JA 6022. MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P
Transcript of JA 6022. MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P
8/7/2019 JA 6022. MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P
http://slidepdf.com/reader/full/ja-6022-mobile-implementation-of-location-based-queries-with-ensured-p 1/22
SECURE LOCATION BASED QUERY SECURE LOCATION BASED QUERY
OPTIMIZATION USING MOBILEOPTIMIZATION USING MOBILE
BY,BY,
K.ANANDHA KUMARI REG NO.10907104005K.ANANDHA KUMARI REG NO.10907104005
T.P.DHIVYA REG NO.10907104017 T.P.DHIVYA REG NO.10907104017
G.NARMADHA REG NO.10907104053G.NARMADHA REG NO.10907104053
GUIDED BY,GUIDED BY,
Mr.Mr. AMALORPA VALARAJ.I
BATCH NO:8
8/7/2019 JA 6022. MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P
http://slidepdf.com/reader/full/ja-6022-mobile-implementation-of-location-based-queries-with-ensured-p 2/22
Abstract Abstract
In locationIn location--based services, users with locationbased services, users with location--awareaware
mobile devices are able to make queries about theirmobile devices are able to make queries about their
surroundings anywhere and at any time. While thissurroundings anywhere and at any time. While this
ubiquitous computing paradigm brings greatubiquitous computing paradigm brings greatconvenience for information access, it also raisesconvenience for information access, it also raises
concerns over potential intrusion into user locationconcerns over potential intrusion into user location
privacy.privacy.
To protect location privacy, one typical approach is to To protect location privacy, one typical approach is tocloak user locations into spatial regions based on usercloak user locations into spatial regions based on user--
specified privacy requirements, and to transformspecified privacy requirements, and to transform
locationlocation--based queries into regionbased queries into region--based queries.based queries.
8/7/2019 JA 6022. MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P
http://slidepdf.com/reader/full/ja-6022-mobile-implementation-of-location-based-queries-with-ensured-p 3/22
In this paper, we identify and address three new issuesIn this paper, we identify and address three new issuesconcerning this location cloaking approach.concerning this location cloaking approach.
First, we study the representation of cloaking regionsFirst, we study the representation of cloaking regionsand show that a circular region generally leads to aand show that a circular region generally leads to asmall result size for regionsmall result size for region--based queries.based queries.
Second, we develop a mobility Second, we develop a mobility--aware location cloaking aware location cloaking technique to resist trace analysis attacks.technique to resist trace analysis attacks.
Two cloaking algorithms, namely MaxAccu_Cloak and Two cloaking algorithms, namely MaxAccu_Cloak andMinComm_Cloak.MinComm_Cloak.
Finally, we develop an efficient polynomial algorithmFinally, we develop an efficient polynomial algorithmfor evaluating circularfor evaluating circular--regionregion--based kNN queries. Twobased kNN queries. Two
query processing odes, namely bulk and progressive, arequery processing odes, namely bulk and progressive, arepresented to return query results either all at once or inpresented to return query results either all at once or inan incremental manner.an incremental manner.
8/7/2019 JA 6022. MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P
http://slidepdf.com/reader/full/ja-6022-mobile-implementation-of-location-based-queries-with-ensured-p 4/22
Experimental results show that our proposedExperimental results show that our proposedmobility mobility--aware cloaking algorithms significantly aware cloaking algorithms significantly improve the quality of location cloaking in terms of improve the quality of location cloaking in terms of an entropy measure without compromising much onan entropy measure without compromising much onquery latency or communication cost.query latency or communication cost.
Moreover, the progressive query processing modeMoreover, the progressive query processing modeachieves a shorter response time than the bulk modeachieves a shorter response time than the bulk modeby parallelizing the query evaluation and resultby parallelizing the query evaluation and result
transmission.transmission.
