Dynamic Monitoring of Moving Objects: A Novel Model to Improve Efficiency, Privacy and Accuracy of the Framework

Similar documents
Approximate Evaluation of Range Nearest Neighbor Queries with Quality Guarantee

Continuous Query Processing in Spatio-temporal Databases

On the Utilization of GSM Cell Id for Mobile Device Tracking and Notification

ISSN: (Online) Volume 4, Issue 1, January 2016 International Journal of Advance Research in Computer Science and Management Studies

Closest Keywords Search on Spatial Databases

IN mobile and spatiotemporal databases, monitoring continuous

THE advances in wireless technologies and positioning

A Novel Method to Estimate the Route and Travel Time with the Help of Location Based Services

On Reducing Communication Cost for Distributed Moving Query Monitoring Systems

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack

A Methodology in Mobile Networks for Global Roaming

A Collaborative Approach to Enhance Security in Location Based Services by Answering Range Queries in WSN

Avoidance of Bottleneck in PCS Network

MobiPLACE*: A Distributed Framework for Spatio-Temporal Data Streams Processing Utilizing Mobile Clients Processing Power.

Query Indexing and Velocity Constrained Indexing: Scalable Techniques for Continuous Queries on Moving Objects Λ

The Novel HWN on MANET Cellular networks using QoS & QOD

Anonymization Mechanism for Privacy-Preserving Location Monitoring System in WSN

Mobility Data Management and Exploration: Theory and Practice

Research Article Nonexposure Accurate Location K-Anonymity Algorithm in LBS

Privacy Preservation Approach Using Grid Base Techniques for Mobile Users

Protocol for Tetherless Computing

Computation of Multiple Node Disjoint Paths

A Survey on Signaling Load in Mobility Management

SPQI: An Efficient Index for Continuous Range Queries in Mobile Environments *

Distributed Processing of Moving K-Nearest-Neighbor Query on Moving Objects

Publishing CitiSense Data: Privacy Concerns and Remedies

The Area Code Tree for Nearest Neighbour Searching

Pseudonym Based Security Architecture for Wireless Mesh Network

A Centralized Approaches for Location Management in Personal Communication Services Networks

A Review on various Location Management and Update Mechanisms in Mobile Communication

Dynamic Design of Cellular Wireless Networks via Self Organizing Mechanism

Dynamic Nearest Neighbor Queries in Euclidean Space

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

Dynamic Broadcast Scheduling in DDBMS

PERSONAL communications service (PCS) provides

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

Privacy and Accuracy Monitoring Of Spatial Queries Using Voronoi Neighbors Using Data Mining

Spatiotemporal Access to Moving Objects. Hao LIU, Xu GENG 17/04/2018

Spatial Index Keyword Search in Multi- Dimensional Database

A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM

A Study on Reverse Top-K Queries Using Monochromatic and Bichromatic Methods

TOPOLOGY CONTROL IN WIRELESS NETWORKS BASED ON CLUSTERING SCHEME

End-User Controlled Vertical Handover Procedure for 4G Wireless Access Networks


Accumulative Privacy Preserving Data Mining Using Gaussian Noise Data Perturbation at Multi Level Trust

PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS

Forecasting of Road Traffic Congestion Using Weighted Density Variation Algorithm

Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks

An Adaptive and Optimal Distributed Clustering for Wireless Sensor

Continuous Spatiotemporal Trajectory Joins

Information Brokerage

Privacy-Preserving of Check-in Services in MSNS Based on a Bit Matrix

MobiEyes: Distributed Architecture for Location-based Services

Packet Estimation with CBDS Approach to secure MANET

Lecture 8 Wireless Sensor Networks: Overview

HARNESSING CERTAINTY TO SPEED TASK-ALLOCATION ALGORITHMS FOR MULTI-ROBOT SYSTEMS

Continuous Evaluation of Monochromatic and Bichromatic Reverse Nearest Neighbors

Sharing Location Dependent Experiences in MANET

Design Considerations on Implementing an Indoor Moving Objects Management System

L2P2: Location-aware Location Privacy Protection for Location-based Services

Searching of Nearest Neighbor Based on Keywords using Spatial Inverted Index

DISTANCE RELATED ACCESS QUERY OPINION ON DOCUMENT CONCURRENCY (LAND)

EARM: An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems.

