plastic to secured bits. A mobile wallet for virtual cards on the mobil...From plastic to secured bits. A mobile wallet for virtual cards on the mobil...
From plastic to secured bits. A mobile wallet for virtual cards on the mobil...
 
160928-27_4th Annual Mobile Wallet Conference 2016_Mobile Wallet Trends
160928-27_4th Annual Mobile Wallet Conference 2016_Mobile Wallet Trends160928-27_4th Annual Mobile Wallet Conference 2016_Mobile Wallet Trends
160928-27_4th Annual Mobile Wallet Conference 2016_Mobile Wallet Trends
 
Mobile Wallet functions
Mobile Wallet functionsMobile Wallet functions
Mobile Wallet functions
 
Digital wallet
Digital walletDigital wallet
Digital wallet
 
How to use digital wallet effectively
How to use digital wallet effectivelyHow to use digital wallet effectively
How to use digital wallet effectively
 
Dentsu Aegis Network’s Innovation Center of Excellence 2019 Blockchain Trend ...
Dentsu Aegis Network’s Innovation Center of Excellence 2019 Blockchain Trend ...Dentsu Aegis Network’s Innovation Center of Excellence 2019 Blockchain Trend ...
Dentsu Aegis Network’s Innovation Center of Excellence 2019 Blockchain Trend ...
 
Digitalwallet or e-wallet
Digitalwallet or e-walletDigitalwallet or e-wallet
Digitalwallet or e-wallet
 
Gresham Publication
Gresham PublicationGresham Publication
Gresham Publication
 
Making The Business Case for a Branded Mobile Payment App
Making The Business Case for a Branded Mobile Payment AppMaking The Business Case for a Branded Mobile Payment App
Making The Business Case for a Branded Mobile Payment App
 
E wallet
E walletE wallet
E wallet
 
Mobile Wallet Features
Mobile Wallet FeaturesMobile Wallet Features
Mobile Wallet Features
 
Dissertation presentation on Digital Wallet
Dissertation presentation on Digital WalletDissertation presentation on Digital Wallet
Dissertation presentation on Digital Wallet
 
E-money Payment System
E-money Payment SystemE-money Payment System
E-money Payment System
 
What is all about Mobile Wallet?
What is all about Mobile Wallet?What is all about Mobile Wallet?
What is all about Mobile Wallet?
 
Docu world cms cross media solution
Docu world cms cross media solutionDocu world cms cross media solution
Docu world cms cross media solution
 
Digital wallet
Digital walletDigital wallet
Digital wallet
 
Secure QR code payment
Secure QR code paymentSecure QR code payment
Secure QR code payment
 
FinX Digital Wallet Platform
FinX Digital Wallet PlatformFinX Digital Wallet Platform
FinX Digital Wallet Platform
 

Viewers also liked

Using Learning Analytics to Understand Student Achievement
Using Learning Analytics to Understand Student AchievementUsing Learning Analytics to Understand Student Achievement
Using Learning Analytics to Understand Student AchievementJohn Whitmer, Ed.D.
 
Learning Analytics Oer
Learning Analytics OerLearning Analytics Oer
Learning Analytics OerBCcampus
 
Dreaming of Electric Sheep: CSU's vision for analytics-driven adaptive learni...
Dreaming of Electric Sheep: CSU's vision for analytics-driven adaptive learni...Dreaming of Electric Sheep: CSU's vision for analytics-driven adaptive learni...
Dreaming of Electric Sheep: CSU's vision for analytics-driven adaptive learni...siwelsh
 
Learning Analytics Medea Webinar, part 1
Learning Analytics Medea Webinar, part 1Learning Analytics Medea Webinar, part 1
Learning Analytics Medea Webinar, part 1erikwoning
 
CSU System-wide Learning Analytics Projects
CSU System-wide Learning Analytics ProjectsCSU System-wide Learning Analytics Projects
CSU System-wide Learning Analytics ProjectsJohn Whitmer, Ed.D.
 
