Privacy Preservation Approach Using Grid Base Techniques for Mobile Users

Similar documents
Spatial Cloaking algorithm for location privacy preservation.

Dynamic Monitoring of Moving Objects: A Novel Model to Improve Efficiency, Privacy and Accuracy of the Framework

Solutions. Location-Based Services (LBS) Problem Statement. PIR Overview. Spatial K-Anonymity

Preserving Privacy & Content using Open OAuth and TTP Server for Location based Services

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack

Privacy Protected Spatial Query Processing

PERTURBED ANONYMIZATION: TWO LEVEL SMART PRIVACY FOR LBS MOBILE USERS

MobiEyes: Distributed Architecture for Location-based Services

The Area Code Tree for Nearest Neighbour Searching


A Novel Method to Estimate the Route and Travel Time with the Help of Location Based Services

International Journal of Advance Engineering and Research Development

Designing Anonymity Server based on K Optimal Principle for Privacy Preserving Protocol

Location Based Advertising and Location k- Anonymity

Toward a Distributed k-anonymity Protocol for Location Privacy

ScienceDirect. A privacy preserving technique to prevent sensitive behavior exposure in semantic location-based service

Privacy-Preserving of Check-in Services in MSNS Based on a Bit Matrix

Preserving Trajectory Privacy using Personal Data Vault

Spatial Index Keyword Search in Multi- Dimensional Database

A SURVEY ON SEARCHING SPATIO-TEXTUAL TOP K-QUERIES BY REVERSE KEYWORD

The advent of sensor, wireless, and INFORMATION DISSEMINATION. via Wireless Broadcast. By Baihua Zheng and Dik Lun Lee

A Unified Framework for Authenticating Privacy Preserving Location Based Services

DISTANCE RELATED ACCESS QUERY OPINION ON DOCUMENT CONCURRENCY (LAND)

Detect tracking behavior among trajectory data

Approximate Evaluation of Range Nearest Neighbor Queries with Quality Guarantee

ANNATTO: Adaptive Nearest Neighbor Queries in Travel Time Networks

Privacy Protected Spatial Query Processing for Advanced Location Based Services

Ad-hoc Trusted Information Exchange Scheme for Location Privacy in VANET

Efficient Windows Query Processing with. Expanded Grid Cells on Wireless Spatial Data. Broadcasting for Pervasive Computing

A Location Based Queries for Securing Content and Assuring Privacy

Research Article Nonexposure Accurate Location K-Anonymity Algorithm in LBS

Efficient Index Based Query Keyword Search in the Spatial Database

Proximity-Aware Location Based Collaborative Sensing for Energy-Efficient Mobile Devices

A Secure Location-Based Coupon Redeeming System

Combining Review Text Content and Reviewer-Item Rating Matrix to Predict Review Rating

LOCAWARD: A SECURITY AND PRIVACY AWARE LOCATION-BASED REWARDING SYSTEM

IMPROVING DATA SECURITY USING ATTRIBUTE BASED BROADCAST ENCRYPTION IN CLOUD COMPUTING

Securing Mobile System Locations by Anonymous Server Design Based on K Optimal Principle

On Semantic Caching and Query Scheduling for Mobile Nearest-Neighbor Search

Publishing CitiSense Data: Privacy Concerns and Remedies

Steps Towards Location Privacy

A Geometric Stack for Location-Aware Networking. Marco Gruteser, Rich Martin WINLAB, Rutgers University

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM

A Collaborative Approach to Enhance Security in Location Based Services by Answering Range Queries in WSN

Secure and Advanced Best Keyword Cover Search over Spatial Database

MOBILE COMPUTING 2/11/18. Location-based Services: Definition. Convergence of Technologies LBS. CSE 40814/60814 Spring 2018

Survey on Recommendation of Personalized Travel Sequence

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Privacy Preserving Location Based Services R.Bala Krishnan 1, N.Hari Prasad 2, U.Gokul 3, P.Subashini 4 1, 2, 3, 4

Coordinate Transformation A Solution for the Privacy Problem of Location Based Services?

