SlideShare a Scribd company logo
Privacy-Preserving Optimal Meeting Location
Determination on Mobile Devices
Abstract:
Equipped with state-of-the-art smart phones and mobile devices, today’s
highly interconnected urban population is increasingly dependent on these gadgets
to organize and plan their daily lives. These applications often rely on current(or
preferred) locations of individual users or a group of users to provide the desired
service, which jeopardizes their privacy; users do not necessarily want to reveal
their current (or preferred)locations to the service provider or to other, possibly un-
trusted, users. In this paper, we propose privacy-preserving algorithms for
determining an optimal meeting location for a group of users. We perform a
thorough privacy evaluation by formally quantifying privacy-loss of the proposed
approaches. In order to study the performance of our algorithms in a real
deployment, we implement and test their execution efficiency on Nokia smart
phones. By means of a targeted user-study, we attempt to get an insight into the
privacy-awareness of users in location based services and the usability of the
proposed solutions.
We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live
chat with us at www.ocularsystems.in or call us on 020 30858066 or
Mail Us: info@ocularsystems.in
Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
Architecture Diagram:
Existing System:
The rapid proliferation of smart phone technology in urban communities has
enabled mobile users to utilize context aware services on their devices. Service
providers take advantage of this dynamic and ever-growing technology landscape
by proposing innovative context-dependent services for mobile subscribers.
Location-based Services (LBS), for example, are used by millions of mobile
We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live
chat with us at www.ocularsystems.in or call us on 020 30858066 or
Mail Us: info@ocularsystems.in
Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
subscribers every day to obtain location-specific information .Two popular features
of location-based services are location check-ins and location sharing. By
checking into a location, users can share their current location with family and
friends or obtain location-specific services from third-party providers ,The
obtained service does not depend on the locations of other users. The other type of
location-based services, which rely on sharing of locations (or location
preferences) by a group of users in order to obtain some service for the whole
group, are also becoming popular. According to a recent study , location sharing
services are used by almost 20% of all mobile phone users. One prominent
example of such a service is the taxi-sharing application, offered by a global
telecom operator , where smart phone users can share a taxi with other users at a
suitable location by revealing their departure and destination locations. Similarly,
another popular service enables a group of users to find the most geographically
convenient place to meet.
Disadvantages:
1.Privacy of a user’s location or location preferences, with respect to other users
and the third-party service provider, is a critical concern in such location-sharing-
based applications. For instance, such information can be used to de-anonymize
users and their availabilities , to track their preferences or to identify their social
networks. For example, in the taxi-sharing application, a curious third-party service
provider could easily deduce home/work location pairs of users who regularly use
their service.
We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live
chat with us at www.ocularsystems.in or call us on 020 30858066 or
Mail Us: info@ocularsystems.in
Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
2.Without effective protection, evens parse location information has been shown to
provide reliable information about a users’ private sphere, which could have severe
consequences on the users’ social, financial and private life . Even service
providers who legitimately track users’ location information in order to improve
the offered service can inadvertently harm users’ privacy, if the collected data is
leaked in an unauthorized fashion or improperly shared with corporate partners.
Proposed System:
We then propose two algorithms for solving the above formulation of the FRVP
problem in a privacy-preserving fashion, where each user participates by providing
only a single location preference to the FRVP solver or the service provider.
In this significantly extended version of our earlier conference paper ,we evaluate
the security of our proposal under various passive and active adversarial scenarios,
including collusion. We also provide an accurate and detailed analysis of the
privacy properties of our proposal and show that our algorithms do not provide
any probabilistic advantage to a passive adversary in correctly guessing the
preferred location of any participant. In addition to the theoretical analysis, we also
evaluate the practical efficiency and performance of the proposed algorithms by
means of a prototype implementation on a test bed of Nokia mobile devices. We
also address the multi-preference case, where each user may have multiple
prioritized location preferences. We highlight the main differences, in terms of
performance, with the single preference case, and also present initial experimental
results for the multi-preference implementation. Finally, by means of a targeted
user study, we provide insight into the usability of our proposed solutions.
We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live
chat with us at www.ocularsystems.in or call us on 020 30858066 or
Mail Us: info@ocularsystems.in
Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
Advantages:
We address the privacy issue in LSBSs by focusing on a specific problem called
the Fair Rendez-Vous Point (FRVP) problem. Given a set of user location
preferences, the FRVP problem is to determine a location among the proposed
ones such that the maximum distance between this location and all other users’
locations is minimized, i.e. it is fair to all users.
Goal:
Our goal is to provide practical privacy preserving techniques to solve the FRVP
problem, such that neither a third-party, nor participating users, can learn other
users’ locations; participating users only learn the optimal location. The privacy
issue in the FRVP problem is representative of the relevant privacy threats in
LSBSs.
Algorithms:
Our proposed algorithms take advantage of the homomorphic properties of well-
known cryptosystems, such as BGN, ElGamal and Paillier, in order to privately
compute an optimally fair rendez-vous point from a set of user location
