SlideShare a Scribd company logo
9 International Journal for Modern Trends in Science and Technology
International Journal for Modern Trends in Science and Technology
Volume: 02, Issue No: 11, November 2016
http://www.ijmtst.com
ISSN: 2455-3778
Cloaking Areas Location Based Services Using
Dynamic Grid System & Privacy Encryption
S. Prashanth1
| Ms. L. Sunitha Rani2
1PG Scholar, Department of CSE, Geethanjali Engineering College, Nannur-V, Kurnool-Dist.
2Assistant Professor, Department of CSE, Geethanjali Engineering College, Nannur-V, Kurnool-Dist.
To Cite this Article
S. Prashanth, Ms. L. Sunitha Rani, Cloaking Areas Location Based Services Using Dynamic Grid System & Privacy
Encryption, International Journal for Modern Trends in Science and Technology, Vol. 02, Issue 11, 2016, pp. 9-13.
Due to the large increasing use of Location Based Services (LBS), which require personal data of the user to
provide the continuous service, protecting the privacy of these data has become a challenge. An approach to
preserving a privacy is through anonymity, by hiding the identity and user location data of the mobile device
from the service provider(third party) or from any unauthorized party who has access at the user’s request
.Considering the challenge mentioned, in this paper gives a classification according to the Architecture,
approaches and techniques used in previous works, and presents a survey of solutions to provide anonymity
in LBS including the open issues or possible improvements to current solutions. All of this, in order to provide
guidelines for choosing the best solution approach to a specific scenery in which anonymity is required.
KEYWORDS: Dynamic grid system, cloaking areas, location based services, Encryption, privacy.
Copyright © 2016 International Journal for Modern Trends in Science and Technology
All rights reserved.
I. INTRODUCTION
The consumer market for location-based
services (LBS) is estimated to grow from 2.9 billion
dollars in 2010 to 10.4 billion dollars in 2015.
While navigation applications are currently
generating the most significant revenues, location
based advertising and local search will be driving
the revenues going forward. The legal landscape,
unfortunately, is unclear about what happens to a
subscriber's location data. The nonexistence of
regulatory controls has led to a growing concern
about potential privacy violations arising out of the
usage of a location-based application. While new
regulations to plug the loopholes are being sought,
the privacy conscious user currently feels reluctant
to adopt one of the most functional business
models of the decade. Privacy and usability are two
equally important requirements for successful
realization of a location-based application. Privacy
(location) is loosely defined as a “personally”
assessed restriction on when and where someone’s
position is deemed appropriate for disclosure. To
begin with, this is a very dynamic concept.
Usability has a twofold meaning: a) privacy
controls should be intuitive yet flexible, and b) the
intended purpose of an application is reasonably
maintained. Towards this end, prior research has
led to the development of a number of privacy
criteria, and algorithms for their optimal
achievement.
However, there is no known attempt to bring
into view the mutual interactions between the
accuracy of a location coordinate and the service
quality from an application using those
coordinates. Therefore, the question of what
minimal location accuracy is required for a LBS
application to function remains open. The common
ABSTRACT
10 International Journal for Modern Trends in Science and Technology
S. Prashanth, Ms. L. Sunitha Rani : Cloaking Areas Location Based Services Using Dynamic Grid System & Privacy
Encryption
man’s question is: “how important is my position to
get me to the nearest coffee shop?” which
unfortunately remains unanswered in the scientific
community. It is worth mentioning that a separate
line of research in analyzing anonymous location
traces has revealed that user locations are heavily
correlated, and knowing a few frequently visited
locations can easily identify the user behind a
certain trace. The privacy breach in these cases
occurs because the location to identity mapping
results in a violation of user anonymity. The
proposal in this work attempts to prevent the
reverse mapping from user identity to user location
in a user-controllable manner.
The term Location-Based Services (LBS) is a
recent concept that denotes applications
integrating with the general notion of services.
Examples of such applications include emergency
services, car navigation systems, tourist tour
planning, or information delivery. In the modern
environment each and every users has lots and lots
of queries to analyze the locations in a global place,
in that case the main motivate of server is to
successfully serve the response to all the requestor
without any delay as well as maintain the privacy
of individuals. The basic idea of every server is the
concept of load balancing; here the server requires
reducing the number of queries submitted by
mobile clients and query load on the server.
However, mobile clients suffer from longer waiting
time for the server to compute valid regions.