Efficient Message Caching Scheme for MANET

The New Casper: Query Processing for Location Services without Compromising Privacy

Load Balancing in Distributed System through Task Migration

Scalable Distributed Processing of K nearest Neighbour Queries over Moving Objects

Keywords Data alignment, Data annotation, Web database, Search Result Record

All Rights Reserved 2017 IJARCET

A Survey on Efficient Location Tracker Using Keyword Search

Energy Efficient Data Gathering For Throughput Maximization with Multicast Protocol In Wireless Sensor Networks

Evaluating the Performance of Mobile Agent-Based Message Communication among Mobile Hosts in Large Ad Hoc Wireless Network

Inverted Index for Fast Nearest Neighbour

A New Location Caching with Fixed Local Anchor for Reducing Overall Location Management Cost in Wireless Mobile Networks

Elimination Of Redundant Data using user Centric Data in Delay Tolerant Network

Overview of Challenges in VANET

A Survey on Group Mobility Model and Handover in Mobile WiMAX Network

CONTROLLER AREA NETWORK AS THE SECURITY OF THE VEHICLES

Efficient Authentication and Congestion Control for Vehicular Ad Hoc Network

QUERY PLANNING FOR CONTINUOUS AGGREGATION QUERIES USING DATA AGGREGATORS

A Novel Trip Planner Using Effective Indexing Structure

Queue Management for Network Coding in Ad Hoc Networks

Ms A.Naveena Electronics and Telematics department, GNITS, Hyderabad, India.

ISSN: (Online) Volume 2, Issue 3, March 2014 International Journal of Advance Research in Computer Science and Management Studies

Vertical Handover in Vehicular Ad-hoc Networks A Survey

Trusted Base Stations-Based Privacy Preserving Technique in Location-Based Services

Data Gathering for Wireless Sensor Network using PEGASIS Protocol

13 Sensor networks Gathering in an adversarial environment

ANALYSIS OF LINK EFFICIENCY AND HANDOFF WITH MOBILITY MANAGEMENT IN COGNITIVE RADIO

An Efficient Secured Scheme for Detecting Source of Packet Drop and Forgery Attack in WSN

(INTERFERENCE AND CONGESTION AWARE ROUTING PROTOCOL)

Processing Approximate Moving Range Queries in Mobile Sensor Environments

A Super-Peer Selection Strategy for Peer-to-Peer Systems

Performance Evaluation of Various Routing Protocols in MANET

Privacy Preserving Location Query Service

Spatial Cloaking algorithm for location privacy preservation.

A Scheme of Multi-path Adaptive Load Balancing in MANETs

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

Middle in Forwarding Movement (MFM): An efficient greedy forwarding approach in location aided routing for MANET

Transcription:

