SlideShare a Scribd company logo
ANALYSIS THE SECURE CONTENT
PROTECTING LOCATION BASED ON
QUERIES
Guided by
Ms v.Anusuya M.E
AP/IT
Presented by
PR.Kavidha(912411205006)
C.Vasanthi(912411205010)
ABSTRACT
• A solution to one of the location-based query problems. user wants
to query a database of location data, known as Points Of Interest.
• The first step is based on Oblivious Transfer. The second step is
based on Private Information Retrieval, to achieve a secure solution
for both parties.
• The solution we present is efficiency of our protocol. We also
introduce a security model and analyse the security in the context of
novel protocol.
EXISTING SYSTEM
• The location server (LS),which offers somes LBS spends its
resources to compile information about various interestingPOI.
• LS’sdata is not accessed by any unauthorized user.
Disadvantage:
• Not protected for the user and server.
• privacy assurance is the major issue
MODEL OF EXISTING SYSTEM
PROPOSED SYSTEM
• Location based queries that as major performance improvement two
stages.
• First stage the user privately determines his/her location within a
public grid,using oblivioues transfer.
• Second stage ,the user execute a communicational efficient PIR,to
retrieve the appropriate block in the private grid.
ADVANTAGES
• Redesigned the key structure
• Added a formal security model
• Implemented the solution of mobile device and desktop machine
ARCHITECTURE DESIGN
OBLIVIOUS TRANSFER PHASE
• QueryGeneration1 (Client) (QG1): QueryGeneration1 (Client) takes
as input indices i, j, and the dimensions of the key matrix m, n, and
outputs a query Q1 and secret s1, denoted as (Q1, s1) = QG1 (i, j, m,
n).
• ResponseGeneration1 (Server) (RG1): ResponseGeneration1
(Server) takes as input the key matrix Km×n, and the query Q1, and
outputs a response R1, denoted as (R1) = RG1(Km×n,Q1).
• ResponseRetrieval1 (Client) (RR1): ResponseRetrieval1 (Client)
takes as input indices i, j, denoted as (ki,j, IDi,j) = RR1 (i, j, m, n,
(Q1, s1),R1).
PRIVATE INFORMATION
RETRIEVAL PHASE
• QueryGeneration2 (Client) (QG2): QueryGeneration2 (Server) takes
as input the cell-id IDi,j , and the set of prime powers S, and outputs
a query Q2 and secret s2, denoted as (Q2, s2) = QG2(IDi,j , S).
• ResponseGeneration2 (Server) (RG2): ResponseGeneration2
(Server) takes as input the database D.
• ResponseRetrieval2 (Client) (RR2): ResponseRetrieval2(Client)
takes as input the cell-key ki,j and cell-id IDi,j , the query Q2 and
secret s2, the response R2, and outputs the data d, denoted as (d)
=RR2(ki,j, IDi,j , (Q2, s2),R2).
MODULES
1. Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure
2. Expedite Message Authentication Protocol
3. Security Analysis
a) Hash Chain Values
b) Resistance of forging attacks
c) Forward secrecy
d) Resistance to replay attacks
e) Resistance to colluding attacks
MODULES DESCRIPTION
1. Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure
• In this Module, the two basic communication modes, which
respectively allow OBUs to communicate with each other and with
the infrastructure RSUs.
• Since vehicles communicate through wireless channels, a variety of
attacks such as injecting false information, modifying and replaying
the disseminated messages can be easily launched.
2.Expedite Message Authentication Protocol
• A Trusted Authority (TA): Providing anonymous certificate and
Distributing secret keys to all OBUs in the network.
• Roadside units (RSUs): which are fixed units distributed all over
the network. The RSUsCan communicate securely with the TA.
• On-Board Units (OBUs): which are embedded in vehicles? OBUs
can communicate either with other OBUs through V2V
communications or with RSUs through V2I communications.
3.Security Analysis
– Hash Chain Values
• The values of the hash chains are continuously used in the revocation
processes, and hence, the TA can consume all the hash chain values.
– Resistance of forging attacks
• Find the TA secret key and signature. To the revocation check and
TA message and signature are unforgetable.
CENTRALIZED SERVER
FIRST MOBILE HOST
•
SECOND MOBILE HOST
THIRD MOBILE HOST
•
SENDING TO SERVER
RESPONSE SEND TO MIS
CENTRALIZED SERVER
REPORT
CONCLUSION
• A location based query solution that employs two protocols that
enables a user to privately determine and acquire location data.
REFERENCES
[1] (2011, Jul. 7) Openssl [Online]. Available:
http://www.openssl.org/
[2] M. Bellare and S. Micali, “Non-interactive oblivious transfer and
applications,” in Proc. CRYPTO, 1990, pp. 547–557.
[3] A. Beresford and F. Stajano, “Location privacy in pervasive
computing,”IEEE Pervasive Comput., vol. 2, no. 1, pp. 46–55, Jan.–
Mar.2003.

