GLOBALSOFT TECHNOLOGIES 
IEEE PROJECTS & SOFTWARE DEVELOPMENTS 
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE 
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS 
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmai l.com 
Preserving Location Privacy in Geosocial Applications 
ABSTRACT: 
Using geosocial applications, such as FourSquare, millions of people interact with 
their surroundings through their friends and their recommendations. Without 
adequate privacy protection, however, these systems can be easily misused, for 
example, to track users or target them for home invasion. In this paper, we 
introduce LocX, a novel alternative that provides significantly improvedlocation 
privacy without adding uncertainty into query results or relying on strong 
assumptions about server security. Our key insight is to apply secure user-specific, 
distance-preserving coordinate transformations to all location data shared with the 
server. The friends of a user share this user’s secrets so they can apply the same 
transformation. This allows all location queries to be evaluated correctly by the 
server, but our privacy mechanisms guarantee that servers are unable to see or infer 
the actual location data from the transformed data or from the data access. We 
show that LocX provides privacy even against a powerful adversary model, and we 
use prototype measurements to show that it provides privacy with very little 
performance overhead, making it suitable for today’s mobile devices.
EXISTING SYSTEM: 
Existing systems have mainly taken three approaches to improving user privacy in 
geosocial systems: 
 Introducing uncertainty or error into location data. 
 Relying on trusted servers or intermediaries to apply anonymization to user 
identities and private data. 
 Relying on heavy-weight cryptographic or private information retrieval 
(PIR) techniques. 
None of them, however, have proven successful on current application platforms. 
Techniques using the first approach fall short because they require both users and 
application providers to introduce uncertainty into their data, which degrades the 
quality of application results returned to the user. In this approach, there is a 
fundamental tradeoff between the amount of error introduced into the time or 
location domain, and the amount of privacy granted to the user. Users dislike the 
loss of accuracy in results, and application providers have a natural disincentive to 
hide user data from themselves, which reduces their ability to monetize the data. 
The second approach relies on the trusted proxies or servers in the system to 
protect user privacy. This is a risky assumption, since private data can be exposed 
by either software bugs and configuration errors at the trusted servers or by 
malicious administrators. Finally, relying on heavy-weight cryptographic 
mechanisms to obtain provable privacy guarantees are too expensive to deploy on 
mobile devices and even on the servers in answering queries such as nearest 
neighbor and range queries.
DISADVANTAGES OF EXISTING SYSTEM: 
 Location data privacy. The servers should not be able to view the content of 
data stored at a location. 
 This new functionality comes with significantly increased risks to personal 
privacy. 
PROPOSED SYSTEM: 
In this paper, we propose LocX(short for location to index mapping), a novel 
approach to achieving user privacy while maintaining full accuracy in location-based 
social applications (LBSAs from here on ward). Our insight is that many 
services do not need to resolve distance-based queries between arbitrary pairs of 
users, but only between friends interested in each other’s locations and data. Thus, 
we can partition location data based on users’ social groups, and then perform 
transformations on the location coordinates before storing them on untrusted 
servers. A user knows the transformation keys of all her friends, allowing her to 
transform her query into the virtual coordinate system that her friends use. Our 
coordinate transformations preserve distance metrics, allowing an application 
server to perform both point and nearest-neighbor queries correctly on transformed 
data. However, the transformation is secure, in that transformed values cannot be 
easily associated with real-world locations without a secret, which is only available 
to the members of the social group. Finally, transformations are efficient, in that 
they incur minimal overhead on the LBSAs. This makes the applications built on 
LocX lightweight and suitable for running on today’s mobile devices.
ADVANTAGES OF PROPOSED SYSTEM: 
 Our goal is to support both query types in an efficient fashion, suitable for 
today’s mobile devices. 
 Flexibility to support point, circular range, and nearest-neighbor queries on 
location data. 
 Strong location privacy. The servers processing the data (and the 
administrators of these servers) should not be able to learn the history of 
locations that a user has visited. 
SYSTEM ARCHITECTURE: 
SYSTEM REQUIREMENTS: 
HARDWARE REQUIREMENTS: 
 System : Pentium IV 2.4 GHz.
 Hard Disk : 40 GB. 
 Floppy Drive : 1.44 Mb. 
 Monitor : 15 VGA Colour. 
 Mouse : Logitech. 
 Ram : 512 Mb. 
SOFTWARE REQUIREMENTS: 
 Operating system : Windows XP/7. 
 Coding Language : ASP.net, C#.net 
 Tool : Visual Studio 2010 
 Database : SQL SERVER 2008 
REFERENCE: 
Krishna P.N. Puttaswamy, Shiyuan Wang, Troy Steinbauer, Divyakant Agrawal, 
Fellow, IEEE, Amr El Abbadi, Christopher Kruegel, and Ben Y. 
Zhao,“Preserving Location Privacy in Geosocial Applications”, IEEE 
TRANSACTIONS ON MOBILE COMPUTING,VOL. 13,NO. 1, JANUARY 
2014.