II. PRIVATE INFORMATION RETRIEVAL (PIR) OR
OBLIVIOUS TRANSFER (OT)
In paper [19] the authors find the problem of
protecting location privacy of the mobile user to an
Oblivious transfer problem, where the issuer of the
request receives only its corresponding reply and
the service provider remains oblivious of the
location of the user. Further on, they design some
solutions based on different kinds of Oblivious
Transfer (OT) namely Adaptive OT (implementing
blind signatures), Dynamic OT and Proxy OT. They
propose the solutions but do not provide any
further analysis on the correctness or feasibility of
their proposals. Based on [19], the authors in [20]
propose an improved protocol by using two
oblivious transfers where no third party is required
to enable user’s privacy. They assume the
existence of a total server, which is responsible of a
group of LBS providers. The user has to perform a
double OT implemented with blind signatures in
order to get the key required response to the query.
This solution is thought for LBS that require
payment.
Although PIR or OT techniques do not require a
third party, they incur a much higher
communication overhead between the user and the
service provider, requiring the transmission of
much more information than the user actually
needs.
III. DYNAMIC GRID SYSTEM
3.1 Spatial Cloaking
This technique is the most commonly used for
protecting user location data from the third party
attackers where in this technique extracted user
location is blurred before submitting into service
provider server for processing The solution
proposed in this area is further classified by the
architectural approach.
3.2 Semi Trusted Third Party (Dynamic Grid
System)
To overcome the problem of in the above
architecture propose a new architecture called
dynamic grid system (DGS) [4] to provide privacy-
preserving snapshot and continuous LBS. The
main idea is to place a semi-trusted third party,
termed query server (QS), between the user and the
service provider. QS only needs to be semi-trusted
because it will not collect/ store or even have
access to any user location information.
Fig: 1. Architecture
The user encrypts a query that includes the
information of the query area and the dynamic grid
structure, and encrypts the identity of each grid
cell intersecting the required search area of the
spatial query to produce a set of encrypted
identifiers. Next, the user sends a request
including (1) the encrypted query and (2) the
encrypted identifiers to QS, which is a semi-trusted
party located between the user and SP. QS stores
the encrypted identifiers and forwards the
encrypted query to SP specified by the user. SP
11 International Journal for Modern Trends in Science and Technology
S. Prashanth, Ms. L. Sunitha Rani : Cloaking Areas Location Based Services Using Dynamic Grid System & Privacy
Encryption
decrypts the query and selects the POIs within the
query area from its database. For each selected
POI, SP encrypts its information, using the
dynamic grid structure specified by the user to find
a grid cell covering the POI, and encrypts the cell
identity to produce the encrypted identifier for that
POI. The encrypted POIs with their corresponding
encrypted identifiers are returned to QS. QS stores
the set of encrypted POIs and only returns to the
user a subset of encrypted POIs whose
corresponding identifiers match any one of the
encrypted identifiers initially sent by the user
Algorithm for DGS
Input: User location (x, y), POI data P
Output: User's POI Query data U(P).
Initialization:
i. User Select POI Type P(t), QS Query Server, SP
Service Provider.
ii. User set location, defined x, y (Current exact
Location).
letxu,yu∈ U,
Map.getBounds(xu,yu)
return(xb,yb), ( xt,yt) where b- bottom, t- top
Key Derivation Function KDF()
returnsk (random key)
Enc(query) = IBE(P(t), k, ( xb,yb), ( xt,yt)) // At User
side
Enc(query), User data of U fwd toQS.
Create ID for Query and fwdEnc(query) to SP
Decrpt(query) at SP,
get (xc,yc)= Map.getCenter(( xb,yb), ( xt,yt));
while data != nulll
get POI P ∈ P(t),
sort based on dist,
create Query Set U(p).
end while
return Query Set U(p) to QS
At QS, fwd Query Set to User
Decrpt(query set U(P)) at USer,
3.3 Identity Based Encryption (IBE)
For an effective key management system these
are all requirements 2] Authenticate users and
decrypt data 3] Manage keys with partners 4]
Deliver keys to trusted infrastructure components
5] Recover keys
Adi Shamir, one of the pioneers of public key
cryptography, proposed a new type of public key
algorithm in 1984. While public key systems have
the inherent problem of distributing public keys
and tying those public keys to a specific receiver.
The scheme has chosen cipher text security in the
random oracle model assuming a variant of the
computational Diffie- Hellman problem. This
system is based on bilinear maps between groups.
In this paper we propose a fully functional
identity-based encryption scheme. The
performance of our system is comparable to the
performance of ElGamal encryption. The security
of our system is based on a natural analogue of the
computational Diffie-Hellman assumption. this
assumption showed that the new system has
chosen cipher text security in the random oracle
model. Using standard techniques from threshold
cryptography [23, 24] the PKG in our scheme can
be distributed so that the master-key is never
available in a single location.
Comparisons Table
Parameter Existing
System
(TTP)
Proposed
System (DGS)
Computation
Cost(Number of POIs)
0.6 1.4
Communication
Cost(Number of POIs)
1000 10000
Computation Cost
Number of Users
(thousands)
0.8 0.6
Communication Cost
Number of Users
(thousands)
0.1 25
K-Anonymity
Computation Cost
0.2 10
K-Anonymity
Communication Cost
0.1 10
IV. RESULTS
Fig.2 .Grid of user location preparation.
12 International Journal for Modern Trends in Science and Technology
S. Prashanth, Ms. L. Sunitha Rani : Cloaking Areas Location Based Services Using Dynamic Grid System & Privacy
Encryption
Fig. 3. Preparation of Query
Fig 4. Encrypted Query forward to SP at QS
Fig. 5. POI results got at User
V. CONCLUSION
It is necessary to propose new models that
address new threats and attack models, which
seek to break user’s privacy in Location Based
Services. These new models need to overcome the
disadvantages of existing ones. Novel solutions
approaches could combine different proposed
solutions, to compensate the disadvantages of
certain models with the advantages of others.
The job of updating or proposing a new survey
will remain as an open task, as the development of
new solutions to protect user’s privacy in Location
Based Services remains active; moreover it is
necessary to classify the solutions by the privacy
degree they offer, the attack model(s) from which
they are resilient and the type of LBS to which they
can be applied.
REFERENCES
[1] Schiller, J. Voisard, A.: Location-Based Services.
Morgan Kaufmann Publishers (2004)
[2] Mohaisen, A., Hong, D., Nyang, D.: Privacy in
Location based services: Primitives toward the
solution. NCM (2008)
[3] C.-Y. Chow and M. F. Mokbel, “Enabling private
continuous queries for revealed user locations,” in
Proc. 10th Int. Conf. Adv. Spatial Temporal
Databases, 2007, pp. 258–273.
[4] B. Gedik and L. Liu, “Protecting location privacy with
personalized k-anonymity: Architecture and
algorithms,” IEEE Trans. Mobile Comput., vol. 7, no.
1, pp. 1–18, Jan. 2008.
[5] M. Gruteser and D. Grunwald, “Anonymous usage of
locationbased services through spatial and temporal
cloaking,” in Proc. 1st Int. Conf. Mobile Syst., Appl.
Services, 2003, pp. 31–42.
[6] P. Kalnis, G. Ghinita, K. Mouratidis, and D.
Papadias, “Preventing location-based identity
inference in anonymous spatial queries,” IEEE
Trans. Knowl. Data Eng., vol. 19, no. 12, pp.
1719–1733, Dec. 2007.
[7] M. F. Mokbel, C.-Y. Chow, and W. G. Aref, “The new
casper: Query processing for location services
withoutcompromising privacy,” in Proc. 32nd Int.
Conf. Very Large Data Bases, 2006, pp. 763–774.
[8] T. Xu and Y. Cai, “Location anonymity in continuous
locationbased services,” in Proc. 15th Annu. ACM
Int. Symp. Adv. Geographic Inf. Syst., 2007, pp.
39:1–39:8.