More Related Content

DOCX
privacy-preserving and content-protecting location based queries
DOC
Privacy preserving and content-protecting location based queries
PDF
privacy preserving abstract
DOCX
IEEE 2014 JAVA DATA MINING PROJECTS Privacy preserving and content-protecting...
PDF
A Survey of Techniques against Security Threats in Mobile Ad Hoc Networks
DOCX
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
PDF
Survey of Security Threats and Protection Techniques in Mobile Ad Hoc Networks
PDF
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
privacy-preserving and content-protecting location based queries
Privacy preserving and content-protecting location based queries
privacy preserving abstract
IEEE 2014 JAVA DATA MINING PROJECTS Privacy preserving and content-protecting...
A Survey of Techniques against Security Threats in Mobile Ad Hoc Networks
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Survey of Security Threats and Protection Techniques in Mobile Ad Hoc Networks
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...

What's hot (19)

PDF
New Security Threats and Protection Techniques in Mobile Ad Hoc Networks
PPTX
Attribute Based Encryption with Privacy Preserving In Clouds
DOCX
Control cloud data access privilege and anonymity with fully anonymous attrib...
DOCX
Control cloud data access privilege and
PPTX
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
DOCX
Preserving location privacy in geo social applications
DOCX
preserving location privacy in geosocial applications
DOCX
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
DOCX
A secure protocol for spontaneous wireless ad hoc networks creation
PPTX
Panda public auditing for shared data with efficient user revocation in the c...
PDF
Preserving location privacy in geo social applications
PDF
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
PPT
PPT FOR IDBSDDS SCHEMES
PDF
Asymmetrical Encryption for Wireless Sensor Networks: A Comparative Study
PPTX
Distributed System - Security
PDF
Secure Data Sharing Algorithm for Data Retrieval In Military Based Networks
DOCX
Privacy preserving delegated access control in public clouds
DOCX
Privacy preserving delegated access control in public clouds
PPSX
Final year presentation
New Security Threats and Protection Techniques in Mobile Ad Hoc Networks
Attribute Based Encryption with Privacy Preserving In Clouds
Control cloud data access privilege and anonymity with fully anonymous attrib...
Control cloud data access privilege and
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
Preserving location privacy in geo social applications
preserving location privacy in geosocial applications
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
A secure protocol for spontaneous wireless ad hoc networks creation
Panda public auditing for shared data with efficient user revocation in the c...
Preserving location privacy in geo social applications
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
PPT FOR IDBSDDS SCHEMES
Asymmetrical Encryption for Wireless Sensor Networks: A Comparative Study
Distributed System - Security
Secure Data Sharing Algorithm for Data Retrieval In Military Based Networks
Privacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public clouds
Final year presentation
Ad

Similar to Analysis the Privacy preserving and content protecting location based on queries (20)

PDF
Secure Checkpointing Approach for Mobile Environment
PPTX
Remote authentication via biometrics1
PDF
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
PDF
First SCADA LAB International Workshop
PDF
Administrator&trust based routing protocol
PDF
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
PPTX
Space Rovers and Surgical Robots: System Architecture Lessons from Mars
PPTX
Ithings2012 20nov
PPTX
Proof of Transit: Securely Verifying a Path or Service Chain
PDF
IRJET- Enhancing Network Security by Modified Secure Dynamic Path Identifiers
PDF
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
PDF
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
PDF
Security for automation in Internet of Things by using one time password
PDF
Node Legitimacy Based False Data Filtering Scheme in Wireless Sensor Networks
PDF
End-to-End Security in Mobile-Cloud Computing
PPTX
A study of cryptography for satellite applications
PDF
Guillou-quisquater protocol for user authentication based on zero knowledge p...
PDF
Implementation Secure Authentication Using Elliptic Curve Cryptography
PDF
Notes On N + N
PDF
EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME WITH ...
Secure Checkpointing Approach for Mobile Environment
Remote authentication via biometrics1
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
First SCADA LAB International Workshop
Administrator&trust based routing protocol
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
Space Rovers and Surgical Robots: System Architecture Lessons from Mars
Ithings2012 20nov
Proof of Transit: Securely Verifying a Path or Service Chain
IRJET- Enhancing Network Security by Modified Secure Dynamic Path Identifiers
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Security for automation in Internet of Things by using one time password
Node Legitimacy Based False Data Filtering Scheme in Wireless Sensor Networks
End-to-End Security in Mobile-Cloud Computing
A study of cryptography for satellite applications
Guillou-quisquater protocol for user authentication based on zero knowledge p...
Implementation Secure Authentication Using Elliptic Curve Cryptography
Notes On N + N
EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME WITH ...
Ad

Recently uploaded (20)

PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
UNIT 4 Total Quality Management .pptx
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
Geodesy 1.pptx...............................................
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PDF
Well-logging-methods_new................
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
Foundation to blockchain - A guide to Blockchain Tech
DOCX
573137875-Attendance-Management-System-original
PDF
composite construction of structures.pdf
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
Automation-in-Manufacturing-Chapter-Introduction.pdf
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
UNIT 4 Total Quality Management .pptx
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Model Code of Practice - Construction Work - 21102022 .pdf
Geodesy 1.pptx...............................................
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Operating System & Kernel Study Guide-1 - converted.pdf
CYBER-CRIMES AND SECURITY A guide to understanding
Well-logging-methods_new................
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Foundation to blockchain - A guide to Blockchain Tech
573137875-Attendance-Management-System-original
composite construction of structures.pdf
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS

Analysis the Privacy preserving and content protecting location based on queries

  • 1. ANALYSIS THE SECURE CONTENT PROTECTING LOCATION BASED ON QUERIES Guided by Ms v.Anusuya M.E AP/IT Presented by PR.Kavidha(912411205006) C.Vasanthi(912411205010)
  • 2. ABSTRACT • A solution to one of the location-based query problems. user wants to query a database of location data, known as Points Of Interest. • The first step is based on Oblivious Transfer. The second step is based on Private Information Retrieval, to achieve a secure solution for both parties. • The solution we present is efficiency of our protocol. We also introduce a security model and analyse the security in the context of novel protocol.
  • 3. EXISTING SYSTEM • The location server (LS),which offers somes LBS spends its resources to compile information about various interestingPOI. • LS’sdata is not accessed by any unauthorized user. Disadvantage: • Not protected for the user and server. • privacy assurance is the major issue
  • 5. PROPOSED SYSTEM • Location based queries that as major performance improvement two stages. • First stage the user privately determines his/her location within a public grid,using oblivioues transfer. • Second stage ,the user execute a communicational efficient PIR,to retrieve the appropriate block in the private grid.
  • 6. ADVANTAGES • Redesigned the key structure • Added a formal security model • Implemented the solution of mobile device and desktop machine
  • 8. OBLIVIOUS TRANSFER PHASE • QueryGeneration1 (Client) (QG1): QueryGeneration1 (Client) takes as input indices i, j, and the dimensions of the key matrix m, n, and outputs a query Q1 and secret s1, denoted as (Q1, s1) = QG1 (i, j, m, n). • ResponseGeneration1 (Server) (RG1): ResponseGeneration1 (Server) takes as input the key matrix Km×n, and the query Q1, and outputs a response R1, denoted as (R1) = RG1(Km×n,Q1). • ResponseRetrieval1 (Client) (RR1): ResponseRetrieval1 (Client) takes as input indices i, j, denoted as (ki,j, IDi,j) = RR1 (i, j, m, n, (Q1, s1),R1).
  • 9. PRIVATE INFORMATION RETRIEVAL PHASE • QueryGeneration2 (Client) (QG2): QueryGeneration2 (Server) takes as input the cell-id IDi,j , and the set of prime powers S, and outputs a query Q2 and secret s2, denoted as (Q2, s2) = QG2(IDi,j , S). • ResponseGeneration2 (Server) (RG2): ResponseGeneration2 (Server) takes as input the database D. • ResponseRetrieval2 (Client) (RR2): ResponseRetrieval2(Client) takes as input the cell-key ki,j and cell-id IDi,j , the query Q2 and secret s2, the response R2, and outputs the data d, denoted as (d) =RR2(ki,j, IDi,j , (Q2, s2),R2).
  • 10. MODULES 1. Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure 2. Expedite Message Authentication Protocol 3. Security Analysis a) Hash Chain Values b) Resistance of forging attacks c) Forward secrecy d) Resistance to replay attacks e) Resistance to colluding attacks
  • 11. MODULES DESCRIPTION 1. Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure • In this Module, the two basic communication modes, which respectively allow OBUs to communicate with each other and with the infrastructure RSUs. • Since vehicles communicate through wireless channels, a variety of attacks such as injecting false information, modifying and replaying the disseminated messages can be easily launched.
  • 12. 2.Expedite Message Authentication Protocol • A Trusted Authority (TA): Providing anonymous certificate and Distributing secret keys to all OBUs in the network. • Roadside units (RSUs): which are fixed units distributed all over the network. The RSUsCan communicate securely with the TA. • On-Board Units (OBUs): which are embedded in vehicles? OBUs can communicate either with other OBUs through V2V communications or with RSUs through V2I communications.
  • 13. 3.Security Analysis – Hash Chain Values • The values of the hash chains are continuously used in the revocation processes, and hence, the TA can consume all the hash chain values. – Resistance of forging attacks • Find the TA secret key and signature. To the revocation check and TA message and signature are unforgetable.
  • 21. CONCLUSION • A location based query solution that employs two protocols that enables a user to privately determine and acquire location data.
  • 22. REFERENCES [1] (2011, Jul. 7) Openssl [Online]. Available: http://www.openssl.org/ [2] M. Bellare and S. Micali, “Non-interactive oblivious transfer and applications,” in Proc. CRYPTO, 1990, pp. 547–557. [3] A. Beresford and F. Stajano, “Location privacy in pervasive computing,”IEEE Pervasive Comput., vol. 2, no. 1, pp. 46–55, Jan.– Mar.2003.