Location Privacy Protection Mechanisms Using Order-Retrievable Encryption For Social Network
Location Privacy Protection Mechanisms Using Order-Retrievable Encryption For Social Network
*1M.Phil Research Scholar, PG & Research Department of Computer Science & Information Technology, Arcot Sri
Mahalakshmi Womens College, Villapakkam, Tamil Nadu, India.
*2.Assistant Professor, PG & Research Department of Computer Science & Information Technology, Arcot Sri
I. INTRODUCTION
Recently people have been receiving more and
more digitized information from Internet, and the volume
of information is larger than any other point in time,
reaching a point of information overload. To solve this
problem, the recommender system has been created in Fig : Location based Services
response to the need to disseminate so much information.
2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 175
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072
For the scope of this thesis we focus on Location- It apply the CI heuristic in a novel way. Typically,
Based Service (LBS). In these services the user's location is the CI heuristic is used to analyze how a new socio-
processed in order to deliver a service, such as finding a technical practice impacts the CI in very specific situations.
nearby Point-of-Interest (POI) or getting directions. Due to For example, consider a library that provides a paper-
their usefulness, LBS are being used by most mobile device based repository of all available books that can be used by
users. Some services require the users to reveal their visitors to locate the books in which they are interested. If
location either sporadically or continuously. The the library would replace this paper-based system by a
difference between the two is that in the sporadic case two computer-based search system, then the situation for the
consecutive queries to the LBS of the same user happen visitors would fundamentally change. While consulting the
with sufficient time in between so that they do not paper-based repository leaves no digital trace, any action
correlate. We shall understand LBSs from a broader on the computer-based system can be recorded. Finding
prospect than only from a technology perspective. Instead, the prevailing context of the CI heuristic is in this scenario
we consider processing location data as a new socio- relatively straight forward, because visitors use the
technical practice, having impact on technology, society system only in the library. This is different with LBSs as
and legislation. We adopt an interdisciplinary approach in they are employed in numerous situations and contexts. In
order to understand the threats on privacy from our work we analyze the impact of the new socio-technical
engineering, ethical and legal perspectives. practice on CI independent of a particular scenario.
Instead, we employ the context of travelling for our
For the domain of obfuscation-based location privacy analysis.
protection we first propose a framework that allows the
computation of optimal LPPMs for users who sporadically Location Data
engage in LBSs. Our framework accounts for resource
constraints of mobile devices with which LBSs are It presents the necessary background on location
typically being accessed. This makes our framework data. We provide a detailed explanation on apps that are
suitable to compute optimal dummy and precision-based the most important tools for people to utilize the
obfuscation strategies. An analysis of several optimal capabilities of their mobile devices, such as their location
obfuscation strategies further shows the trilateral trade- data. This also includes a description of the prevailing
off of privacy, Quality Loss (QL) and bandwidth overhead business model of the app-eco system and its privacy
issues, as well as the users' attitude towards this business
A concept of the rating schedule to represent user model. We continue with the explanation of the legal
daily rating behavior. protection of location data and outline users' attitude
The factor of interpersonal rating behavior towards LBSs. Finally, we provide a summary of the
diffusion to deep understand users rating threats to user privacy when location data is misused.
behaviors.
The main factors are, personal interest, Mobile Device Eco-System
interpersonal interest similarity, interpersonal
rating behavior similarity, and interpersonal Mobile devices are nowadays ubiquitous
rating behavior diffusion, into matrix factorization companions. More than two billion people worldwide are
with fully exploring user rating behaviors to using smartphones and more than 1.2 billion people are
predict user-service ratings. using tablet computers. Smartphones are intuitive to use
and they are equipped with a wide variety of
II. BACK GROUND communication modules, such as WiFi, Bluetooth and
4G/LTE, allowing their users to be connected in ways
never possible before. Another reason for the success of
Privacy assessment of LBSs from engineering, an
smartphones is their platform, i.e. the Mobile Operating
ethical and a legal perspective. Scholars from every of the
System (MOS) and the app-store that are maintained by
involved disciplines obtain an added value for their own
the Platform Operator (PO). More traditional mobile
field and additionally obtain an insight in how the topic is
phones usually run a MOS developed by the phone
addressed in other disciplines. For example, the detail
manufacturer and offered only a very limited number of
provided by the legal perspective serves as a valuable
additional applications, which typically have also been
reference for legal scholars. However, scholars from other
implemented by the phone manufacturer. The software of
disciplines may find the provided information especially
modern mobile devices, however, is much more
valuable, because works in their discipline typically lack
sophisticated.
this kind of legal detail. Also, the combination of the
engineering, ethical and legal discipline to assess privacy
implications in LBS contributes towards a better
understanding of privacy issues from a broader
perspective.
2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 176
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072
Legal Protection of Location Data chooses a secret key, encrypts her location with the secret
key, encrypts the secret key with the public key of Bob and
There are several directives in place for the sends both to Bob. The receiver Bob uses his private key to
protection of location data of which we discuss in detail decrypt the symmetric key, enabling him to decrypt Alice's
the DPD, the ePrivacy Directive (2002/58/EC, as amended location. The data being sent between Alice and Bob could
by 2009/136/EC) (ePrivacy Directive) directive and the be transferred with the help of a central service provider,
recently published GDPR. The Data Protection Directive but if the service provider is reluctant to store and
(95/46/EC) (DPD) [190] defines the legal rules for forward encrypted data, Alice and Bob could exchange
processing personal data. The term processing is very their information with the help of a Distributed Hash
broad and can be anything from recording, handling and Table (DHT),
deleting data. The term personal data refers to "any
information relating to an identified or identifiable natural POI Finder
person (data subject)", whereas the identification can be
direct or indirect. Direct means to identify an individual One of the most commonly used LBSs allows users
without third party data sourcesMany models based on to find Point-of-Interest (POI) around their location.