More Related Content

DOCX
JPD1435 Preserving Location Privacy in Geosocial Applications
DOCX
IEEE 2014 JAVA DATA MINING PROJECTS Privacy preserving and content-protecting...
DOCX
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Preserving location privacy in geo s...
DOCX
JPJ1424 Privacy-Preserving and Content-Protecting Location Based Queries
PPTX
Lecture 12
PPTX
Oruta phase1 ppt
DOCX
Sensitive label privacy protection on social
PDF
Personam Solution - How it Works Brief
JPD1435 Preserving Location Privacy in Geosocial Applications
IEEE 2014 JAVA DATA MINING PROJECTS Privacy preserving and content-protecting...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Preserving location privacy in geo s...
JPJ1424 Privacy-Preserving and Content-Protecting Location Based Queries
Lecture 12
Oruta phase1 ppt
Sensitive label privacy protection on social
Personam Solution - How it Works Brief

What's hot (7)

PPTX
Crime security.
PPTX
Context aware applications
DOCX
Terrance A. 10.20.15
PDF
UbiComp2011: ContextCapture (Poster)
PPTX
Macro and micro aspects in RE for AOSE
DOCX
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...
DOCX
Security analysis of a privacy preserving decentralized key-policy attribute-...
Crime security.
Context aware applications
Terrance A. 10.20.15
UbiComp2011: ContextCapture (Poster)
Macro and micro aspects in RE for AOSE
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...
Security analysis of a privacy preserving decentralized key-policy attribute-...
Ad

Similar to 2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geosocial-applications (20)

DOCX
preserving location privacy in geosocial applications
DOCX
2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...
DOCX
2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...
PDF
Securing Location of User in Geo Social Networking
PDF
Preserving location privacy in geo social applications
PPTX
Seminar
DOCX
JPJ1437 Exploiting Service Similarity for Privacy in Location-Based Search Q...
PDF
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...
DOCX
Preserving location privacy in geo social applications
DOC
azd document
PDF
A survey on hiding user privacy in location based services through clustering
PDF
Exploiting Service Similarity for Privacy in Location Based Search Queries
PDF
Need a project proposal for my computer science 3 course. I dont eve.pdf
DOCX
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...
DOCX
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...
PDF
H017665256
PDF
Privacy - Preserving Reputation with Content Protecting Location Based Queries
DOCX
Hiding in the mobile crowd location privacy through collaboration
DOCX
exploiting service similarity for privacy in location-based search queries
PDF
Privacy Preservation And Data Security In Location Based Services
preserving location privacy in geosocial applications
2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...
Securing Location of User in Geo Social Networking
Preserving location privacy in geo social applications
Seminar
JPJ1437 Exploiting Service Similarity for Privacy in Location-Based Search Q...
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...
Preserving location privacy in geo social applications
azd document
A survey on hiding user privacy in location based services through clustering
Exploiting Service Similarity for Privacy in Location Based Search Queries
Need a project proposal for my computer science 3 course. I dont eve.pdf
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...
H017665256
Privacy - Preserving Reputation with Content Protecting Location Based Queries
Hiding in the mobile crowd location privacy through collaboration
exploiting service similarity for privacy in location-based search queries
Privacy Preservation And Data Security In Location Based Services
Ad

More from IEEEFINALYEARSTUDENTSPROJECTS (11)

