SlideShare a Scribd company logo
ECWAY TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE
CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111
VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE
IN A LOCATION PROOF UPDATING SYSTEM
ABSTRACT:
Today's location-sensitive service relies on user's mobile device to determine the current
location. This allows malicious users to access a restricted resource or provide bogus alibis by
cheating on their locations. To address this issue, we propose A Privacy-Preserving LocAtion
proof Updating System (APPLAUS) in which colocated Bluetooth enabled mobile devices
mutually generate location proofs and send updates to a location proof server. Periodically
changed pseudonyms are used by the mobile devices to protect source location privacy from
each other, and from the untrusted location proof server.

We develop user-centric location privacy model in which individual users evaluate their location
privacy levels and decide whether and when to accept the location proof requests. In order to
defend against colluding attacks, we also present betweenness ranking-based and correlation
clustering-based approaches for outlier detection. APPLAUS can be implemented with existing
network infrastructure, and can be easily deployed in Bluetooth enabled mobile devices with
little computation or power cost. Extensive experimental results show that APPLAUS can
effectively provide location proofs, significantly preserve the source location privacy, and
effectively detect colluding attacks.

More Related Content

PPTX
2016 Public Safety Vision Strategy Direction - Avaya
PPT
Powerpoint
PPTX
Mobile computing
PDF
Future of Mobile Authentication
PPTX
Future Mobile Technologies That Could Arrive in 2017
PPTX
I locate security for lost or misplaced devices PPT
PPTX
Must Have Utility App for android
PPTX
Basic Android Phone Workshop
2016 Public Safety Vision Strategy Direction - Avaya
Powerpoint
Mobile computing
Future of Mobile Authentication
Future Mobile Technologies That Could Arrive in 2017
I locate security for lost or misplaced devices PPT
Must Have Utility App for android
Basic Android Phone Workshop

Viewers also liked (14)

PPTX
Segurança do WordPress
PPT
Lallo Portfolio
PDF
Put-Your-House-in-Order-1
PPTX
Erika cepeda
DOCX
Case Presentation_Patient Case
DOC
Comunicado Kilometro del Juguete en san Pedro Garza Garcia
PDF
Praktikum 1
DOC
Logam mesin installation and commisioning 4
PPTX
Paracas national reserve
DOC
Logam mesin maintenance and diagnostic mechanical 2 (17)
DOC
Basco Paints Logo
PDF
Rico Bryant
PDF
License your data and metadata et
DOCX
Sistemas gestoresdebasededatos
Segurança do WordPress
Lallo Portfolio
Put-Your-House-in-Order-1
Erika cepeda
Case Presentation_Patient Case
Comunicado Kilometro del Juguete en san Pedro Garza Garcia
Praktikum 1
Logam mesin installation and commisioning 4
Paracas national reserve
Logam mesin maintenance and diagnostic mechanical 2 (17)
Basco Paints Logo
Rico Bryant
License your data and metadata et
Sistemas gestoresdebasededatos
Ad

Similar to Android toward privacy preserving and collusion resistance in a location proof updating system (20)

PDF
Toward privacy preserving and collusion resistance in a location proof updati...
DOCX
Toward privacy preserving and collusion resistance in a location proof updati...
PDF
Android toward privacy preserving and collusion resistance in a location pro...
DOCX
Android toward privacy preserving and collusion resistance in a location pro...
PDF
Java toward privacy preserving and collusion resistance in a location proof ...
DOCX
Toward privacy preserving and collusion resistance in a location proof updati...
PDF
Discovery and verification of neighbor positions in mobile ad hoc networks
PDF
Discovery and verification of neighbor positions in mobile ad hoc networks
PDF
Android discovery and verification of neighbor positions in mobile ad hoc ne...
PDF
Discovery and verification of neighbor positions in mobile ad hoc networks
PDF
Android discovery and verification of neighbor positions in mobile ad hoc ne...
PDF
Android discovery and verification of neighbor positions in mobile ad hoc ne...
PDF
Dotnet discovery and verification of neighbor positions in mobile ad hoc net...
PDF
Android discovery and verification of neighbor positions in mobile ad hoc ne...
PDF
Android discovery and verification of neighbor positions in mobile ad hoc ne...
PDF
Android discovery and verification of neighbor positions in mobile ad hoc ne...
PDF
Android discovery and verification of neighbor positions in mobile ad hoc ne...
PDF
Dotnet discovery and verification of neighbor positions in mobile ad hoc net...
PDF
Android discovery and verification of neighbor positions in mobile ad hoc ne...
PDF
PLNOG15: Find the location of your superhero with 802.11 - Sebastian Pasternacki
Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...
Android toward privacy preserving and collusion resistance in a location pro...
Android toward privacy preserving and collusion resistance in a location pro...
Java toward privacy preserving and collusion resistance in a location proof ...
Toward privacy preserving and collusion resistance in a location proof updati...
Discovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networks
Android discovery and verification of neighbor positions in mobile ad hoc ne...
Discovery and verification of neighbor positions in mobile ad hoc networks
Android discovery and verification of neighbor positions in mobile ad hoc ne...
Android discovery and verification of neighbor positions in mobile ad hoc ne...
Dotnet discovery and verification of neighbor positions in mobile ad hoc net...
Android discovery and verification of neighbor positions in mobile ad hoc ne...
Android discovery and verification of neighbor positions in mobile ad hoc ne...
Android discovery and verification of neighbor positions in mobile ad hoc ne...
Android discovery and verification of neighbor positions in mobile ad hoc ne...
Dotnet discovery and verification of neighbor positions in mobile ad hoc net...
Android discovery and verification of neighbor positions in mobile ad hoc ne...
PLNOG15: Find the location of your superhero with 802.11 - Sebastian Pasternacki
Ad

