PRIVACY-CONSCIOUS LOCATION-BASED QUERIES IN MOBILE ENVIRONMENTS
#1

Domain
PARALLEL AND DISTRIBUTED SYSTEMS

Technology
JAVA

Abstract:
PRIVACY-CONSCIOUS LOCATION-BASED QUERIES IN MOBILE ENVIRONMENTS

In location-based services, users with location-aware mobile devices are able to make queries about their surroundings anywhere and at any time. While this ubiquitous computing paradigm brings great convenience for information access, it also raises concerns over potential intrusion into user location privacy. To protect location privacy, one typical approach is to cloak user locations into spatial regions based on user-specified privacy requirements, and to transform location-based queries into region-based queries. In this paper, we identify and address three new issues concerning this location cloaking approach. First, we study the representation of cloaking regions and show that a circular region generally leads to a small result size for region-based queries. Second, we develop a mobility-aware location cloaking technique to resist trace analysis attacks. Two cloaking algorithms, namely MaxAccu_Cloak and MinComm_Cloak, are designed based on different performance objectives. Finally, we develop an efficient polynomial algorithm for evaluating circular-region-based kNN queries. Two query processing modes, namely bulk and progressive, are presented to return query results either all at once or in an incremental manner. Experimental results show that our proposed mobility-aware cloaking algorithms significantly improve the quality of location cloaking in terms of an entropy measure without compromising much on query latency or communication cost. Moreover, the progressive query processing mode achieves a shorter response time than the bulk mode by parallelizing the query evaluation and result transmission.
Reply
#2
i want some ppts for this topic Privacy-Conscious Location-Based Queries
in Mobile Environments
Reply
#3


To get more information about the topic "PRIVACY-CONSCIOUS LOCATION-BASED QUERIES IN MOBILE ENVIRONMENTS " please refer the page link below
http://studentbank.in/report-privacy-con...4#pid56114
Reply
#4

Privacy-Conscious Location-Based Queries in
Mobile Environments



.doc   Privacy-Conscious Location-Based Queries.doc (Size: 34 KB / Downloads: 0)

ABSTRACT:

In location-based services, users with location-aware mobile devices are able to make queries about their surroundings anywhere and at any time. While this ubiquitous computing paradigm brings great convenience for information access, it also raises concerns over potential intrusion into user location privacy. To protect location privacy, one typical approach is to cloak user locations into spatial regions based on user-specified privacy requirements, and to transform location-based queries into region-based queries. In this paper, we identify and address three new issues concerning this location cloaking approach. First, we study the representation of cloaking regions and show that a circular region generally leads to a small result size for region based queries. Second, we develop a mobility-aware location cloaking technique to resist trace analysis attacks. Two cloaking algorithms, namely MaxAccu Cloak and MinComm Cloak, are designed based on different performance objectives. Finally, we develop an efficient polynomial algorithm for evaluating circularregion- based kNN queries. Two query processing modes, namely bulk and progressive, are presented to return query results either all at once or in an incremental manner. Experimental results show that our proposed mobility-aware cloaking algorithms significantly improve the quality of location cloaking in terms of an entropy measure without compromising much on query latency or communication cost. Moreover, the progressive query processing mode achieves a shorter response time than the bulk mode by parallelizing the query evaluation and result transmission.

Existing System:

Location-based services (LBS) are emerging as a major application of mobile geospatial technologies. In LBS, users with location-aware mobile devices are able to make queries about their surroundings anywhere and at any time. Spatial range queries and k-nearest-neighbor (kNN) queries are two types of the most commonly used queries in LBS. For example, a user can make a range query to find out all shopping centers within a certain distance of her current location, or make a kNN query to find out the k nearest gas stations. In these queries.

Proposed System:

In this paper, we identify and address three new issues concerning the location cloaking approach. We first show that the representation of a cloaking region has an impact on the result superset size of the region-based query. In general, a small result superset is preferred for saving the cost of data transmission and reducing the workload of the result refinement process (especially if this process is implemented on the mobile client). We find that, given a privacy requirement, representing the cloaking region with a circle generally leads to a smaller result superset than using other shapes. Second, we consider the location cloaking problem for continuous LBS queries. In such scenarios, trace analysis attacks are possible by linking historical cloaking regions with user mobility patterns.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: summer taining report for bhel ranipetm in mobile environments, privacy conscios location in mobile environment project, queries on 3d password topic in technical seminar, queries on 5g technology, queries on blueeye technology topic, location based spatial queries, ppts for cse on topic virtual real system in mobile environments,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Privacy- and Integrity-Preserving Range Queries in Sensor Networks 1 855 15-02-2017, 04:10 PM
Last Post: jaseela123d
  Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper 1 788 15-02-2017, 11:01 AM
Last Post: jaseela123d
  Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper 1 751 15-02-2017, 11:00 AM
Last Post: jaseela123d
  SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-He 1 896 14-02-2017, 03:49 PM
Last Post: jaseela123d
  Energy-Aware Autonomic Resource Allocation in Multi tier Virtualized Environments 1 740 14-02-2017, 02:13 PM
Last Post: jaseela123d
  MOBILE PHONE BASED ATTENDANCE TRACKING SYSTEM seminarsonly 25 20,923 06-03-2015, 07:18 PM
Last Post: unas
  Privacy Preservation in Data Mining sajidpk123 3 2,948 13-11-2014, 10:48 PM
Last Post: jaseela123d
  Mobile shop management System computer science technology 7 14,707 01-07-2014, 06:21 PM
Last Post: seminar report asees
  Privacy Preserving Decision Tree Learning Using Unrealized Data Sets Projects9 1 2,339 30-10-2013, 01:18 PM
Last Post: Guest
  DISTRIBUTED MOBILITY MANAGEMENT FOR TARGET TACKING IN MOBILE SENSOR NETWORKS computer science technology 4 3,911 22-02-2013, 03:05 PM
Last Post: seminar details

Forum Jump: