JA 6022. MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P

22
SECURE LOCATION BASED QUERY SECURE LOCATION BASED QUERY OPTIMIZATION USING MOBILE OPTIMIZATION USING MOBILE BY, BY, K.ANANDHA KUMARI REG NO.10907104005 K.ANANDHA KUMARI REG NO.10907104005  T.P. DHIVYA REG NO.10907104017  T.P. DHIVYA REG NO.10907104017 G.NARMADHA REG NO.10907104053 G.NARMADHA REG NO.10907104053 GUIDED BY, GUIDED BY, Mr. Mr. AMALORPA VALARAJ.I BATCH NO:8

Transcript of JA 6022. MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P

Page 1: JA 6022.  MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P

8/7/2019 JA 6022. MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P

http://slidepdf.com/reader/full/ja-6022-mobile-implementation-of-location-based-queries-with-ensured-p 1/22

SECURE LOCATION BASED QUERY SECURE LOCATION BASED QUERY 

OPTIMIZATION USING MOBILEOPTIMIZATION USING MOBILE

BY,BY,

K.ANANDHA KUMARI REG NO.10907104005K.ANANDHA KUMARI REG NO.10907104005

  T.P.DHIVYA REG NO.10907104017  T.P.DHIVYA REG NO.10907104017

G.NARMADHA REG NO.10907104053G.NARMADHA REG NO.10907104053

GUIDED BY,GUIDED BY,

Mr.Mr. AMALORPA VALARAJ.I

BATCH NO:8

Page 2: JA 6022.  MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P

8/7/2019 JA 6022. MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P

http://slidepdf.com/reader/full/ja-6022-mobile-implementation-of-location-based-queries-with-ensured-p 2/22

 Abstract Abstract

In locationIn location--based services, users with locationbased services, users with location--awareaware

mobile devices are able to make queries about theirmobile devices are able to make queries about their

surroundings anywhere and at any time. While thissurroundings anywhere and at any time. While this

ubiquitous computing paradigm brings greatubiquitous computing paradigm brings greatconvenience for information access, it also raisesconvenience for information access, it also raises

concerns over potential intrusion into user locationconcerns over potential intrusion into user location

privacy.privacy.

 To protect location privacy, one typical approach is to To protect location privacy, one typical approach is tocloak user locations into spatial regions based on usercloak user locations into spatial regions based on user--

specified privacy requirements, and to transformspecified privacy requirements, and to transform

locationlocation--based queries into regionbased queries into region--based queries.based queries.

Page 3: JA 6022.  MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P

8/7/2019 JA 6022. MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P

http://slidepdf.com/reader/full/ja-6022-mobile-implementation-of-location-based-queries-with-ensured-p 3/22

In this paper, we identify and address three new issuesIn this paper, we identify and address three new issuesconcerning this location cloaking approach.concerning this location cloaking approach.

First, we study the representation of cloaking regionsFirst, we study the representation of cloaking regionsand show that a circular region generally leads to aand show that a circular region generally leads to asmall result size for regionsmall result size for region--based queries.based queries.

Second, we develop a mobility Second, we develop a mobility--aware location cloaking aware location cloaking technique to resist trace analysis attacks.technique to resist trace analysis attacks.

 Two cloaking algorithms, namely MaxAccu_Cloak and Two cloaking algorithms, namely MaxAccu_Cloak andMinComm_Cloak.MinComm_Cloak.

Finally, we develop an efficient polynomial algorithmFinally, we develop an efficient polynomial algorithmfor evaluating circularfor evaluating circular--regionregion--based kNN queries. Twobased kNN queries. Two

query processing odes, namely bulk and progressive, arequery processing odes, namely bulk and progressive, arepresented to return query results either all at once or inpresented to return query results either all at once or inan incremental manner.an incremental manner.

Page 4: JA 6022.  MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P

8/7/2019 JA 6022. MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P

http://slidepdf.com/reader/full/ja-6022-mobile-implementation-of-location-based-queries-with-ensured-p 4/22

Experimental results show that our proposedExperimental results show that our proposedmobility mobility--aware cloaking algorithms significantly aware cloaking algorithms significantly improve the quality of location cloaking in terms of improve the quality of location cloaking in terms of an entropy measure without compromising much onan entropy measure without compromising much onquery latency or communication cost.query latency or communication cost.