Bathula Sowjanya et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 2 (3), 2011, 946950 Dynamic Monitoring of Moving Objects: A Novel Model to Improve Efficiency, Privacy and Accuracy of the Framework Bathula Sowjanya 1, Kolikipogu Ramakrishna 2, K.Sailaja 3 1,3 Department of CSE, Vignan Institute of Information TechnologyJNT University, Vizag, A.P, INDIA 2 Department of CSE, JNT University Hyderabad (CMRCET) Hyderabad,A.P,INDIA Abstract Millions of users in the world are making use of wireless mobile services from personal to business applications. Monitoring of dynamically moving object is a challenging task for the service providers. In order to provide user interested trustworthy services, tracking of moving objects is necessary. Locationbased services are the scalable processing of location monitoring requests on a large collection of mobile objects. Location Updates are being affected to the repository centers. This can be authenticated by the mobile clients (users) by reporting the query updates while moving from one place to other in specified region. Most of the Users are expected to cloak from other parties. The bury of user is due to privacy issues. This paper addresses the Privacy, Accuracy and Efficiency of dynamically moving objects in a safe region. The proposed model draws the enhanced results with the general methods of monitoring accuracy, Privacy and scalability with minimal communication cost. Keywords Moving Object, Location update, Query Index, Safe Regions, Object index. Introduction In the Proliferation of Mobile communication, the users are more comfortable with the nascent wireless communication technology adaptations. Monitoring moving mobile clients is necessary to provide best services in this competitive world. To track and coordinate large numbers of continuously moving objects, their positions are stored in databases [1]. While capturing moving objects it is the responsibility of parent network to provide privacy to the users. Location privacy is the ability to prevent other parties from learning one s current or past location. Privacy of location information is about controlling access to this information [2]. Pervasive Computing applications track people s movements so they can offer various useful services. Users who do not want such services can trivially maintain location privacy by refusing to be tracked assuming they have the choice [2]. One of the challenging issues we address in this paper is how locationaware applications are identical to the users sensitive data, that is being effected and retaining their location privacy. To protect the privacy of user location information they wish to hide their true identity or sensitive information from the applications receiving their location, at a very high level, this is taken as security policy in this paper. Unlike conventional range queries, a rangemonitoring query is a continuous query. It stays active until it is terminated explicitly by the user. As objects continue to move, the query results change accordingly and require continuous updates [3]. The application servers capture the client requests and registers update queries in the corresponding databases until the queries are deregistered. Each location update consists of two expenses mobile communication cost and server processing cost [3]. Systems for continuous monitoring or tracking of mobile objects receive updated locations of objects as they move in space [4], [9], [10], [11]. The database server manages the location information of the objects. There are two representative types of emerging location based services: locationaware content delivery and location sensitive resource management. The former uses location data to tailor the information delivered to the mobile users in order to increase the quality of service and the degree of personalization [6]. The latter uses location data combined with route schedules and resource management plans to direct service personnel or transportation systems, optimize personnel utilization, handle emergency requests, and reschedule in response to external conditions like traffic and weather [6]. In [7] personalized kanonymity model for providing location privacy. Our model allows mobile clients to define and modify their location privacy specifications at the granularity of single messages, including the minimum anonymity level requirement, and the inaccuracy tolerances along the temporal and spatial dimensions [7], this compromises the accuracy and Quality of Service. The fundamental problem in a monitoring system is when and how a mobile client should send location updates to the server because it determines few major measures of monitoring, such as Privacy, accuracy and efficiency. Accuracy means how often the monitored results are correct, and it heavily depends on the frequency and accuracy of location updates [8]. As for efficiency, two dominant costs are: the wireless communication cost for location updates and the query evaluation cost at the database server, both of which depend on the frequency of location updates. As for privacy, the accuracy of location updates determines how much the client s privacy is exposed to the server. I. SYSTEM FRAMEWORK n this Framework we focused to capture the whereabouts of continuous moving objects from one safe region to another safe region. The frame work is shown in Fig. 1. The flow of 946

Bathula Sowjanya et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 2 (3), 2011, 946950 work in this framework has shown in Fig.2 that clears how a query is updated in the database while a mobile client moves from on region to another region. Few studies on continuous query monitoring are focused on location updates [12]. All the registered clients report their updations to the server in periodic intervals. A client performs an update when its location or velocity changes significantly [13]. Clients View Results Applica tion Server Reg. Query DB Server Fig 1. System Framework Location Updates Base Station DB The system frame work maintains needed equipments mainly at the server and the user side. Moving objects index is to be maintained by the server in order to get the changes when they were found location updates. This is to be maintained with object address as object index, Updating query index, Query processing unit as query processor and update manager. Moving objects generally maintains un broken connection to maintain consistent updated information. Fig. 2 Query Updation while location change by moving objects. II. RELATED WORK In mobile and spatiotemporal databases, monitoring continuous spatial queries over moving objects is needed in numerous applications such as public transportation, logistics, and locationbased services. A typical monitoring system consists of a base station, a database server, application servers, and a large number of moving objects (i.e., mobile clients). The database server manages the location information of the objects. The application servers gather monitoring requests and register spatial queries at the database server, which then continuously updates the query results until the queries are deregistered. The fundamental problem in a monitoring system is when and how a mobile client should send location updates to the server because it determines three principal performance measures of monitoring accuracy, efficiency, and privacy. Accuracy means how often the monitored results are correct, and it heavily depends on the frequency and accuracy of location updates. As for efficiency, two dominant costs are: the wireless communication cost for location updates and the query evaluation cost at the database server, both of which depend on the frequency of location updates. As for privacy, the accuracy of location updates determines how much the client s privacy is exposed to the server. A. Periodic Updates and Deviation Updates Two commonly used updating approaches are periodic update (every client reports its new location at a fixed interval) and deviation update (a client performs an update when its location or velocity changes significantly). Monitoring accuracy is low: query results are correct only at the time instances of periodic updates, but not in between them or at any time of deviation updates. Location updates are performed regardless of the existence of queries a high update frequency may improve the monitoring accuracy, but is at the cost of unnecessary updates and query reevaluation. Server workload using periodic update is not balanced over time: it reaches the peak when updates arrive (they must arrive simultaneously for correct results) and trigger query reevaluation, but is idle for the rest of the time. Privacy issue is simply ignored by assuming that the clients are always willing to provide their exact positions to the server. Some recent work attempted to remedy the privacy issue. Location cloaking was proposed to blur the exact client positions into bounding boxes. By assuming a centralized and trustworthy thirdparty server that store all exact client positions, various location cloaking algorithms were proposed to build the bounding boxes while achieving the privacy measure such as kanonymity. However, the use of bounding boxes makes the query results no longer unique. As such, query evaluation in such uncertain space is more complicated. A common approach is to assume that the probability distribution of the exact client location in the bounding box is known and well formed. Therefore, the results are defined as the set of all possible results together with their probabilities. However, all these approaches focused on onetime cloaking or query evaluation; they cannot be applied to monitoring applications 947