Learning Analytics: Realizing the Big Data Promise in the CSU
Learning Analytics:  Realizing the Big Data Promise in the CSULearning Analytics:  Realizing the Big Data Promise in the CSU
Learning Analytics: Realizing the Big Data Promise in the CSUJohn Whitmer, Ed.D.
 

Viewers also liked (6)

Using Learning Analytics to Understand Student Achievement
Using Learning Analytics to Understand Student AchievementUsing Learning Analytics to Understand Student Achievement
Using Learning Analytics to Understand Student Achievement
 
Learning Analytics Oer
Learning Analytics OerLearning Analytics Oer
Learning Analytics Oer
 
Dreaming of Electric Sheep: CSU's vision for analytics-driven adaptive learni...
Dreaming of Electric Sheep: CSU's vision for analytics-driven adaptive learni...Dreaming of Electric Sheep: CSU's vision for analytics-driven adaptive learni...
Dreaming of Electric Sheep: CSU's vision for analytics-driven adaptive learni...
 
Learning Analytics Medea Webinar, part 1
Learning Analytics Medea Webinar, part 1Learning Analytics Medea Webinar, part 1
Learning Analytics Medea Webinar, part 1
 
CSU System-wide Learning Analytics Projects
CSU System-wide Learning Analytics ProjectsCSU System-wide Learning Analytics Projects
CSU System-wide Learning Analytics Projects
 
Learning Analytics: Realizing the Big Data Promise in the CSU
Learning Analytics:  Realizing the Big Data Promise in the CSULearning Analytics:  Realizing the Big Data Promise in the CSU
Learning Analytics: Realizing the Big Data Promise in the CSU
 

Similar to loca ward a security and privacy aware location-based rewarding system

IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS A security and privacy aware loc...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS A security and privacy aware loc...IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS A security and privacy aware loc...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS A security and privacy aware loc...IEEEGLOBALSOFTSTUDENTPROJECTS
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT A security and privacy aware loca...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT A security and privacy aware loca...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT A security and privacy aware loca...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT A security and privacy aware loca...IEEEGLOBALSOFTSTUDENTSPROJECTS
 
Broker Pattern Backbone of Distributed Processing
Broker Pattern Backbone of Distributed ProcessingBroker Pattern Backbone of Distributed Processing
Broker Pattern Backbone of Distributed ProcessingNilay Mishra
 
Two aspect authentication system using secure
Two aspect authentication system using secureTwo aspect authentication system using secure
Two aspect authentication system using secureUvaraj Shan
 
Two aspect authentication system using secure
Two aspect authentication system using secureTwo aspect authentication system using secure
Two aspect authentication system using secureUvaraj Shan
 
Connect DApp Whitepaper v 1.0
Connect DApp Whitepaper v 1.0Connect DApp Whitepaper v 1.0
Connect DApp Whitepaper v 1.0Ahmed Omar
 
Two Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordTwo Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordIOSR Journals
 
Blockchain Reputation Management
Blockchain Reputation ManagementBlockchain Reputation Management
Blockchain Reputation ManagementBitBayMarket
 
Two aspect authentication system using secure mobile
Two aspect authentication system using secure mobileTwo aspect authentication system using secure mobile
Two aspect authentication system using secure mobileUvaraj Shan
 
Two aspect authentication system using secure mobile devices
Two aspect authentication system using secure mobile devicesTwo aspect authentication system using secure mobile devices
Two aspect authentication system using secure mobile devicesUvaraj Shan
 
Location based authentication new words approch secuirity
Location based authentication new words approch secuirityLocation based authentication new words approch secuirity
Location based authentication new words approch secuiritySarath K
 
Protecting Your POS System from PoSeidon and Other Malware Attacks
Protecting Your POS System from PoSeidon and Other Malware AttacksProtecting Your POS System from PoSeidon and Other Malware Attacks
Protecting Your POS System from PoSeidon and Other Malware AttacksNetop
 
All You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptxAll You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptxITIO Innovex
 
E-commerce Security and Threats
E-commerce Security and ThreatsE-commerce Security and Threats
E-commerce Security and ThreatsBPalmer13
 