8/7/2019 JA 6022. MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P
http://slidepdf.com/reader/full/ja-6022-mobile-implementation-of-location-based-queries-with-ensured-p 5/22
2. System Study 2. System Study
2.1 Existing System2.1 Existing System In existing system though we have many web sitesIn existing system though we have many web sites
portal, and through high end mobile phones or PDAsportal, and through high end mobile phones or PDAs
we can get information about the needed sometimes. we can get information about the needed sometimes. But these systems are not available to all and not allBut these systems are not available to all and not all
time. And also, this information does not reach peopletime. And also, this information does not reach peopleat the time of emergencies.at the time of emergencies.
It cannot be accessed by people who don·t know toIt cannot be accessed by people who don·t know toaccess the device. Other wise we have to make a call toaccess the device. Other wise we have to make a call tosome one or to make an enquiry to know about thesome one or to make an enquiry to know about thecurrent location.current location.
8/7/2019 JA 6022. MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P
http://slidepdf.com/reader/full/ja-6022-mobile-implementation-of-location-based-queries-with-ensured-p 6/22
PROBLEMS DEFINED:PROBLEMS DEFINED:
It fails to produce privacy for user.It fails to produce privacy for user.
Takes more time to access. Takes more time to access.
Not available for user at all the time.Not available for user at all the time.
8/7/2019 JA 6022. MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P
http://slidepdf.com/reader/full/ja-6022-mobile-implementation-of-location-based-queries-with-ensured-p 7/22
Proposed SystemProposed System
2.2 Proposed System2.2 Proposed System Proposed system prov ides more easy and efficient way to getProposed system prov ides more easy and efficient way to get
answer about the location and other related queries v ia SMS. In thisanswer about the location and other related queries v ia SMS. In this
system we can get the answer
abou
t What, When, and ho w thesystem we can get the answe
rabou
t What, When, and ho w thequeries are. To use this system, there is no need of using any extraqueries are. To use this system, there is no need of using any extra
de v ices or searching in websites. Thus it is used by people who arede v ices or searching in websites. Thus it is used by people who are
li v ing in rural areas also.li v ing in rural areas also.
Some ad v antages areSome ad v antages are
Easy to accessEasy to access
Prov ide inf ormation as fastProv ide inf ormation as fast
Kee p the user inf ormation confidentiallyKee p the user inf ormation confidentially
8/7/2019 JA 6022. MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P
http://slidepdf.com/reader/full/ja-6022-mobile-implementation-of-location-based-queries-with-ensured-p 8/22
System ArchitectureSystem Architecture
Response to the user
(The current location of the user)
Location Based ServicesServer
Locationcloaking Agent
8/7/2019 JA 6022. MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P
http://slidepdf.com/reader/full/ja-6022-mobile-implementation-of-location-based-queries-with-ensured-p 9/22
User
Type Query
Send SMS
Location cloaking agentreceives the query and passes
to LBS process Query
Stop
Location cloaking agent SendResult
User Get Location Information
Dataflow Diagram
8/7/2019 JA 6022. MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P
http://slidepdf.com/reader/full/ja-6022-mobile-implementation-of-location-based-queries-with-ensured-p 10/22
ModulesModules
SMS moduleSMS module
Location cloaking agentLocation cloaking agent LBS serverLBS server
8/7/2019 JA 6022. MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P
http://slidepdf.com/reader/full/ja-6022-mobile-implementation-of-location-based-queries-with-ensured-p 11/22
DFD:
User LBS Mobile
Login and
registration
Level 0- login and registration
modulel
8/7/2019 JA 6022. MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P
http://slidepdf.com/reader/full/ja-6022-mobile-implementation-of-location-based-queries-with-ensured-p 12/22
SMS MODULESMS MODULE
This module acts as a User interface between the user This module acts as a User interface between the userand the LBS server.and the LBS server.
If the user wants to know any particular center, mall orIf the user wants to know any particular center, mall orany organization form a particular location, they canany organization form a particular location, they cansimply sends the query to the LBS server.simply sends the query to the LBS server.