[9] Kido, H., Yanagisawa, Y., Satoh, T. An Anonymous
Communication Technique using Dummies for
Location-based Services. In: IEEE International
Conference on Pervasive Services ICPS (2005) 88–97
[10]Lu, H., Jensen, C.S., Yiu, M.L.: PAD: Privacy-Area
Aware. Dummy-Based Location Privacy in Mobile
Services MobiDE (2008) 16–23
13 International Journal for Modern Trends in Science and Technology
S. Prashanth, Ms. L. Sunitha Rani : Cloaking Areas Location Based Services Using Dynamic Grid System & Privacy
Encryption
[11]Bamba, B., Liu, L., Pesti, P., Wang, T.: Supporting
anonymous location queries in mobile environments
with privacy grid. In: Proceedings of the
International World Wide Web Conference, WWW
(2008)
[12]Gedik, B.,Liu, L.: Protecting location privacy with
personalized k-anonymity: Architecture and
algorithms. In: IEEE Transactions on Mobile
Computing, TMC (2008) 1–18
[13]Gruteser, M., Grunwald, D.: Anonymous usage of
location-based services through spatial and
temporal cloaking. In: Proceedings of the
International Conference on Mobile
Systems,Applications, and Services, MobiSys (2003)
[14]Roman Schlegel, Member, IEEE, Chi-Yin Chow,
Member, IEEE, Qiong Huang, Member, IEEE, and
Duncan S. Wong, Member, IEEE, “User-Defined
Privacy Grid System for Continuous Location-Based
Services”, IEEE Transactions on Mobile Computing,
2015.
[15]Ardagna, C. A., Cremonini, M., Damiani, E., De
Capitani di Vimercati S., Samarati, P.: Location
privacy protection through obfuscation based
techniques. Data and Applications Security XXI,
Volume 4602 (2007)
[16]Wightman, P.M.; Jimeno, M.A; Jabba, D.; Labrador,
M.: Matlock: A location obfuscation technique for
accuracy-restricted applications. 2012 IEEE
Wireless Communications and Networking
Conference (WCNC) (2012)
[17]Di Pietro, R., Mandati, R., Verde, N.V.: Track me if
you can: Transparent obfuscation for Location based
Services. 2013 IEEE 14th International Symposium
and Workshops on World of Wireless, Mobile and
Multimedia Networks (WoWMoM) (2013)

More Related Content

DOCX
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES
PDF
PERTURBED ANONYMIZATION: TWO LEVEL SMART PRIVACY FOR LBS MOBILE USERS
PDF
LPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBS
PDF
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
PDF
H0944649
PDF
Exploiting Service Similarity for Privacy in Location Based Search Queries
DOCX
exploiting service similarity for privacy in location-based search queries
PDF
DESIGN AND ANALYSIS OF DKRINGA PROTOCOL FOR LOCATION PRIVACY IN TRUSTED ENVIR...
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES
PERTURBED ANONYMIZATION: TWO LEVEL SMART PRIVACY FOR LBS MOBILE USERS
LPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBS
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
H0944649
Exploiting Service Similarity for Privacy in Location Based Search Queries
exploiting service similarity for privacy in location-based search queries
DESIGN AND ANALYSIS OF DKRINGA PROTOCOL FOR LOCATION PRIVACY IN TRUSTED ENVIR...

What's hot (17)

PPTX
Privacy preserving optimal meeting location determination on mobile devices
PDF
SURVEY PAPER ON PRIVACY IN LOCATION BASED SEARCH QUERIES.
DOC
Location based spatial query processing in wireless broadcast environments(sy...
DOC
Exploiting service similarity for privacy in location based search queries
PDF
Machine Learning Applications in Grid Computing
PPTX
Seminar
PDF
PROTECTING PRIVACY IN VANETs USING MIX ZONES WITH VIRTUAL PSEUDONYM CHANGE
DOCX
Network Security ,2014 and 2015 ieee projects list @ TMKS Infotech
PDF
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
PDF
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
PDF
A Generalized Image Authentication Based On Statistical Moments of Color Hist...
PDF
Preserving location privacy in geo social applications
PDF
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
PDF
Privacy Preserving Location Query Service
PDF
Securing Location of User in Geo Social Networking
PDF
Be ieee 2015-16 java projects @ dreamweb techno solutions-trichy - copy - copy
PDF
Final year dotnet projects titles@ dreamweb techno solution trichy -
Privacy preserving optimal meeting location determination on mobile devices
SURVEY PAPER ON PRIVACY IN LOCATION BASED SEARCH QUERIES.
Location based spatial query processing in wireless broadcast environments(sy...
Exploiting service similarity for privacy in location based search queries
Machine Learning Applications in Grid Computing
Seminar
PROTECTING PRIVACY IN VANETs USING MIX ZONES WITH VIRTUAL PSEUDONYM CHANGE
Network Security ,2014 and 2015 ieee projects list @ TMKS Infotech
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
A Generalized Image Authentication Based On Statistical Moments of Color Hist...
Preserving location privacy in geo social applications
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
Privacy Preserving Location Query Service
Securing Location of User in Geo Social Networking
Be ieee 2015-16 java projects @ dreamweb techno solutions-trichy - copy - copy
Final year dotnet projects titles@ dreamweb techno solution trichy -
Ad

Viewers also liked (20)

PDF
X ray-arabic
PDF
2 ok
PDF
Programación depresión
PPTX
Lightspeed Connect - Lucas Freriks - Sooqr - Hoe site search je conversie kan...
PPTX
Estadistica 3
PPTX
MiT 2014
PDF
Team201_Snapple_Plansbook_NSAC2016
DOCX
Lyric bon jovi
PDF
Perfil del proyecto (colectivo g51)
PPTX
The family medical leave act (flma)
DOCX
PDF
Permis chasser ar_2112016
PDF
Identidades trigonometricas
PPTX
1 paso fundamentos-de-la-auditoria2 (1)
PPS
Recuerdos del poeta
PPTX
Tema 12 de lengua
PPTX
Código de ética
DOCX
Hemant Meena
PPTX
Formas de adquirir la ciudadania
PDF
CRM Acceleration Lisbon 2010 - Garanta o sucesso do SugarCRM na sua empresa
X ray-arabic
2 ok
Programación depresión
Lightspeed Connect - Lucas Freriks - Sooqr - Hoe site search je conversie kan...
Estadistica 3
MiT 2014
Team201_Snapple_Plansbook_NSAC2016
Lyric bon jovi
Perfil del proyecto (colectivo g51)
The family medical leave act (flma)
Permis chasser ar_2112016
Identidades trigonometricas
1 paso fundamentos-de-la-auditoria2 (1)
Recuerdos del poeta
Tema 12 de lengua
Código de ética
Hemant Meena
Formas de adquirir la ciudadania
CRM Acceleration Lisbon 2010 - Garanta o sucesso do SugarCRM na sua empresa
Ad

Similar to Cloaking Areas Location Based Services Using Dynamic Grid System & Privacy Encryption (20)

PDF
User-Defined Privacy Grid System for Continuous Location-Based Services
PDF
Privacy Preservation And Data Security In Location Based Services
DOCX
User defined privacy grid system
PDF
Privacy - Preserving Reputation with Content Protecting Location Based Queries
PDF
H017665256
PDF
User defined privacy grid system for continuous location based services abstract
PDF
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...
DOCX
JPJ1437 Exploiting Service Similarity for Privacy in Location-Based Search Q...
PDF
A survey on hiding user privacy in location based services through clustering
PDF
Design and Analysis of DKRINGA Protocol for Location Privacy in Trusted Envir...
PDF
STATE-OF-THE-ART, CHALLENGES: PRIVACY PROVISIONING IN TTP LOCATION BASED SERV...
PDF
Privacy in Location-Based Services using SP-Filtering in Hide and Seek Protoc...
PDF
1377179967 42797809
PDF
EPLQ:Efficient privacy preserving spatial range query for smart phones
PDF
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
PDF
TMC.2020.2993599.pdf
DOCX
Anonymous Usage of Location-Based Services Through Spatial and.docx
DOC
Privacy preserving and content-protecting location based queries
PDF
User defined privacy grid system for continuous location-based services
PDF
IRJET- Security Safe Guarding Location Data Proximity
User-Defined Privacy Grid System for Continuous Location-Based Services
Privacy Preservation And Data Security In Location Based Services
User defined privacy grid system
Privacy - Preserving Reputation with Content Protecting Location Based Queries
H017665256
User defined privacy grid system for continuous location based services abstract
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...
JPJ1437 Exploiting Service Similarity for Privacy in Location-Based Search Q...
A survey on hiding user privacy in location based services through clustering
Design and Analysis of DKRINGA Protocol for Location Privacy in Trusted Envir...
STATE-OF-THE-ART, CHALLENGES: PRIVACY PROVISIONING IN TTP LOCATION BASED SERV...
Privacy in Location-Based Services using SP-Filtering in Hide and Seek Protoc...
1377179967 42797809
EPLQ:Efficient privacy preserving spatial range query for smart phones
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
TMC.2020.2993599.pdf
Anonymous Usage of Location-Based Services Through Spatial and.docx
Privacy preserving and content-protecting location based queries
User defined privacy grid system for continuous location-based services
IRJET- Security Safe Guarding Location Data Proximity

Recently uploaded (20)

PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
UNIT 4 Total Quality Management .pptx
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
CH1 Production IntroductoryConcepts.pptx
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PDF
composite construction of structures.pdf
PDF
PPT on Performance Review to get promotions
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
Well-logging-methods_new................
PPT
Project quality management in manufacturing
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
Sustainable Sites - Green Building Construction
PPTX
Construction Project Organization Group 2.pptx
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
UNIT 4 Total Quality Management .pptx
R24 SURVEYING LAB MANUAL for civil enggi
UNIT-1 - COAL BASED THERMAL POWER PLANTS
CH1 Production IntroductoryConcepts.pptx
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
composite construction of structures.pdf
PPT on Performance Review to get promotions
Foundation to blockchain - A guide to Blockchain Tech
Well-logging-methods_new................
Project quality management in manufacturing
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
Operating System & Kernel Study Guide-1 - converted.pdf
Sustainable Sites - Green Building Construction
Construction Project Organization Group 2.pptx
Model Code of Practice - Construction Work - 21102022 .pdf

Cloaking Areas Location Based Services Using Dynamic Grid System & Privacy Encryption

  • 1. 9 International Journal for Modern Trends in Science and Technology International Journal for Modern Trends in Science and Technology Volume: 02, Issue No: 11, November 2016 http://www.ijmtst.com ISSN: 2455-3778 Cloaking Areas Location Based Services Using Dynamic Grid System & Privacy Encryption S. Prashanth1 | Ms. L. Sunitha Rani2 1PG Scholar, Department of CSE, Geethanjali Engineering College, Nannur-V, Kurnool-Dist. 2Assistant Professor, Department of CSE, Geethanjali Engineering College, Nannur-V, Kurnool-Dist. To Cite this Article S. Prashanth, Ms. L. Sunitha Rani, Cloaking Areas Location Based Services Using Dynamic Grid System & Privacy Encryption, International Journal for Modern Trends in Science and Technology, Vol. 02, Issue 11, 2016, pp. 9-13. Due to the large increasing use of Location Based Services (LBS), which require personal data of the user to provide the continuous service, protecting the privacy of these data has become a challenge. An approach to preserving a privacy is through anonymity, by hiding the identity and user location data of the mobile device from the service provider(third party) or from any unauthorized party who has access at the user’s request .Considering the challenge mentioned, in this paper gives a classification according to the Architecture, approaches and techniques used in previous works, and presents a survey of solutions to provide anonymity in LBS including the open issues or possible improvements to current solutions. All of this, in order to provide guidelines for choosing the best solution approach to a specific scenery in which anonymity is required. KEYWORDS: Dynamic grid system, cloaking areas, location based services, Encryption, privacy. Copyright © 2016 International Journal for Modern Trends in Science and Technology All rights reserved. I. INTRODUCTION The consumer market for location-based services (LBS) is estimated to grow from 2.9 billion dollars in 2010 to 10.4 billion dollars in 2015. While navigation applications are currently generating the most significant revenues, location based advertising and local search will be driving the revenues going forward. The legal landscape, unfortunately, is unclear about what happens to a subscriber's location data. The nonexistence of regulatory controls has led to a growing concern about potential privacy violations arising out of the usage of a location-based application. While new regulations to plug the loopholes are being sought, the privacy conscious user currently feels reluctant to adopt one of the most functional business models of the decade. Privacy and usability are two equally important requirements for successful realization of a location-based application. Privacy (location) is loosely defined as a “personally” assessed restriction on when and where someone’s position is deemed appropriate for disclosure. To begin with, this is a very dynamic concept. Usability has a twofold meaning: a) privacy controls should be intuitive yet flexible, and b) the intended purpose of an application is reasonably maintained. Towards this end, prior research has led to the development of a number of privacy criteria, and algorithms for their optimal achievement. However, there is no known attempt to bring into view the mutual interactions between the accuracy of a location coordinate and the service quality from an application using those coordinates. Therefore, the question of what minimal location accuracy is required for a LBS application to function remains open. The common ABSTRACT
