Privacy Preserving Procedure for Reporting Region Based Activity Summaries

Authors(2) :-S. Sumiya Sultana, Dr. P. Kuppusamy

Location-based services (LBS) need users to incessantly report their location to a probably untrusted server to get services supported their location, which might expose them to privacy risks. Unfortunately, existing privacy-preserving techniques for LBS have many limitations, like requiring a fully-trusted third party, providing restricted privacy guarantees and acquisition high communication overhead. In this paper, we propose a user defined privacy grid model known as dynamic grid system(DGS), the primary holistic system that accomplish four important needs for privacy-preserving snapshot and continuous LBS. (1) the system solely needs a semi-trusted third party, liable for finishing up straightforward matching operations properly. This semi-trusted third party doesn't have any data a few usersí location. (2) Secure photo and continuous location privacy is secure under our outlined somebody models. (3) The communication price for the user doesn't depend upon the userís desired privacy level; it solely depends on the quantity of relevant points of interest within the neighborhood of the user. (4) though we tend to solely concentrate on vary and k-nearest-neighbor queries during this work, our system will be simply extended to support different spacial queries while not dynamical the algorithms pass the semi-trusted Third party and also the info server provided the desired search space of a spacial question will be abstracted into spacial regions Experimental results show that our DGS is a lot of economical than the progressive privacy-preserving technique for continuous LBS.

Authors and Affiliations

S. Sumiya Sultana
PG Student. Department of Computer Science & Engg. Madanapalle Institute of Technology & Science, Madanapalle, Andhra Pradesh, India
Dr. P. Kuppusamy
Associate Professor. Department of ComputerScience & Engg. Madanapalle Institute of Technology & Science, Madanapalle, Andhra Pradesh, India

Location Based Services, Communication, Service Provider.

  1. B. Bamba, L. Liu, P. Pesti, and T.Wang, "Supporting anonymous location queries in mobile environments with PrivacyGrid," in WWW, 2008.
  2. C.-Y. Chow and M. F. Mokbel, "Enabling private continuous queries for revealed user locations," in SSTD, 2007.
  3. B. Gedik and L. Liu, "Protecting location privacy with personalized kanonymity: Architecture and algorithms," IEEE TMC, vol. 7, no. 1, pp. 1-18, 2008.
  4. M. Gruteser and D. Grunwald, "Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking," in ACM MobiSys, 2003.
  5. P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias, "Preventing location-based identity inference in anonymous spatial queries," IEEE TKDE, vol. 19, no. 12, pp. 1719-1733, 2007.
  6. M. F. Mokbel, C.-Y. Chow, and W. G. Aref, "The new Casper: Query processing for location services without compromising privacy," in VLDB, 2006.
  7. T. Xu and Y. CAI, "Location anonymity in continuous location-based services," in ACM GIS, 2007.
  8. "Exploring historical location data for anonymity preservation in location-based services," in IEEE INFOCOM, 2008.
  9. G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K.-L. Tan, "Private queries in location based services: Anonymizers are not necessary," in ACM SIGMOD, 2008.
  10. M. Kohlweiss, S. Faust, L. Fritsch, B. Gedrojc, and B. Preneel, "Efficient oblivious augmented maps: Location-based services with a payment broker," in PET, 2007.
  11. R. Vishwanathan and Y. Huang, "A two-level protocol to answer private location-based queries," in ISI, 2009.
  12. J.M. Kang,M. F.Mokbel, S. Shekhar, T. Xia, and D. Zhang, "Continuous evaluation of monochromatic and bichromatic reverse nearest neighbors," in IEEE ICDE, 2007.
  13. C. S. Jensen, D. Lin, B. C. Ooi, and R. Zhang, "Effective density queries of continuously moving objects," in IEEE ICDE, 2006.
  14. S. Wang and X. S. Wang, "AnonTwist: Nearest neighbor querying with both location privacy and k-anonymity for mobile users," in MDM, 2009. 15W. B. Allshouse,W. B. Allshousea,M. K. Fitchb, K. H. Hamptonb, D. C. Gesinkc, I. A. Dohertyd, P. A. Leonebd, M. L. Serrea, andW. C. Millerb, "Geomasking sensitive health data and privacy protection: an evaluation using an E911 database," Geocarto International, vol. 25, pp. 443-452, October 2010.
  15. A. Gkoulalas-Divanis, P. Kalnis, and V. S. Verykios, "Providing kanonymity in location based services," SIGKDD Explor. Newsl. vol. 12, pp. 3-10, November 2010.
  16. D. Boneh and M. K. Franklin, "Identity-based encryption from the weil pairing," in CRYPTO, 2001.
  17. A. Menezes, M. Qu, and S. Vanstone, "Some new key agreement protocols providing mutual implicit authentication," in SAC, 1995.
  18. S. Yau and H. An, "Anonymous service usage and payment in servicebased systems," in IEEE HPCC, 2011, pp. 714-720.
  19. M. Balakrishnan, I. Mohomed, and V. Ramasubramanian, "Where’s that phone?: Geolocating ip addresses on 3G networks," in ACM SIGCOMM IMC, 2009.
  20. R. Dingledine, N. Mathewson, and P. Syverson, "Tor: the secondgeneration onion router," in USENIX Security, 2004.
  21. G. Bissias, M. Liberatore, D. Jensen, and B. Levine, "Privacy vulnerabilities in encrypted HTTP streams," in PET, 2006.
  22. P. Golle and K. Partridge, "On the anonymity of home/work location pairs," in Pervasive Computing, 2009.
  23. IEEE, P1363-2000: Standard Specifications for Public-Key Cryptography, 2000.
  24. A. B. Lewko and B. Waters, "Efficient pseudorandom functions from the decisional linear assumption and weaker variants," in ACM CCS, 2009.

Publication Details

Published in : Volume 2 | Issue 5 | September-October 2017
Date of Publication : 2017-10-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 814-819
Manuscript Number : CSEIT1725188
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

S. Sumiya Sultana, Dr. P. Kuppusamy, "Privacy Preserving Procedure for Reporting Region Based Activity Summaries", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 5, pp.814-819, September-October-2017.
Journal URL : http://ijsrcseit.com/CSEIT1725188

Article Preview

Follow Us

Contact Us