Escolar Documentos
Profissional Documentos
Cultura Documentos
1166
ABSTRACT
Locality based schemes are used for finding out the point of interest (POI)from a specific location. GPS systems are used for
finding out the latitude and longitude values of a specific location .Based on the POI generated, the service can be provided to
the client from the location server. We use the novel advanced encryption standard technique to solve the problem associated
with the location data. The user does not wants to send his location information directly to the server since doing so the server
can find the users location preferences and use that data for advertising by that user privacy gets lost. The second part is that
the server wants to protect its data from the unnecessary query created by the user. The server cannot send back other
sensitive data to the user. We propose a major enhancement upon previous solution by having two approaches. First one is
unaware transfer and the next is secret information recovery to achieve a secure solution. The solution we present is efficient
and practical in many scenarios. We implement the solution using a real cloud location server and android mobile application.
Key words: location based query, unaware transfer, secret information recovery, advancedencryption.
1. INTRODUCTION
The method used to determine the location of a
device in an access network varies between the different
types of networks. In general GPS is used in all the cases
to determine the location information. By having the
determined values of latitude and longitude generated by
the device, service provider can provide a number of
services to the user. Such that the user can get various
solutions from the service provider through location based
queries. Among many inspiringobstacles to the wide
deployment of such application, a major issue is a privacy.
For instance, users may feel hesitate to disclose their
locations to theLBS, because it may be possible for a
location server to learn who is making a certain query by
linking these locationswith a residential phone book
database, sinceusers are likely to perform many queries
from homelocation based servicesmay open doors for
challengers to threaten location privacy of mobile users
and to expose LBSs to significantvulnerabilities for abuse.
LOCATION PRIVACY TECHNIQUES
Location k-Anonymity
In the context of LBS and mobile users, kanonymous usage of location information is a location kanonymity. It is the most popular approach for detecting a
location, which depersonalizes data through worry
techniques before forwarding it to the LBS providers. It
suffers from several drawbacks. Atfirst, it assumes a
www.ijsret.org
International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882
Vo lu me 3, Issue 8, November 2014
1167
2. PROTOCOL MODEL
K-anonymity in Location-Based Services
Location-based services adopt the concept of K-anonymity
using the framework .A userSends his position, query and
K to the anonymizer, which removes the id of the user and
transforms his location through cloaking. The generated
K-ASR is forwarded to the LBS which processes itand
returns a set of candidates, containing the actual results
and false hits. The first cloaking3 technique, called
Interval Cloak is based on quad trees. A quad tree
recursively partitions the space into quadrants until the
points in each quadrant fit in a page/node.The anonymizer
maintains a quadtree with the locations of all
users.Different systems are the subjected for many
different computational schemes for protecting privacy,
such as using a pseudonym instead of an actual name.
When location systems track users automatically on an
ongoing basis, they generate an massive amount of
potentially sensitive information. Privacy of location
information is about controlling access to this information.
We do not necessarily wants to stop all access because
some applications can use this information to provide
useful services to the user but we want to be in control.
Some goals are clearly mutually exclusive and cannot be
simultaneously satisfied.
In particular to protect the privacy of our location
information while taking advantage of location-aware
services, we wish to hide our true identity from the
applications receiving our location; at a very high level,
this can be taken as a statement of our security policy.
Once it receives a query from a user U, it traverses
the quadtree (top-down) until it finds the quadrant that
contains Uand fewerthan K-1 users. Later, it proceeds with
the selection of the parent of that quadrant as the K-ASR
and forwards it to the LBS.
An anonymous LBS
Physical layer security is that the level of security
provided strongly depends on the amount of information
thatthe legitimate users know about the eavesdroppers.
Private Information Retrieval (PIR)
Private information retrieval(PIR) allows the user
to get the data from the database where both the data
present in a database and the queries generated by the user
to be protected such that the queries are encrypted into
www.ijsret.org
International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882
Vo lu me 3, Issue 8, November 2014
1168
3. CONCLUSION
Figure 2
Advantages
We overcome the data misleading between
location server and users.
We provide better security algorithm to protect
users information during transformation.
Realtime using cloud and android mobile.
Limitations
LS (Location Server) supplying misleading data to
the client.
This misleads about integration of all the model
Servers Security
Intuitively, the servers security requires that the
client can retrieve one record only in each query to the
server, and the server must not disclose other records to
the client in theresponse. Our protocol achieves the
www.ijsret.org
International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882
Vo lu me 3, Issue 8, November 2014
www.ijsret.org
1169