  • 2. 10 International Journal for Modern Trends in Science and Technology S. Prashanth, Ms. L. Sunitha Rani : Cloaking Areas Location Based Services Using Dynamic Grid System & Privacy Encryption man’s question is: “how important is my position to get me to the nearest coffee shop?” which unfortunately remains unanswered in the scientific community. It is worth mentioning that a separate line of research in analyzing anonymous location traces has revealed that user locations are heavily correlated, and knowing a few frequently visited locations can easily identify the user behind a certain trace. The privacy breach in these cases occurs because the location to identity mapping results in a violation of user anonymity. The proposal in this work attempts to prevent the reverse mapping from user identity to user location in a user-controllable manner. The term Location-Based Services (LBS) is a recent concept that denotes applications integrating with the general notion of services. Examples of such applications include emergency services, car navigation systems, tourist tour planning, or information delivery. In the modern environment each and every users has lots and lots of queries to analyze the locations in a global place, in that case the main motivate of server is to successfully serve the response to all the requestor without any delay as well as maintain the privacy of individuals. The basic idea of every server is the concept of load balancing; here the server requires reducing the number of queries submitted by mobile clients and query load on the server. However, mobile clients suffer from longer waiting time for the server to compute valid regions. II. PRIVATE INFORMATION RETRIEVAL (PIR) OR OBLIVIOUS TRANSFER (OT) In paper [19] the authors find the problem of protecting location privacy of the mobile user to an Oblivious transfer problem, where the issuer of the request receives only its corresponding reply and the service provider remains oblivious of the location of the user. Further on, they design some solutions based on different kinds of Oblivious Transfer (OT) namely Adaptive OT (implementing blind signatures), Dynamic OT and Proxy OT. They propose the solutions but do not provide any further analysis on the correctness or feasibility of their proposals. Based on [19], the authors in [20] propose an improved protocol by using two oblivious transfers where no third party is required to enable user’s privacy. They assume the existence of a total server, which is responsible of a group of LBS providers. The user has to perform a double OT implemented with blind signatures in order to get the key required response to the query. This solution is thought for LBS that require payment. Although PIR or OT techniques do not require a third party, they incur a much higher communication overhead between the user and the service provider, requiring the transmission of much more information than the user actually needs. III. DYNAMIC GRID SYSTEM 3.1 Spatial Cloaking This technique is the most commonly used for protecting user location data from the third party attackers where in this technique extracted user location is blurred before submitting into service provider server for processing The solution proposed in this area is further classified by the architectural approach. 3.2 Semi Trusted Third Party (Dynamic Grid System) To overcome the problem of in the above architecture propose a new architecture called dynamic grid system (DGS) [4] to provide privacy- preserving snapshot and continuous LBS. The main idea is to place a semi-trusted third party, termed query server (QS), between the user and the service provider. QS only needs to be semi-trusted because it will not collect/ store or even have access to any user location information. Fig: 1. Architecture The user encrypts a query that includes the information of the query area and the dynamic grid structure, and encrypts the identity of each grid cell intersecting the required search area of the spatial query to produce a set of encrypted identifiers. Next, the user sends a request including (1) the encrypted query and (2) the encrypted identifiers to QS, which is a semi-trusted party located between the user and SP. QS stores the encrypted identifiers and forwards the encrypted query to SP specified by the user. SP
  • 3. 11 International Journal for Modern Trends in Science and Technology S. Prashanth, Ms. L. Sunitha Rani : Cloaking Areas Location Based Services Using Dynamic Grid System & Privacy Encryption decrypts the query and selects the POIs within the query area from its database. For each selected POI, SP encrypts its information, using the dynamic grid structure specified by the user to find a grid cell covering the POI, and encrypts the cell identity to produce the encrypted identifier for that POI. The encrypted POIs with their corresponding encrypted identifiers are returned to QS. QS stores the set of encrypted POIs and only returns to the user a subset of encrypted POIs whose corresponding identifiers match any one of the encrypted identifiers initially sent by the user Algorithm for DGS Input: User location (x, y), POI data P Output: User's POI Query data