preferences.
We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live
chat with us at www.ocularsystems.in or call us on 020 30858066 or
Mail Us: info@ocularsystems.in
Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
Implementation Modules:
1. User Privacy
2. Server Privacy
3. PPFRVP protocol
4. Privacy Under Multiple Dependent Executions
User Privacy:
The user-privacy of any PPFRVP algorithm A measures the probabilistic
advantage that an adversary a gains towards learning the preferred location of at
least one other user ,except the final fair rendez-vous location, after all users have
participated in the execution of the PPFRVP protocol. An adversary in this case is
a user participating in A. We express user-privacy as three different probabilistic
advantages.
1. we measure the probabilistic advantage of an adversary ua in correctly
guessing the preferred location Li of any user ui _= ua. This is referred to as
the identifiability advantage.
2. The second measure of user-privacy is the distance linkability advantage,
which is the probabilistic advantage of an adversary ua in correctly guessing
whether the distanced i, j between any two participating users ui _= u j , is
We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live
chat with us at www.ocularsystems.in or call us on 020 30858066 or
Mail Us: info@ocularsystems.in
Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
greater than a given parameter s, without learning any users’ preferred
locations Li , L j.
3. The coordinate-linkability advantage, denoted as Advc−LNKa , is the
probabilistic advantage of an adversary ua in correctly guessing whether a
given coordinate xi (or yi )of a user ui is greater than the corresponding
coordinate(s)of another user u j _= ui without learning the users’ preferred
locations Li , L j .
Server Privacy:
For the third-party (LDS) adversary, the game definitions are similar to those
defined for an user adversary, except that the LDS does not receive L f air in the
Step 2 of the game. Then, the server-privacy of a PPFRVP algorithm A can then
be defined as follows. Definition 3: An execution of the PPFRVP algorithm A is
server-private if the identifiability advantage DTLDS(A), the distance-linkability
advantage Advd−LNKLDS and the coordinate linkability advantage
Advc−LNKLDS of an LDS are negligible. In practice, users will execute the
PPFRVP protocol multiple times with either similar or completely different sets of
participating users, and with the same or a different location preference in each
execution instant. Thus, although it is critical to measure the privacy leakage of the
PPFRVP algorithm in a single execution, it is also important to study the leakage
We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live
chat with us at www.ocularsystems.in or call us on 020 30858066 or
Mail Us: info@ocularsystems.in
Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
that may occur over multiple correlated executions, which in turn depends on the
intermediate and final output of the PPFRVP algorithm. We discuss the privacy
leakage of the proposed algorithms over multiple executions in Section VI-D.
PPFRVP protocol:
The PPFRVP protocol (shown in Fig. 4) has three main modules:
(A) the distance computation module,
(B) the MAX module and
1) Distance Computation: The distance computation module uses either the BGN-
distance or the Paillier- ElGamal distance protocols. We note that modules (B) and
(C) use the same encryption scheme as the one used in module (A). In other words,
(E).It refers to encryption using either the BGN or the Paillier encryption scheme.
2) MAX Computation: In Step B.1, the LDS needs to hide the values within the
encrypted elements (i.e., the pair wise distances computed earlier) before sending
them to the users.
This is done in order to
(i) ensure privacy of real pair wise distances,
(ii) be resilient in case of collusion among users and
(iii) preserve the internal order (the inequalities) among the pair wise distance
from each user to all other users.
Privacy Under Multiple Dependent Executions:
We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live
chat with us at www.ocularsystems.in or call us on 020 30858066 or
Mail Us: info@ocularsystems.in
Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
As defined earlier, in a dependent execution of the PPFRVP protocol, all the
involved parties possess information from the previous executions, in addition to
the current input, output and intermediate data. It is clear that, due to the oblivious
or blind nature of the computations, the privacy guarantees of the proposed
PPFRVP protocols with respect to the LDS independent executions remains the
same as that for independent executions. Furthermore, dependent executions in
which the information across executions is completely uncorrelated (e.g., different
set of users in each execution or different and unrelated preferences in each
execution) reduce to independent execution. We analyze two different scenarios of
dependent
executions involving differential information .First, we consider the case of
dependent executions with different subsets of participants. We assume that, in
each sequential execution, the set of users or participants is reduced by exactly one
(the adversary participant remains until the end), and that the retained participants
preferences remain the same as the previous execution(s). The following
information is implicitly passed across executions in this scenario:
(i) participant set,
(ii) optimal fair location L f air ,
(iii) permuted and randomly scaled pair wise distances from
the participant to every other participant, and (iv) scaled (but order preserving)
maximum distance from every participant to every other participant.
We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live
chat with us at www.ocularsystems.in or call us on 020 30858066 or
Mail Us: info@ocularsystems.in
Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
System Configuration:-
H/W System Configuration:-
Processor - Pentium –III
Speed - 1.1 Ghz
RAM - 256 MB(min)
Hard Disk - 20 GB
Floppy Drive - 1.44 MB
Key Board - Standard Windows Keyboard
Mouse - Two or Three Button Mouse
Monitor - SVGA
S/W System Configuration:-
 Operating System :Windows95/98/2000/XP
 Front End : java, jdk1.6
 Database : My sqlserver 2005
 Database Connectivity : JDBC.
We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live
chat with us at www.ocularsystems.in or call us on 020 30858066 or
Mail Us: info@ocularsystems.in
Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live
chat with us at www.ocularsystems.in or call us on 020 30858066 or
Mail Us: info@ocularsystems.in
Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)

More Related Content

PDF
Privacy preserving relative location based services for mobile users
LeMeniz Infotech
 
DOC
Privacy preserving optimal meeting location determination on mobile devices
Adz91 Digital Ads Pvt Ltd
 
PPTX
Privacy preserving optimal meeting location determination on mobile devices
IGEEKS TECHNOLOGIES
 
DOC
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Privacy preserving optimal meeting l...
IEEEFINALYEARSTUDENTPROJECTS
 
PDF
LPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBS
IJNSA Journal
 
PDF
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
Nexgen Technology
 
DOC
Privacy preserving optimal meeting location determination on mobile devices
Shakas Technologies
 
PDF
IRJET- Quantify Mutually Dependent Privacy Risks with Locality Data
IRJET Journal
 
Privacy preserving relative location based services for mobile users
LeMeniz Infotech
 
Privacy preserving optimal meeting location determination on mobile devices
Adz91 Digital Ads Pvt Ltd
 
Privacy preserving optimal meeting location determination on mobile devices
IGEEKS TECHNOLOGIES
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Privacy preserving optimal meeting l...
IEEEFINALYEARSTUDENTPROJECTS
 
LPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBS
IJNSA Journal
 
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
Nexgen Technology
 
Privacy preserving optimal meeting location determination on mobile devices
Shakas Technologies
 
IRJET- Quantify Mutually Dependent Privacy Risks with Locality Data
IRJET Journal
 

What's hot (18)

PDF
PERTURBED ANONYMIZATION: TWO LEVEL SMART PRIVACY FOR LBS MOBILE USERS
cscpconf
 
DOCX
Privacy preserving data sharing with anonymous id assignment
IEEEFINALYEARPROJECTS
 
PDF
Performance Evaluation of Password Authentication using Associative Neural Me...
ijait
 
PDF
Continuous query processing for mobile users
International Journal of Science and Research (IJSR)
 
DOC
Indoor localization Leveraging Human Perception of Textual Signs
Shekhar Vimalendu
 
PDF
Desensitized RDCA Subspaces for Compressive Privacy in Machine Learning
Artur Filipowicz
 
PPTX
Testing Vitality Ranking and Prediction in Social Networking Services With Dy...
reshma reshu
 
PDF
IRJET- Quinn: Medical Assistant for Mental Counseling using Rasa Stack
IRJET Journal
 
PPTX
User friendly pattern search paradigm
Migrant Systems
 
PDF
Privacy preserving location sharing services for social networks
LeMeniz Infotech
 
DOCX
Privacy preserving location sharing services for social networks
Nexgen Technology
 
PDF
Multi-Level Secret Sharing Scheme for Mobile Ad-Hoc Networks
Eswar Publications
 
PDF
AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS
IJNSA Journal
 
PDF
A NOVEL WAY OF PROVIDING CONFIDENTIALITY TO SHARED SECRET KEY AND AUTHENTICAT...
cscpconf
 
DOCX
PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
Kamal Spring
 
PDF
Privacy preserving location sharing services for social
Shakas Technologies
 
DOCX
Mit201– operating system
smumbahelp
 
DOCX
Privacy preserving distributed profile matching in proximity-based mobile soc...
IEEEFINALYEARPROJECTS
 
PERTURBED ANONYMIZATION: TWO LEVEL SMART PRIVACY FOR LBS MOBILE USERS
cscpconf
 
Privacy preserving data sharing with anonymous id assignment
IEEEFINALYEARPROJECTS
 
Performance Evaluation of Password Authentication using Associative Neural Me...
ijait
 
Continuous query processing for mobile users
International Journal of Science and Research (IJSR)
 
Indoor localization Leveraging Human Perception of Textual Signs
Shekhar Vimalendu
 
Desensitized RDCA Subspaces for Compressive Privacy in Machine Learning
Artur Filipowicz
 
Testing Vitality Ranking and Prediction in Social Networking Services With Dy...
reshma reshu
 
IRJET- Quinn: Medical Assistant for Mental Counseling using Rasa Stack
IRJET Journal
 
User friendly pattern search paradigm
Migrant Systems
 
Privacy preserving location sharing services for social networks
LeMeniz Infotech
 
Privacy preserving location sharing services for social networks
Nexgen Technology
 
Multi-Level Secret Sharing Scheme for Mobile Ad-Hoc Networks
Eswar Publications
 
AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS
IJNSA Journal
 
A NOVEL WAY OF PROVIDING CONFIDENTIALITY TO SHARED SECRET KEY AND AUTHENTICAT...
cscpconf
 
PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
Kamal Spring
 
Privacy preserving location sharing services for social
Shakas Technologies
 
Mit201– operating system
smumbahelp
 
Privacy preserving distributed profile matching in proximity-based mobile soc...
IEEEFINALYEARPROJECTS
 
Ad

Similar to Privacy preserving optimal meeting location determination on mobile devices (20)

PDF
Privacy preserving optimal meeting location determination on mobile devices
Shakas Technologies
 
PDF
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...
IJERA Editor
 
PDF
Privacy Preservation And Data Security In Location Based Services
EditorJST
 
DOCX
preserving location privacy in geosocial applications
swathi78
 
DOCX
Hiding in the mobile crowd location privacy through collaboration
LeMeniz Infotech
 
DOC
azd document
azeed shaik
 
DOCX
JPJ1437 Exploiting Service Similarity for Privacy in Location-Based Search Q...
chennaijp
 
DOCX
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Profilr toward preserving privacy an...
IEEEGLOBALSOFTSTUDENTPROJECTS
 
DOCX
2014 IEEE JAVA NETWORK SECURITY PROJECT Profilr toward preserving privacy and...
IEEEBEBTECHSTUDENTSPROJECTS
 
PDF
Exploiting Service Similarity for Privacy in Location Based Search Queries
Migrant Systems
 
PDF
Conference talk: On the Privacy of Frequently Visited User Locations
Zohaib Riaz
 
DOCX
Preserving location privacy in geo social applications
Adz91 Digital Ads Pvt Ltd
 
DOCX
Hiding in the mobile crowd location privacy through collaboration
JPINFOTECH JAYAPRAKASH
 
PDF
Privacy - Preserving Reputation with Content Protecting Location Based Queries
iosrjce
 
PDF
H017665256
IOSR Journals
 
PDF
Privacy Preserving Location Query Service
IRJET Journal
 
DOCX
JPD1435 Preserving Location Privacy in Geosocial Applications
chennaijp
 
DOCX
JPJ1430 PROFILR: Toward Preserving Privacy and Functionality in Geosocial Net...
chennaijp
 
DOCX
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
IEEEMEMTECHSTUDENTPROJECTS
 
Privacy preserving optimal meeting location determination on mobile devices
Shakas Technologies
 
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...
IJERA Editor
 
Privacy Preservation And Data Security In Location Based Services
EditorJST
 
preserving location privacy in geosocial applications
swathi78
 
Hiding in the mobile crowd location privacy through collaboration
LeMeniz Infotech
 
azd document
azeed shaik
 
JPJ1437 Exploiting Service Similarity for Privacy in Location-Based Search Q...
chennaijp
 
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Profilr toward preserving privacy an...
IEEEGLOBALSOFTSTUDENTPROJECTS
 
2014 IEEE JAVA NETWORK SECURITY PROJECT Profilr toward preserving privacy and...
IEEEBEBTECHSTUDENTSPROJECTS
 
Exploiting Service Similarity for Privacy in Location Based Search Queries
Migrant Systems
 
Conference talk: On the Privacy of Frequently Visited User Locations
Zohaib Riaz
 
Preserving location privacy in geo social applications
Adz91 Digital Ads Pvt Ltd
 
Hiding in the mobile crowd location privacy through collaboration
JPINFOTECH JAYAPRAKASH
 
Privacy - Preserving Reputation with Content Protecting Location Based Queries
iosrjce
 
H017665256
IOSR Journals
 
Privacy Preserving Location Query Service
IRJET Journal
 
JPD1435 Preserving Location Privacy in Geosocial Applications
chennaijp
 
JPJ1430 PROFILR: Toward Preserving Privacy and Functionality in Geosocial Net...
chennaijp
 
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
IEEEMEMTECHSTUDENTPROJECTS
 
Ad

More from Adz91 Digital Ads Pvt Ltd (20)

DOCX
2016 ieee java .net project titles
Adz91 Digital Ads Pvt Ltd
 
PDF
Java project ideas topics for computer engineering students
Adz91 Digital Ads Pvt Ltd
 
DOCX
Dotnet 2015 2016 2017 ieee project list-with abstract
Adz91 Digital Ads Pvt Ltd
 
PDF
Adz91 business opportunity presentation
Adz91 Digital Ads Pvt Ltd
 
PPTX
Efficient instant fuzzy search with proximity ranking
Adz91 Digital Ads Pvt Ltd
 
PDF
BE/ ME / MTech / BTech Computer Engineering Project titles IEEE 2014 IEEE 2015
Adz91 Digital Ads Pvt Ltd
 
DOC
Xs path navigation on xml schemas made easy
Adz91 Digital Ads Pvt Ltd
 
DOC
Supporting privacy protection in personalized web search
Adz91 Digital Ads Pvt Ltd
 
DOC
Shared authority based privacy preserving authentication protocol in cloud co...
Adz91 Digital Ads Pvt Ltd
 
DOCX
Securing broker less publish subscribe systems using identity-based encryption
Adz91 Digital Ads Pvt Ltd
 
DOCX
Secure outsourced attribute based signatures
Adz91 Digital Ads Pvt Ltd
 
DOC
Oruta privacy preserving public auditing for shared data in the cloud
Adz91 Digital Ads Pvt Ltd
 
DOC
Mining weakly labeled web facial images for search based face annotation
Adz91 Digital Ads Pvt Ltd
 
DOC
Key aggregate cryptosystem for scalable data sharing in cloud storage
Adz91 Digital Ads Pvt Ltd
 
DOCX
Efficient authentication for mobile and pervasive computing
Adz91 Digital Ads Pvt Ltd
 
DOC
Decentralized access control with anonymous authentication of data stored in ...
Adz91 Digital Ads Pvt Ltd
 
DOCX
Decentralized access control of data stored in cloud using key policy attribu...
Adz91 Digital Ads Pvt Ltd
 
DOCX
Dealing with concept drifts in process mining
Adz91 Digital Ads Pvt Ltd
 
DOCX
Cloud assisted mobile-access of health data with privacy and auditability
Adz91 Digital Ads Pvt Ltd
 
DOC
Building confidential and efficient query services in the cloud with rasp dat...
Adz91 Digital Ads Pvt Ltd
 
2016 ieee java .net project titles
Adz91 Digital Ads Pvt Ltd
 
Java project ideas topics for computer engineering students
Adz91 Digital Ads Pvt Ltd
 
Dotnet 2015 2016 2017 ieee project list-with abstract
Adz91 Digital Ads Pvt Ltd
 
Adz91 business opportunity presentation
Adz91 Digital Ads Pvt Ltd
 
Efficient instant fuzzy search with proximity ranking
Adz91 Digital Ads Pvt Ltd
 
BE/ ME / MTech / BTech Computer Engineering Project titles IEEE 2014 IEEE 2015
Adz91 Digital Ads Pvt Ltd
 
Xs path navigation on xml schemas made easy
Adz91 Digital Ads Pvt Ltd
 
Supporting privacy protection in personalized web search
Adz91 Digital Ads Pvt Ltd
 
Shared authority based privacy preserving authentication protocol in cloud co...
Adz91 Digital Ads Pvt Ltd
 
Securing broker less publish subscribe systems using identity-based encryption
Adz91 Digital Ads Pvt Ltd
 
Secure outsourced attribute based signatures
Adz91 Digital Ads Pvt Ltd
 
Oruta privacy preserving public auditing for shared data in the cloud
Adz91 Digital Ads Pvt Ltd
 
Mining weakly labeled web facial images for search based face annotation
Adz91 Digital Ads Pvt Ltd
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Adz91 Digital Ads Pvt Ltd
 
Efficient authentication for mobile and pervasive computing
Adz91 Digital Ads Pvt Ltd
 
Decentralized access control with anonymous authentication of data stored in ...
Adz91 Digital Ads Pvt Ltd
 
Decentralized access control of data stored in cloud using key policy attribu...
Adz91 Digital Ads Pvt Ltd
 
Dealing with concept drifts in process mining
Adz91 Digital Ads Pvt Ltd
 
Cloud assisted mobile-access of health data with privacy and auditability
Adz91 Digital Ads Pvt Ltd
 
Building confidential and efficient query services in the cloud with rasp dat...
Adz91 Digital Ads Pvt Ltd
 

Recently uploaded (20)

PPTX
22PCOAM21 Session 1 Data Management.pptx
Guru Nanak Technical Institutions
 
PPTX
Module2 Data Base Design- ER and NF.pptx
gomathisankariv2
 
PDF
Traditional Exams vs Continuous Assessment in Boarding Schools.pdf
The Asian School
 
PPT
1. SYSTEMS, ROLES, AND DEVELOPMENT METHODOLOGIES.ppt
zilow058
 
PDF
top-5-use-cases-for-splunk-security-analytics.pdf
yaghutialireza
 
PDF
Chad Ayach - A Versatile Aerospace Professional
Chad Ayach
 
PPTX
database slide on modern techniques for optimizing database queries.pptx
aky52024
 
PDF
FLEX-LNG-Company-Presentation-Nov-2017.pdf
jbloggzs
 
PDF
2025 Laurence Sigler - Advancing Decision Support. Content Management Ecommer...
Francisco Javier Mora Serrano
 
PDF
Zero carbon Building Design Guidelines V4
BassemOsman1
 
PDF
Advanced LangChain & RAG: Building a Financial AI Assistant with Real-Time Data
Soufiane Sejjari
 
PPTX
Tunnel Ventilation System in Kanpur Metro
220105053
 
PDF
EVS+PRESENTATIONS EVS+PRESENTATIONS like
saiyedaqib429
 
PDF
Unit I Part II.pdf : Security Fundamentals
Dr. Madhuri Jawale
 
PPTX
MT Chapter 1.pptx- Magnetic particle testing
ABCAnyBodyCanRelax
 
PPT
SCOPE_~1- technology of green house and poyhouse
bala464780
 
PDF
Top 10 read articles In Managing Information Technology.pdf
IJMIT JOURNAL
 
PDF
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
PPTX
Victory Precisions_Supplier Profile.pptx
victoryprecisions199
 
PPTX
Chapter_Seven_Construction_Reliability_Elective_III_Msc CM
SubashKumarBhattarai
 
22PCOAM21 Session 1 Data Management.pptx
Guru Nanak Technical Institutions
 
Module2 Data Base Design- ER and NF.pptx
gomathisankariv2
 
Traditional Exams vs Continuous Assessment in Boarding Schools.pdf
The Asian School
 
1. SYSTEMS, ROLES, AND DEVELOPMENT METHODOLOGIES.ppt
zilow058
 
top-5-use-cases-for-splunk-security-analytics.pdf
yaghutialireza
 
Chad Ayach - A Versatile Aerospace Professional
Chad Ayach
 
database slide on modern techniques for optimizing database queries.pptx
aky52024
 
FLEX-LNG-Company-Presentation-Nov-2017.pdf
jbloggzs
 
2025 Laurence Sigler - Advancing Decision Support. Content Management Ecommer...
Francisco Javier Mora Serrano
 
Zero carbon Building Design Guidelines V4
BassemOsman1
 
Advanced LangChain & RAG: Building a Financial AI Assistant with Real-Time Data
Soufiane Sejjari
 
Tunnel Ventilation System in Kanpur Metro
220105053
 
EVS+PRESENTATIONS EVS+PRESENTATIONS like
saiyedaqib429
 
Unit I Part II.pdf : Security Fundamentals
Dr. Madhuri Jawale
 
MT Chapter 1.pptx- Magnetic particle testing
ABCAnyBodyCanRelax
 
SCOPE_~1- technology of green house and poyhouse
bala464780
 
Top 10 read articles In Managing Information Technology.pdf
IJMIT JOURNAL
 
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
Victory Precisions_Supplier Profile.pptx
victoryprecisions199
 
Chapter_Seven_Construction_Reliability_Elective_III_Msc CM
SubashKumarBhattarai
 

Privacy preserving optimal meeting location determination on mobile devices

  • 1. Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices Abstract: Equipped with state-of-the-art smart phones and mobile devices, today’s highly interconnected urban population is increasingly dependent on these gadgets to organize and plan their daily lives. These applications often rely on current(or preferred) locations of individual users or a group of users to provide the desired service, which jeopardizes their privacy; users do not necessarily want to reveal their current (or preferred)locations to the service provider or to other, possibly un- trusted, users. In this paper, we propose privacy-preserving algorithms for determining an optimal meeting location for a group of users. We perform a thorough privacy evaluation by formally quantifying privacy-loss of the proposed approaches. In order to study the performance of our algorithms in a real deployment, we implement and test their execution efficiency on Nokia smart phones. By means of a targeted user-study, we attempt to get an insight into the privacy-awareness of users in location based services and the usability of the proposed solutions. We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live chat with us at www.ocularsystems.in or call us on 020 30858066 or Mail Us: [email protected] Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
  • 2. Architecture Diagram: Existing System: The rapid proliferation of smart phone technology in urban communities has enabled mobile users to utilize context aware services on their devices. Service providers take advantage of this dynamic and ever-growing technology landscape by proposing innovative context-dependent services for mobile subscribers. Location-based Services (LBS), for example, are used by millions of mobile We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live chat with us at www.ocularsystems.in or call us on 020 30858066 or Mail Us: [email protected] Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
  • 3. subscribers every day to obtain location-specific information .Two popular features of location-based services are location check-ins and location sharing. By checking into a location, users can share their current location with family and friends or obtain location-specific services from third-party providers ,The obtained service does not depend on the locations of other users. The other type of location-based services, which rely on sharing of locations (or location preferences) by a group of users in order to obtain some service for the whole group, are also becoming popular. According to a recent study , location sharing services are used by almost 20% of all mobile phone users. One prominent example of such a service is the taxi-sharing application, offered by a global telecom operator , where smart phone users can share a taxi with other users at a suitable location by revealing their departure and destination locations. Similarly, another popular service enables a group of users to find the most geographically convenient place to meet. Disadvantages: 1.Privacy of a user’s location or location preferences, with respect to other users and the third-party service provider, is a critical concern in such location-sharing- based applications. For instance, such information can be used to de-anonymize users and their availabilities , to track their preferences or to identify their social networks. For example, in the taxi-sharing application, a curious third-party service provider could easily deduce home/work location pairs of users who regularly use their service. We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live chat with us at www.ocularsystems.in or call us on 020 30858066 or Mail Us: [email protected] Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
  • 4. 2.Without effective protection, evens parse location information has been shown to provide reliable information about a users’ private sphere, which could have severe consequences on the users’ social, financial and private life . Even service providers who legitimately track users’ location information in order to improve the offered service can inadvertently harm users’ privacy, if the collected data is leaked in an unauthorized fashion or improperly shared with corporate partners. Proposed System: We then propose two algorithms for solving the above formulation of the FRVP problem in a privacy-preserving fashion, where each user participates by providing only a single location preference to the FRVP solver or the service provider. In this significantly extended version of our earlier conference paper ,we evaluate the security of our proposal under various passive and active adversarial scenarios, including collusion. We also provide an accurate and detailed analysis of the privacy properties of our proposal and show that our algorithms do not provide any probabilistic advantage to a passive adversary in correctly guessing the preferred location of any participant. In addition to the theoretical analysis, we also evaluate the practical efficiency and performance of the proposed algorithms by means of a prototype implementation on a test bed of Nokia mobile devices. We also address the multi-preference case, where each user may have multiple prioritized location preferences. We highlight the main differences, in terms of performance, with the single preference case, and also present initial experimental results for the multi-preference implementation. Finally, by means of a targeted user study, we provide insight into the usability of our proposed solutions. We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live chat with us at www.ocularsystems.in or call us on 020 30858066 or Mail Us: [email protected] Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
  • 5. Advantages: We address the privacy issue in LSBSs by focusing on a specific problem called the Fair Rendez-Vous Point (FRVP) problem. Given a set of user location preferences, the FRVP problem is to determine a location among the proposed ones such that the maximum distance between this location and all other users’ locations is minimized, i.e. it is fair to all users. Goal: Our goal is to provide practical privacy preserving techniques to solve the FRVP problem, such that neither a third-party, nor participating users, can learn other users’ locations; participating users only learn the optimal location. The privacy issue in the FRVP problem is representative of the relevant privacy threats in LSBSs. Algorithms: Our proposed algorithms take advantage of the homomorphic properties of well- known cryptosystems, such as BGN, ElGamal and Paillier, in order to privately compute an optimally fair rendez-vous point from a set of user location preferences. We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live chat with us at www.ocularsystems.in or call us on 020 30858066 or Mail Us: [email protected] Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
  • 6. Implementation Modules: 1. User Privacy 2. Server Privacy 3. PPFRVP protocol 4. Privacy Under Multiple Dependent Executions User Privacy: The user-privacy of any PPFRVP algorithm A measures the probabilistic advantage that an adversary a gains towards learning the preferred location of at least one other user ,except the final fair rendez-vous location, after all users have participated in the execution of the PPFRVP protocol. An adversary in this case is a user participating in A. We express user-privacy as three different probabilistic advantages. 1. we measure the probabilistic advantage of an adversary ua in correctly guessing the preferred location Li of any user ui _= ua. This is referred to as the identifiability advantage. 2. The second measure of user-privacy is the distance linkability advantage, which is the probabilistic advantage of an adversary ua in correctly guessing whether the distanced i, j between any two participating users ui _= u j , is We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live chat with us at www.ocularsystems.in or call us on 020 30858066 or Mail Us: [email protected] Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
  • 7. greater than a given parameter s, without learning any users’ preferred locations Li , L j. 3. The coordinate-linkability advantage, denoted as Advc−LNKa , is the probabilistic advantage of an adversary ua in correctly guessing whether a given coordinate xi (or yi )of a user ui is greater than the corresponding coordinate(s)of another user u j _= ui without learning the users’ preferred locations Li , L j . Server Privacy: For the third-party (LDS) adversary, the game definitions are similar to those defined for an user adversary, except that the LDS does not receive L f air in the Step 2 of the game. Then, the server-privacy of a PPFRVP algorithm A can then be defined as follows. Definition 3: An execution of the PPFRVP algorithm A is server-private if the identifiability advantage DTLDS(A), the distance-linkability advantage Advd−LNKLDS and the coordinate linkability advantage Advc−LNKLDS of an LDS are negligible. In practice, users will execute the PPFRVP protocol multiple times with either similar or completely different sets of participating users, and with the same or a different location preference in each execution instant. Thus, although it is critical to measure the privacy leakage of the PPFRVP algorithm in a single execution, it is also important to study the leakage We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live chat with us at www.ocularsystems.in or call us on 020 30858066 or Mail Us: [email protected] Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
  • 8. that may occur over multiple correlated executions, which in turn depends on the intermediate and final output of the PPFRVP algorithm. We discuss the privacy leakage of the proposed algorithms over multiple executions in Section VI-D. PPFRVP protocol: The PPFRVP protocol (shown in Fig. 4) has three main modules: (A) the distance computation module, (B) the MAX module and 1) Distance Computation: The distance computation module uses either the BGN- distance or the Paillier- ElGamal distance protocols. We note that modules (B) and (C) use the same encryption scheme as the one used in module (A). In other words, (E).It refers to encryption using either the BGN or the Paillier encryption scheme. 2) MAX Computation: In Step B.1, the LDS needs to hide the values within the encrypted elements (i.e., the pair wise distances computed earlier) before sending them to the users. This is done in order to (i) ensure privacy of real pair wise distances, (ii) be resilient in case of collusion among users and (iii) preserve the internal order (the inequalities) among the pair wise distance from each user to all other users. Privacy Under Multiple Dependent Executions: We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live chat with us at www.ocularsystems.in or call us on 020 30858066 or Mail Us: [email protected] Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
  • 9. As defined earlier, in a dependent execution of the PPFRVP protocol, all the involved parties possess information from the previous executions, in addition to the current input, output and intermediate data. It is clear that, due to the oblivious or blind nature of the computations, the privacy guarantees of the proposed PPFRVP protocols with respect to the LDS independent executions remains the same as that for independent executions. Furthermore, dependent executions in which the information across executions is completely uncorrelated (e.g., different set of users in each execution or different and unrelated preferences in each execution) reduce to independent execution. We analyze two different scenarios of dependent executions involving differential information .First, we consider the case of dependent executions with different subsets of participants. We assume that, in each sequential execution, the set of users or participants is reduced by exactly one (the adversary participant remains until the end), and that the retained participants preferences remain the same as the previous execution(s). The following information is implicitly passed across executions in this scenario: (i) participant set, (ii) optimal fair location L f air , (iii) permuted and randomly scaled pair wise distances from the participant to every other participant, and (iv) scaled (but order preserving) maximum distance from every participant to every other participant. We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live chat with us at www.ocularsystems.in or call us on 020 30858066 or Mail Us: [email protected] Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
  • 10. System Configuration:- H/W System Configuration:- Processor - Pentium –III Speed - 1.1 Ghz RAM - 256 MB(min) Hard Disk - 20 GB Floppy Drive - 1.44 MB Key Board - Standard Windows Keyboard Mouse - Two or Three Button Mouse Monitor - SVGA S/W System Configuration:-  Operating System :Windows95/98/2000/XP  Front End : java, jdk1.6  Database : My sqlserver 2005  Database Connectivity : JDBC. We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live chat with us at www.ocularsystems.in or call us on 020 30858066 or Mail Us: [email protected] Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)
  • 11. We develops Computer Engineering Projects for BE/ME students. For any kind of support you may live chat with us at www.ocularsystems.in or call us on 020 30858066 or Mail Us: [email protected] Our Address: Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 (Maharashtra)