The user can select the place and send his direction like The user can select the place and send his direction like
forward or backward to the place as a inputforward or backward to the place as a input
8/7/2019 JA 6022. MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P
http://slidepdf.com/reader/full/ja-6022-mobile-implementation-of-location-based-queries-with-ensured-p 13/22
8/7/2019 JA 6022. MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P
http://slidepdf.com/reader/full/ja-6022-mobile-implementation-of-location-based-queries-with-ensured-p 14/22
8/7/2019 JA 6022. MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P
http://slidepdf.com/reader/full/ja-6022-mobile-implementation-of-location-based-queries-with-ensured-p 15/22
Location cloaking agentLocation cloaking agent
Location cloaking is one typical approach to protecting user location privacy Location cloaking is one typical approach to protecting user location privacy in LBS.in LBS.
Upon receiving a locationUpon receiving a location--based spatial query (e.g., a range query or a kNNbased spatial query (e.g., a range query or a kNNquery) from the user, the system cloaks the user·s current location into aquery) from the user, the system cloaks the user·s current location into a
cloaking region based on the user·s privacy requirement.cloaking region based on the user·s privacy requirement. The location The location--based spatial query is, thus, transformed into a regionbased spatial query is, thus, transformed into a region--basedbased
spatial query before being sent to the LBS server. The LBS server thenspatial query before being sent to the LBS server. The LBS server thenevaluates the regionevaluates the region--based query and returns a result superset, which containsbased query and returns a result superset, which containsthe query results for all possible location points in the cloaking region.the query results for all possible location points in the cloaking region.
Finally, the system refines the result superset to generate the exact results forFinally, the system refines the result superset to generate the exact results for
the query location.the query location.
8/7/2019 JA 6022. MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P
http://slidepdf.com/reader/full/ja-6022-mobile-implementation-of-location-based-queries-with-ensured-p 16/22
8/7/2019 JA 6022. MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P
http://slidepdf.com/reader/full/ja-6022-mobile-implementation-of-location-based-queries-with-ensured-p 17/22
8/7/2019 JA 6022. MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P
http://slidepdf.com/reader/full/ja-6022-mobile-implementation-of-location-based-queries-with-ensured-p 18/22
8/7/2019 JA 6022. MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P
http://slidepdf.com/reader/full/ja-6022-mobile-implementation-of-location-based-queries-with-ensured-p 19/22
3. System S pecification3. System S pecification
3.1 Software S pecifications3.1 Software S pecifications Java1.6 or More Java1.6 or More
J2ME J2ME
Windows xp Windows xp
MSMS--SQL ServerSQL Server
8/7/2019 JA 6022. MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P
http://slidepdf.com/reader/full/ja-6022-mobile-implementation-of-location-based-queries-with-ensured-p 20/22
3.2 Hardware S pecifications3.2 Hardware S pecifications
Hard disk Hard disk :: 40 GB40 GB RAMRAM :: 128mb128mb
ProcessorProcessor :: PentiumPentium
8/7/2019 JA 6022. MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P
http://slidepdf.com/reader/full/ja-6022-mobile-implementation-of-location-based-queries-with-ensured-p 21/22
The representation of cloaking regions and The representation of cloaking regions andcircular region leads to a small result superset.circular region leads to a small result superset.
Developed a mobility aware location cloaking Developed a mobility aware location cloaking technique to resist trace analysis attack.technique to resist trace analysis attack.
The progressive query processing algorithm The progressive query processing algorithmgenerally achieves shorter response time thangenerally achieves shorter response time than
the bulk algorithm.the bulk algorithm.