PDF
2014 2015 ieee dotnet projects globalsoft technologies
PDF
2014 2015 ieee java projects globalsoft technologies
DOCX
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Smartdc mobility prediction based a...
DOCX
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Autonomous mobile-mesh-networks
DOCX
2014 IEEE DOTNET MOBILE COMPUTING PROJECT A qos-oriented-distributed-routing-...
DOCX
2014 IEEE JAVA MOBILE COMPUTING PROJECT TokenMac a fair mac protocol for pass...
DOCX
2014 IEEE JAVA MOBILE COMPUTING PROJECT Tag sense leveraging smartphones for ...
DOCX
2014 IEEE JAVA MOBILE COMPUTING PROJECT Energy optimum throughput and carrier...
DOCX
2014 IEEE JAVA MOBILE COMPUTING PROJECT Efficient and privacy aware data aggr...
DOCX
2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...
DOCX
2014 IEEE JAVA MOBILE COMPUTING PROJECT A low complexity algorithm for neighb...
2014 2015 ieee dotnet projects globalsoft technologies
2014 2015 ieee java projects globalsoft technologies
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Smartdc mobility prediction based a...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Autonomous mobile-mesh-networks
2014 IEEE DOTNET MOBILE COMPUTING PROJECT A qos-oriented-distributed-routing-...
2014 IEEE JAVA MOBILE COMPUTING PROJECT TokenMac a fair mac protocol for pass...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Tag sense leveraging smartphones for ...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Energy optimum throughput and carrier...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Efficient and privacy aware data aggr...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...
2014 IEEE JAVA MOBILE COMPUTING PROJECT A low complexity algorithm for neighb...

Recently uploaded (20)

PPTX
SE unit 1.pptx by d.y.p.akurdi aaaaaaaaaaaa
PPTX
Environmental studies, Moudle 3-Environmental Pollution.pptx
PPTX
SE unit 1.pptx aaahshdhajdviwhsiehebeiwheiebeiev
PDF
MACCAFERRY GUIA GAVIONES TERRAPLENES EN ESPAÑOL
PDF
IAE-V2500 Engine Airbus Family A319/320
PDF
Lesson 3 .pdf
PDF
Research on ultrasonic sensor for TTU.pdf
PPTX
Module1.pptxrjkeieuekwkwoowkemehehehrjrjrj
PPTX
CNS - Unit 1 (Introduction To Computer Networks) - PPT (2).pptx
PPTX
Software-Development-Life-Cycle-SDLC.pptx
PPTX
chapter 1.pptx dotnet technology introduction
PDF
[jvmmeetup] next-gen integration with apache camel and quarkus.pdf
PDF
Mechanics of materials week 2 rajeshwari
DOCX
An investigation of the use of recycled crumb rubber as a partial replacement...
PPTX
Wireless sensor networks (WSN) SRM unit 2
PPTX
Environmental studies, Moudle 3-Environmental Pollution.pptx
PPTX
Unit IImachinemachinetoolopeartions.pptx
PDF
Artificial Intelligence_ Basics .Artificial Intelligence_ Basics .
PDF
CELDAS DE COMBUSTIBLE TIPO MEMBRANA DE INTERCAMBIO PROTÓNICO.pdf
PPTX
WN UNIT-II CH4_MKaruna_BapatlaEngineeringCollege.pptx
SE unit 1.pptx by d.y.p.akurdi aaaaaaaaaaaa
Environmental studies, Moudle 3-Environmental Pollution.pptx
SE unit 1.pptx aaahshdhajdviwhsiehebeiwheiebeiev
MACCAFERRY GUIA GAVIONES TERRAPLENES EN ESPAÑOL
IAE-V2500 Engine Airbus Family A319/320
Lesson 3 .pdf
Research on ultrasonic sensor for TTU.pdf
Module1.pptxrjkeieuekwkwoowkemehehehrjrjrj
CNS - Unit 1 (Introduction To Computer Networks) - PPT (2).pptx
Software-Development-Life-Cycle-SDLC.pptx
chapter 1.pptx dotnet technology introduction
[jvmmeetup] next-gen integration with apache camel and quarkus.pdf
Mechanics of materials week 2 rajeshwari
An investigation of the use of recycled crumb rubber as a partial replacement...
Wireless sensor networks (WSN) SRM unit 2
Environmental studies, Moudle 3-Environmental Pollution.pptx
Unit IImachinemachinetoolopeartions.pptx
Artificial Intelligence_ Basics .Artificial Intelligence_ Basics .
CELDAS DE COMBUSTIBLE TIPO MEMBRANA DE INTERCAMBIO PROTÓNICO.pdf
WN UNIT-II CH4_MKaruna_BapatlaEngineeringCollege.pptx