Bathula Sowjanya et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 2 (3), 2011, 946950 where continuous location update is required and efficiency is a critical concern. Previous work proposed, a monitoring framework where the clients are aware of the spatial queries being monitored, so they send location updates only when the results for some queries might change. Our basic idea is to maintain a rectangular area, called safe region, for each object. The safe region is computed based on the queries in such a way that the current results of all queries remain valid as long as all objects reside inside their respective safe regions. A client updates its location on the server only when the client moves out of its safe region. This significantly improves the monitoring efficiency and accuracy compared to the periodic or deviation update methods. However, this framework fails to address the privacy issue, that is, it only addresses when but not how the location updates are sent. B. Limitations of Existing System The accuracy is low since the query results are correct only at the time instances of periodic updates, but not in between them or at any time of deviation updates. The updates are performed regardless of the existence of Queries a high update frequency may improve the monitoring accuracy, but is at the cost of unnecessary updates and query reevaluation. The privacy issue is simply ignored by assuming that the clients are always willing to provide their exact positions to the server. III. ALGORITHMIC APPROACH Step1 : When an Object starts moving it registers the query through Application Server. i.e Register query. Step2 : When an Object changes region and sends location updates, It modifies the information using Query index and Object index. Step 3 : Updated results will be acknowledged to the registered objects through application server. Step 4 : Location manager updates the information and find the new safe region for such updating objects and acknowledges to the object. Step 5 : Whenever new query is created repeat Steps from 1 to 4. IV. MODEL WORKFLOW In our approach to maintain safe region we have object index, Query index, the query processor and location manager. As for efficiency, the framework significantly reduces location updates to only when an object is moving out of the safe region, and thus, is very likely to alter the query results. The safe region is computed based on the queries in such a way that the current results of all queries remain valid as long as all objects reside inside their respective safe regions. A. Safe Region Evaluation In this safe region is assumed as a rectangle change of object inside the rectangle would not affect spatial query in the database. The safe region is computed based on the queries in such a way that the current results of all queries remain valid as long as all objects reside inside their respective safe regions. Client updates its location on the server only when the client moves out of its safe region based on the location of client. The safe region ring is based on the rectangle of the centric. B. Object Index and Query Index Object index is the server side information about spatial query range and used to evaluate safe region. Query Index as the following parameter query point, current query result and the quarantine area. The quarantine area is used to identify the queries whose results might be affected by an incoming location update. The number of objects is some orders of magnitude larger than that of queries. As such, the query index can accommodate all registered queries in main memory, while the object index can only accommodate all moving objects in secondary memory C. Query Processing In the PAM framework, based on the object index, the query processor evaluates the most probable result when a new query is registered, or reevaluates the most probable result when a query is affected by location updates. Obviously, the reevaluation is more efficient as it can be based on previous results. Client Region change Query processing Database server Application server Query lt Safe Region Evaluation. Object Index and Query Index Query Processing. Location Updater. Fig 3. Workflow diagram for framework 948