Efficient Authentication and Congestion Control for Vehicular Ad Hoc Network

Nearest Neighbor Query in Location- Aware Mobile Ad-Hoc Network

Anonymization Mechanism for Privacy-Preserving Location Monitoring System in WSN

Location Privacy Protection for Preventing Replay Attack under Road-Network Constraints

Privacy and Accuracy Monitoring Of Spatial Queries Using Voronoi Neighbors Using Data Mining

Constructing Popular Routes from Uncertain Trajectories

Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage

Location Based Queries for Protecting Data with High SecurityUsing PIR Protocol

ISSN: (Online) Volume 4, Issue 1, January 2016 International Journal of Advance Research in Computer Science and Management Studies

arxiv: v1 [cs.cr] 8 Jun 2016

Integrating User Preference with Theft Identification and Profile Changer in LBSNs Divya. M, V.R.Balasaraswathi, A. Abirami, G.

DS595/CS525: Urban Network Analysis --Urban Mobility Prof. Yanhua Li

SDD: A Novel Technique for Enhancing Cloud Security with Self Destructing Data

Survey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud

HIDING A HIGH FRACTION OF LOCATION PRIVACY THROUGH NOVEL EPIDEMIC MODEL

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks

The New Casper: Query Processing for Location Services without Compromising Privacy

Pseudonym Based Security Architecture for Wireless Mesh Network

SmartSiren: Virus Detection and Alert for Smartphones. Jerry Cheung, Starsky Wong, Hao Yang and Songwu Lu MOBISYS 2007

MULTI - KEYWORD RANKED SEARCH OVER ENCRYPTED DATA SUPPORTING SYNONYM QUERY

Location Privacy, Its Significance and Methods to Achieve It

A Framework for detecting and avoiding location based queries to preserve content and user privacy in databases: A Review

Trusted Base Stations-Based Privacy Preserving Technique in Location-Based Services

AES and DES Using Secure and Dynamic Data Storage in Cloud

Private Queries and Trajectory Anonymization: a Dual Perspective on Location Privacy

Communication Cost of Content-Aware Mobile Database with Different Caching Approaches for M-Commerce Applications

Collaborative Caching Architecture for Continuous Query in Mobile Database

A Peer-to-Peer Spatial Cloaking Algorithm for Anonymous Location-based Services

A SpatioTemporal Placement Model for Caching Location Dependent Queries

A SpatioTemporal Placement Model for Caching Location Dependent Queries

arxiv: v2 [cs.db] 6 Nov 2010

Privacy Based Protection Mechanism for Location Data with an Accurate Service

L2P2: Location-aware Location Privacy Protection for Location-based Services

A Centralized Approaches for Location Management in Personal Communication Services Networks

An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs

Spatiotemporal Access to Moving Objects. Hao LIU, Xu GENG 17/04/2018

Location Privacy Preserving Mechanisms

Continuous Nearest Neighbor Search

Separation Shielding and Content Supporting Locus Positioned Problems

Exploring historical location data for anonymity preservation in location-based services

SPATIAL RSASSOL: IMPROVISED STRING SEARCH ON LOCATION ORIENTED SERVICES IN GRID SYSTEM

Context-Aware Services

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN

AN IMPROVED TAIPEI BUS ESTIMATION-TIME-OF-ARRIVAL (ETA) MODEL BASED ON INTEGRATED ANALYSIS ON HISTORICAL AND REAL-TIME BUS POSITION

Enhanced Management of Certificate Caching and Revocation Lists in VANET

A Hybrid Peer-to-Peer Architecture for Global Geospatial Web Service Discovery

Cryptanalysis of a Markov Chain Based User Authentication Scheme

Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs

Cover Locations: Availing Location-Based Services Without Revealing the Location

Lecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT

Transcription:

Privacy Preservation Approach Using Grid Base Techniques for Mobile Users Trupti Takale, Prof. Archana Jadhav Department of Computer Engineering, Alard College of Engineering and Management, Pune, India ABSTRACT: Location-based services (LBS) require users to continuously report their location to a potentially untrusted server to obtain services based on their location, which can expose them to privacy risks. Unfortunately, existing privacy-preserving techniques for LBS have several limitations, such as requiring a fully-trusted third party, offering limited privacy guarantees and incurring high communication overhead. In this paper, we propose a userdefined privacy grid system called dynamic grid system (DGS); the first holistic system that fulfills four essential requirements for privacy-preserving snapshot and continuous LBS. (1) the system only requires a semi-trusted third party, responsible for carrying out simple matching operations correctly. This semi-trusted third party does not have any information about a user s location. (2) Secure snapshot and continuous location privacy is guaranteed under our defined adversary models. (3) The communication cost for the user does not depend on the user s desired privacy level, it only depends on the number of relevant points of interest in the vicinity of the user. (4) Although we only focus on range and k-nearest-neighbor queries in this work, our system can be easily extended to support other spatial queries without changing the algorithms run by the semi-trusted third party and the database server, provided the required search area of a spatial query can be abstracted into spatial regions. Experimental results show that our DGS is more efficient than the state-of-the-art privacy-preserving technique for continuous LBS.. KEYWORDS: Location Based Service, Privacy Preserving, Spatial Cloaking, Peer-to-Peer, Dual-active. I. INTRODUCTION In today s world of mobility and ever-present Internet connectivity, an increasing number of people use location-based services (LBS) to request information relevant to their current locations from a variety of service providers. This can be the search for nearby points of interest (POIs) (e.g., restaurants and hotels), location aware advertising by companies, traffic information tailored to the highway and direction a user is traveling and so forth. The use of LBS, however, can reveal much more about a person to potentially untrustworthy service providers than many people would be willing to disclose. By tracking the requests of a person it is possible to build a movement profile which can reveal information about a user s work (office location), medical records (visit to specialist clinics), political views (attending political events), etc. Technological advancements in GPS-enabled devices, coupled with lower manufacturing costs, has resulted in smart phones effectively becoming ubiquitous. While smart phones provide a plethora of valuable applications to the user, the real power comes in their ability to leverage location-based services. Location-Based Services (LBSs) are permission-based applications that use real-time location intelligence from a customer's mobile device. This data facilitates the providers in rendering diversified services based off the user s geographic location and known landmarks. Therefore, having access to your location would not be of any value on its own, but relating it to other locations provide this endeavor meaning and value. To further clarify this, if a user is travelling and using such a service and they can identify points of interest along their travel path that would be of interest to them, then it would add value to the service provided. The strength of LBSs come when combining the user s geographical locations with identified points of interest (POI). As an example, a quick online search could no only enable the user to find the location of a particular POI, but combining this request with the user s geographical location can enhance the result by providing directions to said POI. Copyright to IJIRSET DOI:10.15680/IJIRSET.2016.0507260 14167

