GLOBALSOFT TECHNOLOGIES 
IEEE PROJECTS & SOFTWARE DEVELOPMENTS 
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE 
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS 
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com 
A Novel Time-Obfuscated Algorithm for 
Trajectory Privacy Protection 
ABSTRACT: 
Location-based services (LBS) which bring so much convenience to our daily life have 
been intensively studied over the years. Generally, an LBS query processing can be 
categorized into snapshot and continuous queries which access user location 
information and return search results to the users. An LBS has full control of the 
location information, causing user privacy concerns. If an LBS provider has a malicious 
intention to breach the user privacy by tracking the users’ routes to their destinations, it 
incurs a serious threat. Most existing techniques have addressed privacy protection 
mainly for snapshot queries. However, providing privacy protection for continuous 
queries is of importance, since a maliciousLBS can easily obtain complete user privacy 
information by observing a sequence of successive query requests. In this paper, we 
propose a comprehensive trajectory privacy technique and combine ambient conditions 
to cloak location information based on the user privacy profile to avoid a malicious LBS 
reconstructing a user trajectory. We first propose an r-anonymity mechanism which 
pre-processes a set of similar trajectories R to blur the actual trajectory of a service 
user. We then combine kanonymity with s road segments to protect the user’s privacy. 
We introduce a novel time-obfuscated technique which breaks the sequence of the 
query issuing time for a service user to confuse the LBS so it does not know the user 
trajectory, by sending a query randomly from a set of locations residing at the different 
trajectories in R. Despite the randomness incurred from the obfuscation process for 
providing strong trajectory privacy protection, the experimentalresults show that our
trajectory privacy technique maintains the correctness of the query results at a 
competitive computational cost. 
EXISTING SYSTEM: 
Most existing techniques have addressed privacy protection mainly for snapshot 
queries. However, providing privacy protection for continuous queries is of importance, 
since a malicious LBS can easily obtain complete user privacy information by observing 
a sequence of successive query requests. The existing techniques for protecting 
trajectory privacy have some weaknesses. For example, the solution proposed by faces 
the weakness that when there is an empty set of users on an anonymous trajectory, a 
malicious LBS can easily speculate the queries sent by the service user and track the 
trajectories to identify the user 
PROPOSED SYSTEM: 
Atime-obfuscated approach is proposed to randomize the sequence of the query issuing 
time by sending a query randomly from a set of locations residing at the trajectory set 
R. we have proposed a novel technique for trajectory privacy protection, which 
considers a long-term disclosure issue as well as the real-time ambient conditions. We 
introduce a time obfuscated technique to dramatically increase the level of trajectory 
privacy protection. We allow the users to specify their own privacy profile, and our time 
obfuscated method integrates the r-anonymity, k-anonymity and ssegment paradigms. 
As the experimental results have shown, our privacy technique is able to protect the 
user trajectory and prevent the LBS from reconstructing a user’s actual trajectory and 
the direction. 
CONCLUSION: 
In this paper, we have proposed a novel technique for trajectory privacy protection, 
which considers a long-term disclosure issue aswell as the real time ambient conditions. 
We introduce a time-obfuscated technique to dramatically increase the level of 
trajectory privacy protection. We allow the users to specify their own privacy profile,
and our timeobfuscated method integrates the r-anonymity, k-anonymity and s-segment 
paradigms. As the experimental results have shown, our privacy technique is able to 
protect the user trajectory and prevent the LBS from reconstructing a user’s actual 
trajectory and the direction. Our method guarantees satisfying the user’s privacy 
profile for providing stronger privacy protection. 
SYSTEM CONFIGURATION:- 
HARDWARE CONFIGURATION:- 
 Processor - Pentium –IV 
 Speed - 1.1 Ghz 
 RAM - 256 MB(min) 
 Hard Disk - 20 GB 
 Key Board - Standard Windows Keyboard 
 Mouse - Two or Three Button Mouse 
 Monitor - SVGA 
SOFTWARE CONFIGURATION:- 
 Operating System : Windows XP 
 Programming Language : JAVA 
 Java Version : JDK 1.6 & above.

More Related Content

PDF
IEEE Information forensic and security Title and Abstract 2016
PDF
SURVEY PAPER ON PRIVACY IN LOCATION BASED SEARCH QUERIES.
DOCX
A novel time obfuscated algorithm for trajectory privacy protection
DOCX
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...
DOCX
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...
DOCX
IEEE 2014 JAVA DATA MINING PROJECTS Privacy preserving and content-protecting...
PDF
Privacy Preservation And Data Security In Location Based Services
PDF
aniketpingley_dissertation_aug11
IEEE Information forensic and security Title and Abstract 2016
SURVEY PAPER ON PRIVACY IN LOCATION BASED SEARCH QUERIES.
A novel time obfuscated algorithm for trajectory privacy protection
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...
IEEE 2014 JAVA DATA MINING PROJECTS Privacy preserving and content-protecting...
Privacy Preservation And Data Security In Location Based Services
aniketpingley_dissertation_aug11

Similar to 2014 IEEE JAVA SERVICE COMPUTING PROJECT A novel time obfuscated algorithm for trajectory privacy protection (20)