Bathula Sowjanya et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 2 (3), 2011, 946950 D. Location Updater The each time a client detects the genuine point location, it is wrapped into a bounding box. Then, the clientside location updater decides whether or not to update that box to the server without any other knowledge about the client locations or moving patterns, upon receiving such a box, the server can only presume that the genuine point location is distributed uniformly in this box positions from time to time i.e. periodically with respective to time. Whenever any object changes its location, location update is provided by entering distance as an integer. Base station regions are defined with fixed coverage area. When an object comes to that region it shows the new region by location updates. V. EXPERIMENTAL SETUP We implemented this framework to simulate the proposed work that how a server dynamically monitors the moving objects. We provided automatic refresh option that gets the distance changes of moving objects time to time. Server captures the dynamic changes from the registered objects and displays on the server screen as shown in fig.4. i.e Application Server Monitor. Fig 6. Safe Region Monitoring and query updates Fig 4. The Application Server Monitors the dynamic changes to the registered objects. When we enter distance in any clients interface it shows the region in which you belong to. If any query is posted by the clients the relevant answer is given according to the region. When client enter distance that crosses the current region (coverage area) it immediately show the new region. It updates the user queries and replies accordingly as shown in Fig. 6. VI. RESULT ANALYSIS With the above experimental setup we simulated the framework. We observe this works good for Dynamic Monitoring of moving objects, Location updates, Even it provides privacy based on the user choice. There are few challenges while we implement this framework. If we allow automatic monitoring of moving objects the clients lose their privacy for this we provided early registration and deregistration. Fig 5. Multiple clients continuous movement is represented using distance and query through the individual interface to each object. Above Fig. 5. Represents the multiple moving clients that are continuously change their positions over the time. In general this comes under the spatiotemporal objects changes their VII. CONCLUSION AND FUTURE SCOPE This model focused on Location updates and dynamic monitoring of moving objects. It provides users expected privacy with prior registration and deregistration. Whenever the safe region coverage area is more it gives poor performance. In our future work we planned to address this problem by splitting fixed safe region into subregions and extend for more near accurate updates of the location. 949

Bathula Sowjanya et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 2 (3), 2011, 946950 VIII. ACKNOWLEDGEMENT First Author thanks Dr.K.Venkata Rao, HOD&Professor and Other Staff members, Department of CSE, VIGNAN INSTITUTE OF INFORMATION TECHNOLOGY, VIZAG, A.P, INDIA for their timely suggestions and encouragement to complete this task and continue the future work. REFERENCES [1] R. Benetis, C.S. Jensen, G. Karciauskas, and S. Saltenis, Nearest Neighbour and Reverse Nearest Neighbor Queries for Moving Objects, Proc. Int l Database Eng. and Applications Symp. (IDEAS),. [2] A. Beresford and F. Stajano, Location Privacy in Pervasive Computing, IEEE Pervasive Computing, vol. 2, no. 1, pp. 4655.03. [3] Y. Cai, K.A. Hua, and G. Cao, Processing RangeMonitoring Queries on Heterogeneous Mobile Objects, Proc. IEEE Int l (MDM), 2004.. [4] R. Cheng, D.V. Kalashnikov, and S. Prabhakar, Querying Imprecise Data in Moving Object Environments, IEEE Trans. Knowledge and Data Eng., vol. 16, no. 9, pp. 1112 1127, Sept. 2004.. [5] X. Yu, K.Q. Pu, and N. Koudas, Monitoring knearest Neighbor Queries over Moving Objects, Proc. IEEE Int l (ICDE), 2005. [6] B. Gedik and L. Liu, MobiEyes: Distributed Processing of Continuously (EDBT),2004. [7] Gedik, Member, IEEE, and Ling Liu, Senior Member, IEEE Protecting Location Privacy with Personalized kanonymity: Architecture and Algorithms [8] Haibo Hu, Jianliang Xu, Senior Member, PAM: An Efficient and PrivacyAware Monitoring Framework for Continuously Moving Objects, IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 22, NO. 3, MARCH 2010 [9] S. Buckingham, What Is General Packet Radio Service? http://www.gsmworld.com/technology/gprs/intro.shtml, 2000. [10] P.H. Dana, Global Positioning System Overview, technical report, Univ. of Texas at Austin, 2000. [11] Navman, icn630 Vehicle Navigation GPS,2003. [12] Haibo Hu, Jianliang Xu, Senior Member, IEEE, and Dik Lun Lee,PAM: [13] C.S. Jensen, D. Lin, and B.C. Ooi, Query and Update Efficient B+ Tree Based Indexing of Moving Objects, Proc. Int l Conf. Very Large Data Bases (VLDB), 2004. 950