Moreover, the progressive query processing modeMoreover, the progressive query processing modeachieves a shorter response time than the bulk modeachieves a shorter response time than the bulk modeby parallelizing the query evaluation and resultby parallelizing the query evaluation and result

transmission.transmission.

Page 5: JA 6022.  MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P

8/7/2019 JA 6022. MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P

http://slidepdf.com/reader/full/ja-6022-mobile-implementation-of-location-based-queries-with-ensured-p 5/22

2. System Study 2. System Study 

2.1 Existing System2.1 Existing System In existing system though we have many web sitesIn existing system though we have many web sites

portal, and through high end mobile phones or PDAsportal, and through high end mobile phones or PDAs

 we can get information about the needed sometimes. we can get information about the needed sometimes. But these systems are not available to all and not allBut these systems are not available to all and not all

time. And also, this information does not reach peopletime. And also, this information does not reach peopleat the time of emergencies.at the time of emergencies.

It cannot be accessed by people who don·t know toIt cannot be accessed by people who don·t know toaccess the device. Other wise we have to make a call toaccess the device. Other wise we have to make a call tosome one or to make an enquiry to know about thesome one or to make an enquiry to know about thecurrent location.current location.

Page 6: JA 6022.  MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P

8/7/2019 JA 6022. MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P

http://slidepdf.com/reader/full/ja-6022-mobile-implementation-of-location-based-queries-with-ensured-p 6/22

PROBLEMS DEFINED:PROBLEMS DEFINED:

It fails to produce privacy for user.It fails to produce privacy for user.

 Takes more time to access. Takes more time to access.

Not available for user at all the time.Not available for user at all the time.

Page 7: JA 6022.  MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P

8/7/2019 JA 6022. MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P

http://slidepdf.com/reader/full/ja-6022-mobile-implementation-of-location-based-queries-with-ensured-p 7/22

Proposed SystemProposed System

2.2 Proposed System2.2 Proposed System Proposed system prov ides more easy and efficient way to getProposed system prov ides more easy and efficient way to get

answer about the location and other related queries v ia SMS. In thisanswer about the location and other related queries v ia SMS. In this

system we can get the answer

abou

t What, When, and ho w thesystem we can get the answe

rabou

t What, When, and ho w thequeries are. To use this system, there is no need of using any extraqueries are. To use this system, there is no need of using any extra

de v ices or searching in websites. Thus it is used by people who arede v ices or searching in websites. Thus it is used by people who are

li v ing in rural areas also.li v ing in rural areas also.

Some ad v antages areSome ad v antages are

Easy to accessEasy to access

Prov ide inf ormation as fastProv ide inf ormation as fast

Kee p the user inf ormation confidentiallyKee p the user inf ormation confidentially

Page 8: JA 6022.  MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P

8/7/2019 JA 6022. MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P

http://slidepdf.com/reader/full/ja-6022-mobile-implementation-of-location-based-queries-with-ensured-p 8/22

System ArchitectureSystem Architecture

Response to the user 

(The current location of the user)

Location Based ServicesServer 

Locationcloaking Agent

Page 9: JA 6022.  MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P

8/7/2019 JA 6022. MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P

http://slidepdf.com/reader/full/ja-6022-mobile-implementation-of-location-based-queries-with-ensured-p 9/22

User 

Type Query

Send SMS

Location cloaking agentreceives the query and passes

to LBS process Query

Stop

Location cloaking agent SendResult

User Get Location Information

Dataflow Diagram

Page 10: JA 6022.  MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P

8/7/2019 JA 6022. MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P

http://slidepdf.com/reader/full/ja-6022-mobile-implementation-of-location-based-queries-with-ensured-p 10/22

ModulesModules

SMS moduleSMS module

Location cloaking agentLocation cloaking agent LBS serverLBS server

Page 11: JA 6022.  MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P

8/7/2019 JA 6022. MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P

http://slidepdf.com/reader/full/ja-6022-mobile-implementation-of-location-based-queries-with-ensured-p 11/22

DFD:

User LBS Mobile

Login and

registration

Level 0- login and registration

modulel

Page 12: JA 6022.  MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P

8/7/2019 JA 6022. MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P

http://slidepdf.com/reader/full/ja-6022-mobile-implementation-of-location-based-queries-with-ensured-p 12/22

SMS MODULESMS MODULE

 This module acts as a User interface between the user This module acts as a User interface between the userand the LBS server.and the LBS server.

If the user wants to know any particular center, mall orIf the user wants to know any particular center, mall orany organization form a particular location, they canany organization form a particular location, they cansimply sends the query to the LBS server.simply sends the query to the LBS server.

 The user can select the place and send his direction like The user can select the place and send his direction like

forward or backward to the place as a inputforward or backward to the place as a input

Page 13: JA 6022.  MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P

8/7/2019 JA 6022. MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P

http://slidepdf.com/reader/full/ja-6022-mobile-implementation-of-location-based-queries-with-ensured-p 13/22

Page 14: JA 6022.  MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P

8/7/2019 JA 6022. MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P

http://slidepdf.com/reader/full/ja-6022-mobile-implementation-of-location-based-queries-with-ensured-p 14/22

Page 15: JA 6022.  MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P

8/7/2019 JA 6022. MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P

http://slidepdf.com/reader/full/ja-6022-mobile-implementation-of-location-based-queries-with-ensured-p 15/22

Location cloaking agentLocation cloaking agent

Location cloaking is one typical approach to protecting user location privacy Location cloaking is one typical approach to protecting user location privacy in LBS.in LBS.

Upon receiving a locationUpon receiving a location--based spatial query (e.g., a range query or a kNNbased spatial query (e.g., a range query or a kNNquery) from the user, the system cloaks the user·s current location into aquery) from the user, the system cloaks the user·s current location into a

cloaking region based on the user·s privacy requirement.cloaking region based on the user·s privacy requirement.  The location The location--based spatial query is, thus, transformed into a regionbased spatial query is, thus, transformed into a region--basedbased

spatial query before being sent to the LBS server. The LBS server thenspatial query before being sent to the LBS server. The LBS server thenevaluates the regionevaluates the region--based query and returns a result superset, which containsbased query and returns a result superset, which containsthe query results for all possible location points in the cloaking region.the query results for all possible location points in the cloaking region.

Finally, the system refines the result superset to generate the exact results forFinally, the system refines the result superset to generate the exact results for

the query location.the query location.

Page 16: JA 6022.  MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P

8/7/2019 JA 6022. MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P

http://slidepdf.com/reader/full/ja-6022-mobile-implementation-of-location-based-queries-with-ensured-p 16/22

Page 17: JA 6022.  MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P

8/7/2019 JA 6022. MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P

http://slidepdf.com/reader/full/ja-6022-mobile-implementation-of-location-based-queries-with-ensured-p 17/22

Page 18: JA 6022.  MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P

8/7/2019 JA 6022. MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P

http://slidepdf.com/reader/full/ja-6022-mobile-implementation-of-location-based-queries-with-ensured-p 18/22

Page 19: JA 6022.  MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P

8/7/2019 JA 6022. MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P

http://slidepdf.com/reader/full/ja-6022-mobile-implementation-of-location-based-queries-with-ensured-p 19/22

3. System S pecification3. System S pecification

3.1 Software S pecifications3.1 Software S pecifications Java1.6 or More Java1.6 or More

 J2ME J2ME

 Windows xp Windows xp

MSMS--SQL ServerSQL Server

Page 20: JA 6022.  MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P

8/7/2019 JA 6022. MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P

http://slidepdf.com/reader/full/ja-6022-mobile-implementation-of-location-based-queries-with-ensured-p 20/22

3.2 Hardware S pecifications3.2 Hardware S pecifications

Hard disk Hard disk :: 40 GB40 GB RAMRAM :: 128mb128mb

ProcessorProcessor :: PentiumPentium

Page 21: JA 6022.  MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P

8/7/2019 JA 6022. MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P

http://slidepdf.com/reader/full/ja-6022-mobile-implementation-of-location-based-queries-with-ensured-p 21/22

 The representation of cloaking regions and The representation of cloaking regions andcircular region leads to a small result superset.circular region leads to a small result superset.

Developed a mobility aware location cloaking Developed a mobility aware location cloaking technique to resist trace analysis attack.technique to resist trace analysis attack.

 The progressive query processing algorithm The progressive query processing algorithmgenerally achieves shorter response time thangenerally achieves shorter response time than

the bulk algorithm.the bulk algorithm.