More from Ecwayt (20)

PDF
Covering points of interest with mobile sensors
PDF
Coloring based inter-wban scheduling for mobile wireless body area networks
DOC
Code modulation based encryption & decryption technique for secure communicat...
PDF
Clustering sentence level text using a novel fuzzy relational clustering algo...
PDF
Clustering large probabilistic graphs
PDF
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligence
PDF
Cloudsim ranking on data manifold with sink points
PDF
Cloudsim quality-differentiated video multicast in multirate wireless networks
PDF
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
PDF
Cloudsim distributed web systems performance forecasting using turning bands...
PDF
Cloudsim distributed processing of probabilistic top-k queries in wireless s...
DOCX
Civil 2013 titles
DOC
Chopper based dc motor speed control
PDF
Channel assignment for throughput optimization in multichannel multiradio wir...
PDF
Channel allocation and routing in hybrid multichannel multiradio wireless mes...
PDF
Casual stereoscopic photo authoring
DOCX
Casual stereoscopic photo authoring
PDF
Capacity of hybrid wireless mesh networks with random a ps
DOC
Bomb detection robot with wireless camera
DOC
Bed side patients monitoring system with emergency alert
Covering points of interest with mobile sensors
Coloring based inter-wban scheduling for mobile wireless body area networks
Code modulation based encryption & decryption technique for secure communicat...
Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering large probabilistic graphs
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligence
Cloudsim ranking on data manifold with sink points
Cloudsim quality-differentiated video multicast in multirate wireless networks
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
Cloudsim distributed web systems performance forecasting using turning bands...
Cloudsim distributed processing of probabilistic top-k queries in wireless s...
Civil 2013 titles
Chopper based dc motor speed control
Channel assignment for throughput optimization in multichannel multiradio wir...
Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Casual stereoscopic photo authoring
Casual stereoscopic photo authoring
Capacity of hybrid wireless mesh networks with random a ps
Bomb detection robot with wireless camera
Bed side patients monitoring system with emergency alert

Android toward privacy preserving and collusion resistance in a location proof updating system

  • 1. ECWAY TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111 VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM ABSTRACT: Today's location-sensitive service relies on user's mobile device to determine the current location. This allows malicious users to access a restricted resource or provide bogus alibis by cheating on their locations. To address this issue, we propose A Privacy-Preserving LocAtion proof Updating System (APPLAUS) in which colocated Bluetooth enabled mobile devices mutually generate location proofs and send updates to a location proof server. Periodically changed pseudonyms are used by the mobile devices to protect source location privacy from each other, and from the untrusted location proof server. We develop user-centric location privacy model in which individual users evaluate their location privacy levels and decide whether and when to accept the location proof requests. In order to defend against colluding attacks, we also present betweenness ranking-based and correlation clustering-based approaches for outlier detection. APPLAUS can be implemented with existing network infrastructure, and can be easily deployed in Bluetooth enabled mobile devices with little computation or power cost. Extensive experimental results show that APPLAUS can effectively provide location proofs, significantly preserve the source location privacy, and effectively detect colluding attacks.