II. LITERATURE SURVEY The advent of high-speed wireless networks and the popularity of portable devices have fueled the development of mobile computing. Compared to traditional computing paradigms, mobile computing enables clients to have unrestricted mobility while maintaining network connection. The ability of users to move and identify their own locations opens up a new kind of information services, called location-dependent information services (LDISs), which produce the answer to a query according to the location of the client issuing the query. Examples of mobile LDISs include nearest object searching (e.g., finding the nearest restaurant) and local information access (e.g., local traffic, news, and attractions. The spatial property of location-dependent data introduces new problems for data caching research. First, the cached result for a query (e.g., the nearest restaurant) may become invalid when the client moves from one location to another. The maintenance of the validity of the cached data when the client changes location is called location-dependent cache invalidation. Second, the cache replacement policy on the client has to consider the sizes of the valid scopes p(hereinafter called valid scope areas) of the cached values. The valid scope of a data value is defined as the geographical area within which the data value is valid. When the valid scope of a data value is large, the chance for the client to issue the same query within the valid scope, thus generating a cache hit, is also large. As such, the cache replacement policy should try to retain the data value with pa larger valid scope area in the cache [1]. Owing to increasing demands from mobile users, Location-Based Services (LBSs) have received a lot of attention in recent years. Examples of queries for location-based services include find the nearest gas station from my current location, find all the cinemas within 1 km radius, which buses will pass by me in the next 10 minutes? and so on. While data objects in the first two examples are stationary, those in the last example are mobile. In this paper, we focus on queries issued by mobile users on relatively static data objects, because they are the most common kind of queries in LBSs. The movement of mobile clients presents many new research problems for location-dependent query processing there are several technical issues involved with the implementation of an LBS, which include locating the position of a mobile user, tracking and predicting movements, processing queries efficiently, and bounding location errors [2]. Consider a computing environment with a large number of location-aware mobile objects. We want to retrieve the mobile objects inside a set of user-defined spatial regions and continuously monitor the population of these windows over a time period. In this paper, we refer to such continuous queries as range-monitoring queries. Efficient processing of range-monitoring queries could enable many useful applications. similarly, we might want to track traffic condition pin some area and dispatch more police to the region if the number of vehicles inside exceeds a certain threshold. In such applications, it is highly desirable and sometime critical to provide accurate results and update them pin real time whenever mobile objects enter or exit the regions of interest. Unlike conventional range queries, a range-monitoring query is a continuous query. It stays active until it is terminated explicitly by the user. As objects continue to move, the query results change accordingly and require continuous updates. A simple strategy for computing range monitoring queries is to have each object report its position as it moves. The server uses this information to identify the affected queries, and updates their results accordingly. This simple approach requires excessive location updates, and obviously is not scalable. Each location update consists of two expenses - mobile communication cost and server processing cost. If a battery-powered object has to constantly report its location, the battery would be exhausted very quickly. It is wellknown that sending a wireless message consumes substantially more energy than running simple procedures [3]. Mobile devices with computational, storage, and wireless communication capabilities (such as PDAs) are becoming increasingly popular. At the same time, the technology behind positioning systems is constantly evolving, enabling the integration of low cost GPS devices in any portable unit. Consequently, new mobile computing applications are expected to emerge, allowing users to issue location-dependent queries in a ubiquitous manner. Consider, for instance, a user (mobile client) in an unfamiliar city, who would like to know the 10 closest restaurants. This is an instance of a k nearest neighbor (knn) query, where the query point is the current location of the client and the set of data objects contains the city restaurants. Alternatively, the user may ask for all restaurants located within a certain distance, i.e., within 200 meters [5]. This is an instance of a range query. Spatial queries have been studied extensively in the past, and numerous algorithms exist (for processing snapshot queries on static data indexed by a spatial access method. Subsequent methods focused on moving queries (clients) and/or objects. The main idea is to return some additional information (e.g., more NNs expiry time validity region that determines the lifespan of the result. Thus, a moving client needs to issue another query only after the current result expires. These methods focus on single query processing, make certain Copyright to IJIRSET DOI:10.15680/IJIRSET.2016.0507260 14168