CONCLUSION:CONCLUSION:

Page 22: JA 6022.  MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P

8/7/2019 JA 6022. MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P

http://slidepdf.com/reader/full/ja-6022-mobile-implementation-of-location-based-queries-with-ensured-p 22/22

REFERENCESREFERENCES

[1] B. Bamba, L. Liu, P. Pesti, and T. Wang, ´Supporting Anonymous Location Queries in Mobile[1] B. Bamba, L. Liu, P. Pesti, and T. Wang, ´Supporting Anonymous Location Queries in MobileEnvironments with Privacygrid,µ Proc. Int·l World Wide Web Conf. (WWW), 2008.Environments with Privacygrid,µ Proc. Int·l World Wide Web Conf. (WWW), 2008.

[ 2 ] C. Bettini, S. Mascetti, X.S. Wang, and S. Jajodia, ´Anonymity in Location[ 2 ] C. Bettini, S. Mascetti, X.S. Wang, and S. Jajodia, ´Anonymity in Location--Based Services: Towards aBased Services: Towards aGeneral Framework,µ Proc. Eighth Int·l Conf. Mobile Data Management (MDM), May 2007.General Framework,µ Proc. Eighth Int·l Conf. Mobile Data Management (MDM), May 2007.

[3] S. Berchtold, C. Bo[3] S. Berchtold, C. Bo¨̈hm, D.A. Keim, F. Krebs, and H.hm, D.A. Keim, F. Krebs, and H.--P. Kriegel, ´On Optimizing Nearest NeighborP. Kriegel, ´On Optimizing Nearest NeighborQueries in HighQueries in High--Dimensional Data Spaces,µ Proc. Int·l Conf. Database Theory (ICDT), 2001.Dimensional Data Spaces,µ Proc. Int·l Conf. Database Theory (ICDT), 2001.

[4] A.R. Beresford and F. Stajano, ´Location Privacy in Pervasive Computing,µ IEEE Pervasive Computing,[4] A.R. Beresford and F. Stajano, ´Location Privacy in Pervasive Computing,µ IEEE Pervasive Computing,

 vol.2

, no. 1, pp. 46 vol.2

, no. 1, pp. 46--55, Jan.55, Jan.--Mar.2

003.Mar.2

003. [5] R. Cheng, Y. Zhang, E. Bertino, and S. Prabhakar, ´Preserving User Location Privacy in Mobile Data[5] R. Cheng, Y. Zhang, E. Bertino, and S. Prabhakar, ´Preserving User Location Privacy in Mobile Data

Management Infrastructures,µ Proc. Privacy Enhancing Technology Workshop, June 2006.Management Infrastructures,µ Proc. Privacy Enhancing Technology Workshop, June 2006.

[6] C.[6] C.--Y. Chow, M.F. Mokbel, and X. Liu, ´A Peer Y. Chow, M.F. Mokbel, and X. Liu, ´A Peer--toto--Peer Spatial Cloaking Algorithm for AnonymousPeer Spatial Cloaking Algorithm for AnonymousLocationLocation--Based Services,µ Proc. ACM Int·l Symp. Advances in Geographic Information Systems (GIS), 2006.Based Services,µ Proc. ACM Int·l Symp. Advances in Geographic Information Systems (GIS), 2006.

[7] J. Du, J. Xu, X. Tang, and H. Hu, ´iPDA: Supporting Privacy [7] J. Du, J. Xu, X. Tang, and H. Hu, ´iPDA: Supporting Privacy-- Preserving LocationPreserving Location--Based Mobile ServicesBased Mobile Services(Demonstration),µ Proc. Eighth Int·l Conf. Mobile Data Management (MDM), May 2007.(Demonstration),µ Proc. Eighth Int·l Conf. Mobile Data Management (MDM), May 2007.

[ 8 ] G. Myles, A. Friday, and N. Davies, ´Preserving Privacy in Environments with Location[ 8 ] G. Myles, A. Friday, and N. Davies, ´Preserving Privacy in Environments with Location--BasedBased Applications,µ IEEE Pervasive Computing, vol. 2, no. 1, pp. 56 Applications,µ IEEE Pervasive Computing, vol. 2, no. 1, pp. 56--64, Jan.64, Jan.--Mar. 2003.Mar. 2003.