Mobile Convention Amsterdam - 22 May 2013
Mobile Convention Amsterdam - 22 May 2013Mobile Convention Amsterdam - 22 May 2013
Mobile Convention Amsterdam - 22 May 2013Dan Armstrong
 
Blockchain point of view for the telco, media and entertainment industry
Blockchain point of view for the telco, media and entertainment industryBlockchain point of view for the telco, media and entertainment industry
Blockchain point of view for the telco, media and entertainment industryIBM Blockchain
 

Similar to loca ward a security and privacy aware location-based rewarding system (20)

IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS A security and privacy aware loc...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS A security and privacy aware loc...IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS A security and privacy aware loc...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS A security and privacy aware loc...
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT A security and privacy aware loca...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT A security and privacy aware loca...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT A security and privacy aware loca...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT A security and privacy aware loca...
 
87559489 auth
87559489 auth87559489 auth
87559489 auth
 
Broker Pattern Backbone of Distributed Processing
Broker Pattern Backbone of Distributed ProcessingBroker Pattern Backbone of Distributed Processing
Broker Pattern Backbone of Distributed Processing
 
Two aspect authentication system using secure
Two aspect authentication system using secureTwo aspect authentication system using secure
Two aspect authentication system using secure
 
Two aspect authentication system using secure
Two aspect authentication system using secureTwo aspect authentication system using secure
Two aspect authentication system using secure
 
Connect DApp Whitepaper v 1.0
Connect DApp Whitepaper v 1.0Connect DApp Whitepaper v 1.0
Connect DApp Whitepaper v 1.0
 
Two Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordTwo Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time Password
 
test
testtest
test
 
Blockchain Reputation Management
Blockchain Reputation ManagementBlockchain Reputation Management
Blockchain Reputation Management
 
Two aspect authentication system using secure mobile
Two aspect authentication system using secure mobileTwo aspect authentication system using secure mobile
Two aspect authentication system using secure mobile
 
Two aspect authentication system using secure mobile devices
Two aspect authentication system using secure mobile devicesTwo aspect authentication system using secure mobile devices
Two aspect authentication system using secure mobile devices
 
Location based authentication new words approch secuirity
Location based authentication new words approch secuirityLocation based authentication new words approch secuirity
Location based authentication new words approch secuirity
 
120 i143
120 i143120 i143
120 i143
 
Protecting Your POS System from PoSeidon and Other Malware Attacks
Protecting Your POS System from PoSeidon and Other Malware AttacksProtecting Your POS System from PoSeidon and Other Malware Attacks
Protecting Your POS System from PoSeidon and Other Malware Attacks
 
Presentation
PresentationPresentation
Presentation
 
All You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptxAll You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptx
 
E-commerce Security and Threats
E-commerce Security and ThreatsE-commerce Security and Threats
E-commerce Security and Threats
 
Mobile Convention Amsterdam - 22 May 2013
Mobile Convention Amsterdam - 22 May 2013Mobile Convention Amsterdam - 22 May 2013
Mobile Convention Amsterdam - 22 May 2013
 
Blockchain point of view for the telco, media and entertainment industry
Blockchain point of view for the telco, media and entertainment industryBlockchain point of view for the telco, media and entertainment industry
Blockchain point of view for the telco, media and entertainment industry
 

More from swathi78

secure mining of association rules in horizontally distributed databases
secure mining of association rules in horizontally distributed databasessecure mining of association rules in horizontally distributed databases
secure mining of association rules in horizontally distributed databasesswathi78
 
a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...swathi78
 
web service recommendation via exploiting location and qo s information
web service recommendation via exploiting location and qo s informationweb service recommendation via exploiting location and qo s information
web service recommendation via exploiting location and qo s informationswathi78
 
privacy-enhanced web service composition
privacy-enhanced web service compositionprivacy-enhanced web service composition
privacy-enhanced web service compositionswathi78
 
optimal distributed malware defense in mobile networks with heterogeneous dev...
optimal distributed malware defense in mobile networks with heterogeneous dev...optimal distributed malware defense in mobile networks with heterogeneous dev...
optimal distributed malware defense in mobile networks with heterogeneous dev...swathi78
 