CONCLUSION:CONCLUSION:
8/7/2019 JA 6022. MOBILE IMPLEMENTATION OF LOCATION BASED QUERIES WITH ENSURED P
http://slidepdf.com/reader/full/ja-6022-mobile-implementation-of-location-based-queries-with-ensured-p 22/22
REFERENCESREFERENCES
[1] B. Bamba, L. Liu, P. Pesti, and T. Wang, ´Supporting Anonymous Location Queries in Mobile[1] B. Bamba, L. Liu, P. Pesti, and T. Wang, ´Supporting Anonymous Location Queries in MobileEnvironments with Privacygrid,µ Proc. Int·l World Wide Web Conf. (WWW), 2008.Environments with Privacygrid,µ Proc. Int·l World Wide Web Conf. (WWW), 2008.
[ 2 ] C. Bettini, S. Mascetti, X.S. Wang, and S. Jajodia, ´Anonymity in Location[ 2 ] C. Bettini, S. Mascetti, X.S. Wang, and S. Jajodia, ´Anonymity in Location--Based Services: Towards aBased Services: Towards aGeneral Framework,µ Proc. Eighth Int·l Conf. Mobile Data Management (MDM), May 2007.General Framework,µ Proc. Eighth Int·l Conf. Mobile Data Management (MDM), May 2007.
[3] S. Berchtold, C. Bo[3] S. Berchtold, C. Bo¨̈hm, D.A. Keim, F. Krebs, and H.hm, D.A. Keim, F. Krebs, and H.--P. Kriegel, ´On Optimizing Nearest NeighborP. Kriegel, ´On Optimizing Nearest NeighborQueries in HighQueries in High--Dimensional Data Spaces,µ Proc. Int·l Conf. Database Theory (ICDT), 2001.Dimensional Data Spaces,µ Proc. Int·l Conf. Database Theory (ICDT), 2001.
[4] A.R. Beresford and F. Stajano, ´Location Privacy in Pervasive Computing,µ IEEE Pervasive Computing,[4] A.R. Beresford and F. Stajano, ´Location Privacy in Pervasive Computing,µ IEEE Pervasive Computing,
vol.2
, no. 1, pp. 46 vol.2
, no. 1, pp. 46--55, Jan.55, Jan.--Mar.2
003.Mar.2
003. [5] R. Cheng, Y. Zhang, E. Bertino, and S. Prabhakar, ´Preserving User Location Privacy in Mobile Data[5] R. Cheng, Y. Zhang, E. Bertino, and S. Prabhakar, ´Preserving User Location Privacy in Mobile Data
Management Infrastructures,µ Proc. Privacy Enhancing Technology Workshop, June 2006.Management Infrastructures,µ Proc. Privacy Enhancing Technology Workshop, June 2006.
[6] C.[6] C.--Y. Chow, M.F. Mokbel, and X. Liu, ´A Peer Y. Chow, M.F. Mokbel, and X. Liu, ´A Peer--toto--Peer Spatial Cloaking Algorithm for AnonymousPeer Spatial Cloaking Algorithm for AnonymousLocationLocation--Based Services,µ Proc. ACM Int·l Symp. Advances in Geographic Information Systems (GIS), 2006.Based Services,µ Proc. ACM Int·l Symp. Advances in Geographic Information Systems (GIS), 2006.
[7] J. Du, J. Xu, X. Tang, and H. Hu, ´iPDA: Supporting Privacy [7] J. Du, J. Xu, X. Tang, and H. Hu, ´iPDA: Supporting Privacy-- Preserving LocationPreserving Location--Based Mobile ServicesBased Mobile Services(Demonstration),µ Proc. Eighth Int·l Conf. Mobile Data Management (MDM), May 2007.(Demonstration),µ Proc. Eighth Int·l Conf. Mobile Data Management (MDM), May 2007.
[ 8 ] G. Myles, A. Friday, and N. Davies, ´Preserving Privacy in Environments with Location[ 8 ] G. Myles, A. Friday, and N. Davies, ´Preserving Privacy in Environments with Location--BasedBased Applications,µ IEEE Pervasive Computing, vol. 2, no. 1, pp. 56 Applications,µ IEEE Pervasive Computing, vol. 2, no. 1, pp. 56--64, Jan.64, Jan.--Mar. 2003.Mar. 2003.