2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geosocial-applications

  • 1. GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmai l.com Preserving Location Privacy in Geosocial Applications ABSTRACT: Using geosocial applications, such as FourSquare, millions of people interact with their surroundings through their friends and their recommendations. Without adequate privacy protection, however, these systems can be easily misused, for example, to track users or target them for home invasion. In this paper, we introduce LocX, a novel alternative that provides significantly improvedlocation privacy without adding uncertainty into query results or relying on strong assumptions about server security. Our key insight is to apply secure user-specific, distance-preserving coordinate transformations to all location data shared with the server. The friends of a user share this user’s secrets so they can apply the same transformation. This allows all location queries to be evaluated correctly by the server, but our privacy mechanisms guarantee that servers are unable to see or infer the actual location data from the transformed data or from the data access. We show that LocX provides privacy even against a powerful adversary model, and we use prototype measurements to show that it provides privacy with very little performance overhead, making it suitable for today’s mobile devices.
  • 2. EXISTING SYSTEM: Existing systems have mainly taken three approaches to improving user privacy in geosocial systems:  Introducing uncertainty or error into location data.  Relying on trusted servers or intermediaries to apply anonymization to user identities and private data.  Relying on heavy-weight cryptographic or private information retrieval (PIR) techniques. None of them, however, have proven successful on current application platforms. Techniques using the first approach fall short because they require both users and application providers to introduce uncertainty into their data, which degrades the quality of application results returned to the user. In this approach, there is a fundamental tradeoff between the amount of error introduced into the time or location domain, and the amount of privacy granted to the user. Users dislike the loss of accuracy in results, and application providers have a natural disincentive to hide user data from themselves, which reduces their ability to monetize the data. The second approach relies on the trusted proxies or servers in the system to protect user privacy. This is a risky assumption, since private data can be exposed by either software bugs and configuration errors at the trusted servers or by malicious administrators. Finally, relying on heavy-weight cryptographic mechanisms to obtain provable privacy guarantees are too expensive to deploy on mobile devices and even on the servers in answering queries such as nearest neighbor and range queries.
  • 3. DISADVANTAGES OF EXISTING SYSTEM:  Location data privacy. The servers should not be able to view the content of data stored at a location.  This new functionality comes with significantly increased risks to personal privacy. PROPOSED SYSTEM: In this paper, we propose LocX(short for location to index mapping), a novel approach to achieving user privacy while maintaining full accuracy in location-based social applications (LBSAs from here on ward). Our insight is that many services do not need to resolve distance-based queries between arbitrary pairs of users, but only between friends interested in each other’s locations and data. Thus, we can partition location data based on users’ social groups, and then perform transformations on the location coordinates before storing them on untrusted servers. A user knows the transformation keys of all her friends, allowing her to transform her query into the virtual coordinate system that her friends use. Our coordinate transformations preserve distance metrics, allowing an application server to perform both point and nearest-neighbor queries correctly on transformed data. However, the transformation is secure, in that transformed values cannot be easily associated with real-world locations without a secret, which is only available to the members of the social group. Finally, transformations are efficient, in that they incur minimal overhead on the LBSAs. This makes the applications built on LocX lightweight and suitable for running on today’s mobile devices.
  • 4. ADVANTAGES OF PROPOSED SYSTEM:  Our goal is to support both query types in an efficient fashion, suitable for today’s mobile devices.  Flexibility to support point, circular range, and nearest-neighbor queries on location data.  Strong location privacy. The servers processing the data (and the administrators of these servers) should not be able to learn the history of locations that a user has visited. SYSTEM ARCHITECTURE: SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.
  • 5.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7.  Coding Language : ASP.net, C#.net  Tool : Visual Studio 2010  Database : SQL SERVER 2008 REFERENCE: Krishna P.N. Puttaswamy, Shiyuan Wang, Troy Steinbauer, Divyakant Agrawal, Fellow, IEEE, Amr El Abbadi, Christopher Kruegel, and Ben Y. Zhao,“Preserving Location Privacy in Geosocial Applications”, IEEE TRANSACTIONS ON MOBILE COMPUTING,VOL. 13,NO. 1, JANUARY 2014.