DOC
Privacy preserving and content-protecting location based queries
DOCX
JPJ1437 Exploiting Service Similarity for Privacy in Location-Based Search Q...
PDF
Exploiting Service Similarity for Privacy in Location Based Search Queries
PDF
PERTURBED ANONYMIZATION: TWO LEVEL SMART PRIVACY FOR LBS MOBILE USERS
DOCX
JPJ1424 Privacy-Preserving and Content-Protecting Location Based Queries
DOCX
Hiding in the mobile crowd location privacy through collaboration
DOC
azd document
PDF
External Defense (TTP based LBS System)
PDF
LPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBS
PDF
A survey on hiding user privacy in location based services through clustering
DOCX
Anonymous Usage of Location-Based Services Through Spatial and.docx
DOCX
2014 IEEE DOTNET DATA MINING PROJECT Anonymous query processing in road networks
DOCX
IEEE 2014 DOTNET DATA MINING PROJECTS Anonymous query processing in road netw...
PDF
H017665256
PDF
Privacy - Preserving Reputation with Content Protecting Location Based Queries
DOCX
privacy-preserving and content-protecting location based queries
DOCX
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
DOCX
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
PDF
User defined privacy grid system for continuous location based services abstract
PPTX
phd_final_defense
Privacy preserving and content-protecting location based queries
JPJ1437 Exploiting Service Similarity for Privacy in Location-Based Search Q...
Exploiting Service Similarity for Privacy in Location Based Search Queries
PERTURBED ANONYMIZATION: TWO LEVEL SMART PRIVACY FOR LBS MOBILE USERS
JPJ1424 Privacy-Preserving and Content-Protecting Location Based Queries
Hiding in the mobile crowd location privacy through collaboration
azd document
External Defense (TTP based LBS System)
LPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBS
A survey on hiding user privacy in location based services through clustering
Anonymous Usage of Location-Based Services Through Spatial and.docx
2014 IEEE DOTNET DATA MINING PROJECT Anonymous query processing in road networks
IEEE 2014 DOTNET DATA MINING PROJECTS Anonymous query processing in road netw...
H017665256
Privacy - Preserving Reputation with Content Protecting Location Based Queries
privacy-preserving and content-protecting location based queries
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
User defined privacy grid system for continuous location based services abstract
phd_final_defense
Ad

More from IEEEBEBTECHSTUDENTSPROJECTS (20)

DOCX
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Localization of license plate numbe...
DOCX
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Image classification using multisca...
DOCX
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Edge based ivd segmentation system
DOCX
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Designing an-efficient-image
DOCX
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Click prediction-for-web-image-rera...
DOCX
2014 IEEE JAVA IMAGE PROCESSING PROJECT Image classification using multiscale...
DOCX
2014 IEEE JAVA IMAGE PROCESSING PROJECT Hierarchical prediction and context a...
DOCX
2014 IEEE JAVA IMAGE PROCESSING PROJECT Designing an-efficient-image encryption
DOCX
2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...
DOCX
2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...
DOCX
2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...
DOCX
2014 IEEE JAVA SERVICE COMPUTING PROJECT Web service recommendation via explo...
DOCX
2014 IEEE JAVA SERVICE COMPUTING PROJECT Scalable and accurate prediction of ...
DOCX
2014 IEEE JAVA SERVICE COMPUTING PROJECT Privacy enhanced web service composi...
DOCX
2014 IEEE JAVA SERVICE COMPUTING PROJECT Decentralized enactment of bpel proc...
DOCX
2014 IEEE DOTNET SOFTWARE ENGINEERING PROJECT Automatic summarization of bug ...
DOCX
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Repent analyzing the nature of id...
DOCX
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Conservation of information softw...
DOCX
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Automatic summarization of bug re...
DOCX
2014 IEEE JAVA NETWORK SECURITY PROJECT Tradeoff between reliability and secu...
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Localization of license plate numbe...
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Image classification using multisca...
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Edge based ivd segmentation system
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Designing an-efficient-image
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Click prediction-for-web-image-rera...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Image classification using multiscale...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Hierarchical prediction and context a...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Designing an-efficient-image encryption
2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...
2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Web service recommendation via explo...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Scalable and accurate prediction of ...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Privacy enhanced web service composi...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Decentralized enactment of bpel proc...
2014 IEEE DOTNET SOFTWARE ENGINEERING PROJECT Automatic summarization of bug ...
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Repent analyzing the nature of id...
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Conservation of information softw...
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Automatic summarization of bug re...
2014 IEEE JAVA NETWORK SECURITY PROJECT Tradeoff between reliability and secu...
Ad

Recently uploaded (20)

PDF
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
PPTX
Software Engineering and software moduleing
PDF
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
PDF
Level 2 – IBM Data and AI Fundamentals (1)_v1.1.PDF
PDF
22EC502-MICROCONTROLLER AND INTERFACING-8051 MICROCONTROLLER.pdf
PPTX
Sorting and Hashing in Data Structures with Algorithms, Techniques, Implement...
PDF
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
PPTX
tack Data Structure with Array and Linked List Implementation, Push and Pop O...
PPTX
Fundamentals of safety and accident prevention -final (1).pptx
PDF
Soil Improvement Techniques Note - Rabbi
PDF
737-MAX_SRG.pdf student reference guides
PDF
Categorization of Factors Affecting Classification Algorithms Selection
PDF
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
PPT
Total quality management ppt for engineering students
PDF
distributed database system" (DDBS) is often used to refer to both the distri...
PPTX
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
PPTX
Amdahl’s law is explained in the above power point presentations
PDF
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
PDF
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
PPTX
CURRICULAM DESIGN engineering FOR CSE 2025.pptx
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
Software Engineering and software moduleing
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
Level 2 – IBM Data and AI Fundamentals (1)_v1.1.PDF
22EC502-MICROCONTROLLER AND INTERFACING-8051 MICROCONTROLLER.pdf
Sorting and Hashing in Data Structures with Algorithms, Techniques, Implement...
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
tack Data Structure with Array and Linked List Implementation, Push and Pop O...
Fundamentals of safety and accident prevention -final (1).pptx
Soil Improvement Techniques Note - Rabbi
737-MAX_SRG.pdf student reference guides
Categorization of Factors Affecting Classification Algorithms Selection
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
Total quality management ppt for engineering students
distributed database system" (DDBS) is often used to refer to both the distri...
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
Amdahl’s law is explained in the above power point presentations
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
CURRICULAM DESIGN engineering FOR CSE 2025.pptx

2014 IEEE JAVA SERVICE COMPUTING PROJECT A novel time obfuscated algorithm for trajectory privacy protection

  • 1. GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com A Novel Time-Obfuscated Algorithm for Trajectory Privacy Protection ABSTRACT: Location-based services (LBS) which bring so much convenience to our daily life have been intensively studied over the years. Generally, an LBS query processing can be categorized into snapshot and continuous queries which access user location information and return search results to the users. An LBS has full control of the location information, causing user privacy concerns. If an LBS provider has a malicious intention to breach the user privacy by tracking the users’ routes to their destinations, it incurs a serious threat. Most existing techniques have addressed privacy protection mainly for snapshot queries. However, providing privacy protection for continuous queries is of importance, since a maliciousLBS can easily obtain complete user privacy information by observing a sequence of successive query requests. In this paper, we propose a comprehensive trajectory privacy technique and combine ambient conditions to cloak location information based on the user privacy profile to avoid a malicious LBS reconstructing a user trajectory. We first propose an r-anonymity mechanism which pre-processes a set of similar trajectories R to blur the actual trajectory of a service user. We then combine kanonymity with s road segments to protect the user’s privacy. We introduce a novel time-obfuscated technique which breaks the sequence of the query issuing time for a service user to confuse the LBS so it does not know the user trajectory, by sending a query randomly from a set of locations residing at the different trajectories in R. Despite the randomness incurred from the obfuscation process for providing strong trajectory privacy protection, the experimentalresults show that our
  • 2. trajectory privacy technique maintains the correctness of the query results at a competitive computational cost. EXISTING SYSTEM: Most existing techniques have addressed privacy protection mainly for snapshot queries. However, providing privacy protection for continuous queries is of importance, since a malicious LBS can easily obtain complete user privacy information by observing a sequence of successive query requests. The existing techniques for protecting trajectory privacy have some weaknesses. For example, the solution proposed by faces the weakness that when there is an empty set of users on an anonymous trajectory, a malicious LBS can easily speculate the queries sent by the service user and track the trajectories to identify the user PROPOSED SYSTEM: Atime-obfuscated approach is proposed to randomize the sequence of the query issuing time by sending a query randomly from a set of locations residing at the trajectory set R. we have proposed a novel technique for trajectory privacy protection, which considers a long-term disclosure issue as well as the real-time ambient conditions. We introduce a time obfuscated technique to dramatically increase the level of trajectory privacy protection. We allow the users to specify their own privacy profile, and our time obfuscated method integrates the r-anonymity, k-anonymity and ssegment paradigms. As the experimental results have shown, our privacy technique is able to protect the user trajectory and prevent the LBS from reconstructing a user’s actual trajectory and the direction. CONCLUSION: In this paper, we have proposed a novel technique for trajectory privacy protection, which considers a long-term disclosure issue aswell as the real time ambient conditions. We introduce a time-obfuscated technique to dramatically increase the level of trajectory privacy protection. We allow the users to specify their own privacy profile,
  • 3. and our timeobfuscated method integrates the r-anonymity, k-anonymity and s-segment paradigms. As the experimental results have shown, our privacy technique is able to protect the user trajectory and prevent the LBS from reconstructing a user’s actual trajectory and the direction. Our method guarantees satisfying the user’s privacy profile for providing stronger privacy protection. SYSTEM CONFIGURATION:- HARDWARE CONFIGURATION:-  Processor - Pentium –IV  Speed - 1.1 Ghz  RAM - 256 MB(min)  Hard Disk - 20 GB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - SVGA SOFTWARE CONFIGURATION:-  Operating System : Windows XP  Programming Language : JAVA  Java Version : JDK 1.6 & above.