assumptions about object movement and do not include mechanisms for maintenance of the query results (i.e., when the result expires, a new query must be issued). Recent research considers continuous monitoring of multiple queries over arbitrarily moving objects. In this setting, there is a central server that monitors the locations of both objects and queries. The task of the server is to report and continuously update the query results as the clients and the objects move. As an example, consider that the data objects are vacant cabs and the clients are pedestrians that wish to know their k closest free taxis until they hire one. [6]As the reverse case, the queries may correspond to vacant cabs, and each free taxi driver wishes to be continuously informed about his/her k closest pedestrians. Several monitoring methods have been proposed, covering both range and knn queries. Some of these methods assume that objects issue updates whenever they move, while others consider that data objects have some computational capabilities, so that they inform the server only when their movement influences some query. III. PROPOSED SYSTEM We propose a novel hybrid LBS technique that integrates location cloaking and private information retrieval. We have also implemented and evaluated our proposal to determine its practicality on resource-constrained hardware. The results show that users can achieve a good compromise between privacy and computational efficiency with our technique unlike all other existing LBS proposals. Fig 1: Proposed System Architecture Our contribution is based on three fundamental points; First: while Dewri s matrix measurements was 320 320 grid covered 32 32 km2, where each cell reflects to 100 100 m area with 124.5 KB data transferred. This measurement of each cell will not achieve the accuracy that the user is looking for, as well as providing the user with unnecessary needed information. Figure 3 demonstrated the major idea about the previous restriction. Suppose the user was in location (x, y) and his inquires was about some restaurant or coffee, Dewri s system will provide him a matrix about all the red spots, which is far from his interest. In fact, what he need is just an information about the nearest neighbor from his location. As a result, we zoom this area to attain the goal of accuracy while maintaining the same quantity of transmitted data that is described in the rectangle shape in the same figure. The new similarity matrix utilized the main concept of Dewri s matrix 320 320 grid - where we will still in (124.5 KB) transferred data -, but each cell assimilates to 10 10 m area. This new cell will achieve the accuracy and efficiency results for user. Copyright to IJIRSET DOI:10.15680/IJIRSET.2016.0507260 14169

ALGORITHMS Step 1: Peer Search Step 1. Initially set number of peers required k=4, Area(A)=Amin// min area i.e search peers within min area. 2. Broadcast a request (containing ID of user U) to all neighboring peers.//req 3. Each peer generates a new record r that contains its ID, current location and a timestamp i.e. <p, (xp, yp), tp> 4. Send record r to user U. // r is result If ( (NumPeer(List)<=k) && (Area(A) < Amax) ) For (i=0;i<=numpeer(list);i++) get (i)th records a. Expand the Area(A) by adding some constant value. b. Broadcast request to the peers. c. Receive records from peers. d. Update number of peers in List (i.e. k). End for If (NumPeer(List)=NULL) // if no peer found a. Select the user as having the latest timestamp. 5. Send the records in List, k, location of user U, Area(A) and ID of peer having latest timestamp to central server(i.e. Location Anonymizing Server). Step 2: Cloaked Area Step 1. If( NumPeer(List)>k)//i.e. is peers are found a. Select one peer records. b. Show a region A previously defined before searching peer(to show that peer is within that region). 2. Else//if peers are not found a. Set latest timestamp = ID of user U b. Add some constant value to U s latitude and longitude. c. Determine region A=Amin//region will become min area previously defined in line 1 of algorithm 1. 3. If( Area(A)>= Amin) a. Return Area A as user s blurred location information b. Also return location of peer having latest timestamp. 4. Else a. Extend Area A by random distance. b. Return Area A as user s blurred location information c. Also return location of peer having latest timestamp. Forward the request along with fake location information and bounded area to Location-based server. MATHEMATICAL MODEL Fu = {Requested user for data} Fm = {Data providers upto n} Fb = {FuˆFm} Since, Input = {Fm} // it should be DDL, DML, DCL commands Output = {Fb} // it should be a data table Success Condition, Fu Fu NULL Copyright to IJIRSET DOI:10.15680/IJIRSET.2016.0507260 14170

Fm Fm NULL Failure Condition, If (F[i] ) n[i]=null; }// user not available in database authentication time Fu[i] = =NULL, Fm [i] = =NULL { IV. RESULTS AND DISCUSSION For the proposed system comparison we analyze the our work with some existing systems. The Searching technique might be affect to searching time complexity base on k-anonymity users. The given table 1 shows the comparative results of system Cryptography Data Size in Encryption Decryption Technique/ MB Time in time in Algorithm Milliseconds Milliseconds IBE 100 254 265 Hashing 100 269 271 AES 100 310 305 Proposed 100 210 201 Table 1: Encryption technique comparison for proposed system Here below graph show the system query performance with different number of queries Fig 2: The cache hit ratio of the three cache replacement policies with increasing users query number. Every simulation has numerous intervals (whose lengths are Poisson distributed), and during each interval, the simulator selects a random subset of mobile users to launch spatial queries (the query intervals are also based on the Poisson distribution). The subset size is controlled by the user defined mean number of queries per minute (e.g., 1000 queries per minute). To obtain results that closely correspond to realworld conditions, we obtained our simulation parameters from public data sets. Copyright to IJIRSET DOI:10.15680/IJIRSET.2016.0507260 14171

V. CONCLUSION In the given work, we proposed a dynamic grid system for providing privacy-preserving continuous LBS. Our DGS includes the query server and the service provider, and cryptographic functions to divide the whole query processing task into two parts that are performed separately by QS and SP, we give the survey of location-based privacy preserving. First, we summary the anonymity technologies, such as location k-anonymity, location obfuscation, location spatial cloaking, and Spatio-temporal cloaking. Then, we give the privacy attack models based on location server. Finally, we overview the privacy-aware location query processing. REFERENCES [1] D. Lee, B. Zheng, and W.-C. Lee, Data Management in Location- Dependent Information Services, IEEE Pervasive Computing, vol. 1, no. 3, pp. 65-72, July-Sept. 2002. [2] B. Zheng, J. Xu, and D.L. Lee, Cache Invalidation and Replacement Strategies for Location-Dependent Data in Mobile Environments, IEEE Trans. Computers, vol. 15, no. 10, pp. 1141-1153, Oct. 2002. [3] B. Zheng and D.L. Lee, Processing Location-Dependent Queries in a Multi-Cell Wireless Environment, Proc. Second ACM Int l Workshop Data Eng. for Wireless and Mobile Access, 2001. [4] B. Zheng, J. Xu, W.-C. Lee, and D.L. Lee, On Semantic Caching and Query Scheduling for Mobile Nearest-Neighbor Search, Wireless Networks, vol. 10, no. 6, pp. 653-664, Dec. 2004. [5] X. Gao and A. Hurson, Location Dependent Query Proxy, Proc.ACM Int l Symp. Applied Computing, pp. 1120-1124, 2005. [6] X. Gao, J. Sustersic, and A.R. Hurson, Window Query Processing with Proxy Cache. [6] Bugra Gedik and Ling Liu. Location Privacy in Mobile Systems: A Personalized Anonymization Model. In Proceedings of the 25th International Conference on Distributed Computing Systems, pages 620 629, 2005. [7] Gabriel Ghinita, Panos Kalnis, and Spiros Skiadopoulos. PRIVE: Anonymous Location-based Queries in Distributed Mobile Systems. In Proceedings of the 16th International Conference on World Wide Web (WWW), pages 371 380, 2007. [8] Marco Gruteser and Dirk Grunwald. Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In Proceedings of the First International Conference on Mobile Systems, Applications, and Services (MobiSys), 2003. [9] Haibo Hu, Jianliang Xu, Wing Sing Wong, Baihua Zheng, Dik Lun Lee, Wang-Chien Lee. Proactive Caching for Spatial Queries in Mobile Environments. In Proceedings of the 21st International Conference on Data Engineering (ICDE), pages 403-414, 2005. [10] Wei-Shinn Ku, Roger Zimmermann, Wen-Chih Peng, and Sushama Shroff. Privacy Protected Query Processing on Spatial Networks. In Proceedings of the 23rd International Conference on Data Engineering Workshops, pages 215 220, 2007. Copyright to IJIRSET DOI:10.15680/IJIRSET.2016.0507260 14172