friend book a semantic-based friend recommendation system for social networks
friend book a semantic-based friend recommendation system for social networksfriend book a semantic-based friend recommendation system for social networks
friend book a semantic-based friend recommendation system for social networksswathi78
 
efficient authentication for mobile and pervasive computing
efficient authentication for mobile and pervasive computingefficient authentication for mobile and pervasive computing
efficient authentication for mobile and pervasive computingswathi78
 
cooperative caching for efficient data access in disruption tolerant networks
cooperative caching for efficient data access in disruption tolerant networkscooperative caching for efficient data access in disruption tolerant networks
cooperative caching for efficient data access in disruption tolerant networksswathi78
 
an incentive framework for cellular traffic offloading
an incentive framework for cellular traffic offloadingan incentive framework for cellular traffic offloading
an incentive framework for cellular traffic offloadingswathi78
 
secure outsourced attribute-based signatures
secure outsourced attribute-based signaturessecure outsourced attribute-based signatures
secure outsourced attribute-based signaturesswathi78
 
traffic pattern-based content leakage detection for trusted content delivery ...
traffic pattern-based content leakage detection for trusted content delivery ...traffic pattern-based content leakage detection for trusted content delivery ...
traffic pattern-based content leakage detection for trusted content delivery ...swathi78
 
the design and evaluation of an information sharing system for human networks
the design and evaluation of an information sharing system for human networksthe design and evaluation of an information sharing system for human networks
the design and evaluation of an information sharing system for human networksswathi78
 
the client assignment problem for continuous distributed interactive applicat...
the client assignment problem for continuous distributed interactive applicat...the client assignment problem for continuous distributed interactive applicat...
the client assignment problem for continuous distributed interactive applicat...swathi78
 
sos a distributed mobile q&a system based on social networks
sos a distributed mobile q&a system based on social networkssos a distributed mobile q&a system based on social networks
sos a distributed mobile q&a system based on social networksswathi78
 
securing broker-less publish subscribe systems using identity-based encryption
securing broker-less publish subscribe systems using identity-based encryptionsecuring broker-less publish subscribe systems using identity-based encryption
securing broker-less publish subscribe systems using identity-based encryptionswathi78
 
rre a game-theoretic intrusion response and recovery engine
rre a game-theoretic intrusion response and recovery enginerre a game-theoretic intrusion response and recovery engine
rre a game-theoretic intrusion response and recovery engineswathi78
 
on false data-injection attacks against power system state estimation modelin...
on false data-injection attacks against power system state estimation modelin...on false data-injection attacks against power system state estimation modelin...
on false data-injection attacks against power system state estimation modelin...swathi78
 
exploiting service similarity for privacy in location-based search queries
exploiting service similarity for privacy in location-based search queriesexploiting service similarity for privacy in location-based search queries
exploiting service similarity for privacy in location-based search queriesswathi78
 
enabling trustworthy service evaluation in service-oriented mobile social net...
enabling trustworthy service evaluation in service-oriented mobile social net...enabling trustworthy service evaluation in service-oriented mobile social net...
enabling trustworthy service evaluation in service-oriented mobile social net...swathi78
 
secure data retrieval for decentralized disruption-tolerant military networks
secure data retrieval for decentralized disruption-tolerant military networkssecure data retrieval for decentralized disruption-tolerant military networks
secure data retrieval for decentralized disruption-tolerant military networksswathi78
 

More from swathi78 (20)

secure mining of association rules in horizontally distributed databases
secure mining of association rules in horizontally distributed databasessecure mining of association rules in horizontally distributed databases
secure mining of association rules in horizontally distributed databases
 
a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...
 
web service recommendation via exploiting location and qo s information
web service recommendation via exploiting location and qo s informationweb service recommendation via exploiting location and qo s information
web service recommendation via exploiting location and qo s information
 
privacy-enhanced web service composition
privacy-enhanced web service compositionprivacy-enhanced web service composition
privacy-enhanced web service composition
 
optimal distributed malware defense in mobile networks with heterogeneous dev...
optimal distributed malware defense in mobile networks with heterogeneous dev...optimal distributed malware defense in mobile networks with heterogeneous dev...
optimal distributed malware defense in mobile networks with heterogeneous dev...
 
friend book a semantic-based friend recommendation system for social networks
friend book a semantic-based friend recommendation system for social networksfriend book a semantic-based friend recommendation system for social networks
friend book a semantic-based friend recommendation system for social networks
 
efficient authentication for mobile and pervasive computing
efficient authentication for mobile and pervasive computingefficient authentication for mobile and pervasive computing
efficient authentication for mobile and pervasive computing
 
cooperative caching for efficient data access in disruption tolerant networks
cooperative caching for efficient data access in disruption tolerant networkscooperative caching for efficient data access in disruption tolerant networks
cooperative caching for efficient data access in disruption tolerant networks
 
an incentive framework for cellular traffic offloading
an incentive framework for cellular traffic offloadingan incentive framework for cellular traffic offloading
an incentive framework for cellular traffic offloading
 
secure outsourced attribute-based signatures
secure outsourced attribute-based signaturessecure outsourced attribute-based signatures
secure outsourced attribute-based signatures
 
traffic pattern-based content leakage detection for trusted content delivery ...
traffic pattern-based content leakage detection for trusted content delivery ...traffic pattern-based content leakage detection for trusted content delivery ...
traffic pattern-based content leakage detection for trusted content delivery ...
 
the design and evaluation of an information sharing system for human networks
the design and evaluation of an information sharing system for human networksthe design and evaluation of an information sharing system for human networks
the design and evaluation of an information sharing system for human networks
 
the client assignment problem for continuous distributed interactive applicat...
the client assignment problem for continuous distributed interactive applicat...the client assignment problem for continuous distributed interactive applicat...
the client assignment problem for continuous distributed interactive applicat...
 
sos a distributed mobile q&a system based on social networks
sos a distributed mobile q&a system based on social networkssos a distributed mobile q&a system based on social networks
sos a distributed mobile q&a system based on social networks
 
securing broker-less publish subscribe systems using identity-based encryption
securing broker-less publish subscribe systems using identity-based encryptionsecuring broker-less publish subscribe systems using identity-based encryption
securing broker-less publish subscribe systems using identity-based encryption
 
rre a game-theoretic intrusion response and recovery engine
rre a game-theoretic intrusion response and recovery enginerre a game-theoretic intrusion response and recovery engine
rre a game-theoretic intrusion response and recovery engine
 
on false data-injection attacks against power system state estimation modelin...
on false data-injection attacks against power system state estimation modelin...on false data-injection attacks against power system state estimation modelin...
on false data-injection attacks against power system state estimation modelin...
 
exploiting service similarity for privacy in location-based search queries
exploiting service similarity for privacy in location-based search queriesexploiting service similarity for privacy in location-based search queries
exploiting service similarity for privacy in location-based search queries
 
enabling trustworthy service evaluation in service-oriented mobile social net...
enabling trustworthy service evaluation in service-oriented mobile social net...enabling trustworthy service evaluation in service-oriented mobile social net...
enabling trustworthy service evaluation in service-oriented mobile social net...
 
secure data retrieval for decentralized disruption-tolerant military networks
secure data retrieval for decentralized disruption-tolerant military networkssecure data retrieval for decentralized disruption-tolerant military networks
secure data retrieval for decentralized disruption-tolerant military networks
 

Recently uploaded

VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 

Recently uploaded (20)

VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 

loca ward a security and privacy aware location-based rewarding system

  • 1. LocaWard A Security and Privacy Aware Location-Based Rewarding System Local Ward A Security and Privacy Aware Location-Based Rewarding System The proliferation of mobile devices has driven the mobile marketing to surge in the past few years. Emerging as a new type of mobile marketing, mobile location-based services (MLBSs) have attracted intense attention recently. Unfortunately, current MLBSs have a lot of limitations and raise many concerns, especially about system security and users’ privac y. In this paper, we propose a new location-based rewarding system, called LocaWard, where mobile users can collect location-based tokens from token distributors, and then redeem their gathered tokens at token collectors for beneficial rewards. Tokens act as virtual currency. The token distributors and collectors can be any commercial entities or merchants that wish to attract customers through such a promotion system, such as stores, restaurants, and car rental companies. We develop a security and privacy aware location-based rewarding protocol for the LocaWard system, and prove the completeness and soundness of the protocol. Moreover, we show that the system is resilient to various attacks and mobile users’ privacy can be well protected in the meantime. We finally implement the system and conduct extensive experiments to validate the system efficiency in terms of computation, communication, energy consumption, and storage costs. The location-based social networking is a type of MLBS, such as Facebook Places, where users share their locations with friends and find others who are nearby. Another type of MLBSs requires the users to provide current or historical location proof to full fill some purposes. Mobile commerce is another branch of MLBSs There is new type of MLBSs called location based check- in game, which is developed based on location based social networking, lets users earn beneficial rewards if they visit certain places. In particular, some applications, including Foursquare and Loopt Star , let users check in different locales (e.g., coffee shops, restaurants, shopping malls) to not only compete with friends in games, but also earn rewards, points, or discounts from retailers and organizations. The rewards Contact: 9703109334, 9533694296 ABSTRACT: EXISTING SYSTEM: Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
  • 2. LocaWard A Security and Privacy Aware Location-Based Rewarding System and reward amounts can be different depending on time of day, how frequently the person has checked it in the past, and so on. DISADVANTAGES OF EXISTING SYSTEM:  Customers can only receive and redeem rewards at the same brand stores or even the same store only. This greatly weakens the customers’ motivations for visiting the locales.  From a service provider’s perspective, security is not guaranteed in the existing systems. Since users can receive benefits for visiting some places, they have incentives to claim that they are at certain locations even though they are not. Most of those location-based check- in applications (e.g., Foursquare) use the GPS on a user’s mobile device to verify the location claimed by the user. However, users may cheat on their locations.  Third, from users’ perspective, users’ privacy including identity privacy and location privacy has been largely ignored in the current check- in systems. In particular, since the current systems use central servers to store all users’ records, they can easily know which users have ever been to which places at what times for what purposes.  The proposed system consists of a trusted third party (TTP), mobile users (MUs), token distributors (TDs), token collectors (TCs), and a central controller (CC). The TTP issues each MU with a real identity and a corresponding certificate.  A legal MU is able to obtain a location-based token when it visits a commercial entity that participates in the system, i.e., a TD. The issued tokens at various TDs have the same format but possibly different indicated values. With all the collected tokens, an MU can redeem them for beneficial rewards not only at the same store or brand stores, but also at any other retailers or commercial entities, i.e., TCs, that have joined the system. The Contact: 9703109334, 9533694296 PROPOSED SYSTEM: Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
  • 3. LocaWard A Security and Privacy Aware Location-Based Rewarding System amount of received rewards depends on the value represented by the collected tokens. Besides, the CC stores token audition information sent by TDs and provides it to TCs when required.  We design a security and privacy aware location based rewarding protocol for the proposed LocaWard system. The protocol is composed of three parts: identity initiation, token distribution, and token redemption. ADVANTAGES OF PROPOSED SYSTEM:  System security: Completeness and soundness. Completeness means that honest MUs can always successfully obtain tokens from TDs and redeem valid tokens at TCs. Soundness refers to that the probability that forged/tampered/stolen tokens can be redeemed is negligible.  Users’ privacy: Users’ private information includes: MUs’ personal information like real identities, token information including the value of a token, and location histories SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7.  Coding Language : JAVA/J2EE  IDE : Netbeans 7.4  Database : MYSQL Contact: 9703109334, 9533694296 Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
  • 4. LocaWard A Security and Privacy Aware Location-Based Rewarding System Contact: 9703109334, 9533694296 Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
  • 5. LocaWard A Security and Privacy Aware Location-Based Rewarding System Ming Li, Sergio Salinas, and Pan Li, “LocaWard: A Security and Privacy Aware Location-Based Rewarding System”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 25, NO. 2, FEBRUARY 2014 Contact: 9703109334, 9533694296 REFERENCE: Email id: academicliveprojects@gmail.com, www.logicsystems.org.in