social networks have been proposed to improve Therefore, the user submits a query to the service
recommender system performance. The concept of provider along with her location and, optionally, some
inferred trust circle based on circles of friends. To additional information on what kind of POIs the user is
recommend favorite and useful items to users. Their interested in. Private Information Retrieval (PIR) is suited
approach, called the Circle on Model, not only reduces the to implement a POI finder in a privacy-preserving way. PIR
load of big data and computation complexity, but also is a mechanism that allows users to query a database
defines the interpersonal trust in the complex social without the database server learning what information the
networks. user requested. It propose two protocols based on PIR.
The first protocol works with a single PIR request at the
The similarity between users or items according cost of providing only approximate results. The second
to the number of common ratings. An item-based CF protocol has a higher computational and communication
combined with a condition-based probability similarity overhead but provides more accurate query results. Both
and Cosine Similarity. Collaborative filtering-based protocols are built on a data structure based on Hilbert
recommendation approaches can be viewed as the first curves and search trees that convert the map coordinates
generation of recommender system. of POIs into 1-dimensional coordinates preserving the
proximity of POIs. This allows to apply PIR on originally
III. DESIGN OF PRIVATE LOCATION-BASED two-dimensional data.
Most LBSs for mobile devices are privacy invasive, Traffic Monitoring
because the service provider learns the user's location
data. A variety of services have been proposed that make The idea of traffic monitoring is that cars on the
this privacy invasion impossible. Such services employ road are equipped with tracking devices and report to a
cryptographic primitives that allow them to provide the LBS additional data, such as their current speed. This
necessary privacy guarantees. One of the most commonly allows the LBS to compute statistics, such as current road
used cryptographic primitives is homomorphic encryption utilization, that can be used to navigate cars in a more
that allows computations to be carried out on ciphertext. efficient way. Clearly, such a system can provide
There exists several cryptosystems that provide this considerable advantages, including the detection of traffic
homomorphic property. Cryptosystem possess the jams and the subsequent redirection of other cars to a
additive homomorphic property. Given two plaintexts m1 faster route. However, if cars constantly reveal their
and m2 and their respective encryptions E(m1) and E(m2), locations, any observer would be able to learn private
the following equation holds: information about the users
E.(mi) E.(m2) = E(mi + m2) -----(1) Formally define the Sybil detection problem.
Specifically, we first introduce the social Network model.
Geo-Social Networks Then we introduce a few design goals.
2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 177
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072
( ) {
Algorithm Implementation
rui(t)= +bu(t)+bi(t)+qTipu(t)
2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 179
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072
Use functional forms: bu(t)=f(u,t), bi(t)=g(i,t), Hotels & Travel, Night Life, Pets, Restaurants, and
pu(t)=h(u,t) Shopping.
Need to find adequate f(), g(), h()
General guidelines: LOCAL TRUSTEE SELECTION STRATEGIES
Items show slower temporal changes
Users exhibit frequent and sudden changes For a user u, a local trustee selection strategy
Factors pu(t) are expensive to model essentially computes a score s(v, u) for each friend v of u
Gain flexibility by heavily parametering the and then selects my friends with the highest scores as u's
functions trustees.
2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 180
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072
V. EVALUATION RESULT
The PLQP is a suit of protocols supporting Fig : The comparison of each entitys time cost
privacy-preserving LBS in mobile application. It has high between our scheme and PLQP
efficiency and achieves fine-grained control by exerting
the CP-ABE scheme, which is similar to our work. Thus, in
this section, we will compare our scheme with the PLQP
scheme for evaluating the performance of our proposed
scheme. The algorithms are implemented using the Big
Integer library on a Windows 8.1 system with Intel CORE
i7-4500U [email protected] GHz and 8.00 G RAM. We have 10
tests in this experiment. Additionally, in each test, we use
1000 pairs of random locations for the publisher and the
querier, respectively. We present the average results for
each test in the following figures.It shows the detailed
time cost for once location distance compute and location Fig: The time comparison of performing
distance compare, respectively. It is obvious that the time location distance compute between our scheme and
cost at the publisher is always zero, PLQP
2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 181
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072
interpersonal rating behavior similarity (related to users circle, IEEE Trans. Knowl. Data Eng., vol. 26, no. 7, pp.
rating habits), and interpersonal rating behavior diffusion 17631777, Jul. 2014.
(related to users behavior diffusions). A concept of the 10. K. Lee and K. Lee, Using dynamically promoted
rating schedule is proposed to represent user daily rating experts for music recommendation, IEEE Trans.
behavior. The similarity between user rating schedules is Multimedia, vol. 16, no. 5, pp. 12011210, Aug. 2014.
utilized to represent interpersonal rating behavior 11. Z. Wang et al., Joint social and content
similarity. The factor of interpersonal rating behavior recommendation for user generated videos in online
diffusion is proposed to deep understand users rating social network, IEEE Trans. Multimedia, vol. 15, no. 3,
behaviors. We explore the users social circle, and split the pp. 698709, Apr. 2013.
social network into three components, direct friends,
mutual friends, and the indirect friends, to deep
understand social users rating behavior diffusions. These
factors are fused together to improve the accuracy and
applicability of predictions. We conduct a series of
experiments in Yelp and Douban Movie datasets. The
experimental results of our model show significant
improvement.
Future work
REFERENCES
2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 182