U(P). Initialization: i. User Select POI Type P(t), QS Query Server, SP Service Provider. ii. User set location, defined x, y (Current exact Location). letxu,yu∈ U, Map.getBounds(xu,yu) return(xb,yb), ( xt,yt) where b- bottom, t- top Key Derivation Function KDF() returnsk (random key) Enc(query) = IBE(P(t), k, ( xb,yb), ( xt,yt)) // At User side Enc(query), User data of U fwd toQS. Create ID for Query and fwdEnc(query) to SP Decrpt(query) at SP, get (xc,yc)= Map.getCenter(( xb,yb), ( xt,yt)); while data != nulll get POI P ∈ P(t), sort based on dist, create Query Set U(p). end while return Query Set U(p) to QS At QS, fwd Query Set to User Decrpt(query set U(P)) at USer, 3.3 Identity Based Encryption (IBE) For an effective key management system these are all requirements 2] Authenticate users and decrypt data 3] Manage keys with partners 4] Deliver keys to trusted infrastructure components 5] Recover keys Adi Shamir, one of the pioneers of public key cryptography, proposed a new type of public key algorithm in 1984. While public key systems have the inherent problem of distributing public keys and tying those public keys to a specific receiver. The scheme has chosen cipher text security in the random oracle model assuming a variant of the computational Diffie- Hellman problem. This system is based on bilinear maps between groups. In this paper we propose a fully functional identity-based encryption scheme. The performance of our system is comparable to the performance of ElGamal encryption. The security of our system is based on a natural analogue of the computational Diffie-Hellman assumption. this assumption showed that the new system has chosen cipher text security in the random oracle model. Using standard techniques from threshold cryptography [23, 24] the PKG in our scheme can be distributed so that the master-key is never available in a single location. Comparisons Table Parameter Existing System (TTP) Proposed System (DGS) Computation Cost(Number of POIs) 0.6 1.4 Communication Cost(Number of POIs) 1000 10000 Computation Cost Number of Users (thousands) 0.8 0.6 Communication Cost Number of Users (thousands) 0.1 25 K-Anonymity Computation Cost 0.2 10 K-Anonymity Communication Cost 0.1 10 IV. RESULTS Fig.2 .Grid of user location preparation.
  • 4. 12 International Journal for Modern Trends in Science and Technology S. Prashanth, Ms. L. Sunitha Rani : Cloaking Areas Location Based Services Using Dynamic Grid System & Privacy Encryption Fig. 3. Preparation of Query Fig 4. Encrypted Query forward to SP at QS Fig. 5. POI results got at User V. CONCLUSION It is necessary to propose new models that address new threats and attack models, which seek to break user’s privacy in Location Based Services. These new models need to overcome the disadvantages of existing ones. Novel solutions approaches could combine different proposed solutions, to compensate the disadvantages of certain models with the advantages of others. The job of updating or proposing a new survey will remain as an open task, as the development of new solutions to protect user’s privacy in Location Based Services remains active; moreover it is necessary to classify the solutions by the privacy degree they offer, the attack model(s) from which they are resilient and the type of LBS to which they can be applied. REFERENCES [1] Schiller, J. Voisard, A.: Location-Based Services. Morgan Kaufmann Publishers (2004) [2] Mohaisen, A., Hong, D., Nyang, D.: Privacy in Location based services: Primitives toward the solution. NCM (2008) [3] C.-Y. Chow and M. F. Mokbel, “Enabling private continuous queries for revealed user locations,” in Proc. 10th Int. Conf. Adv. Spatial Temporal Databases, 2007, pp. 258–273. [4] B. Gedik and L. Liu, “Protecting location privacy with personalized k-anonymity: Architecture and algorithms,” IEEE Trans. Mobile Comput., vol. 7, no. 1, pp. 1–18, Jan. 2008. [5] M. Gruteser and D. Grunwald, “Anonymous usage of locationbased services through spatial and temporal cloaking,” in Proc. 1st Int. Conf. Mobile Syst., Appl. Services, 2003, pp. 31–42. [6] P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias, “Preventing location-based identity inference in anonymous spatial queries,” IEEE Trans. Knowl. Data Eng., vol. 19, no. 12, pp. 1719–1733, Dec. 2007. [7] M. F. Mokbel, C.-Y. Chow, and W. G. Aref, “The new casper: Query processing for location services withoutcompromising privacy,” in Proc. 32nd Int. Conf. Very Large Data Bases, 2006, pp. 763–774. [8] T. Xu and Y. Cai, “Location anonymity in continuous locationbased services,” in Proc. 15th Annu. ACM Int. Symp. Adv. Geographic Inf. Syst., 2007, pp. 39:1–39:8. [9] Kido, H., Yanagisawa, Y., Satoh, T. An Anonymous Communication Technique using Dummies for Location-based Services. In: IEEE International Conference on Pervasive Services ICPS (2005) 88–97 [10]Lu, H., Jensen, C.S., Yiu, M.L.: PAD: Privacy-Area Aware. Dummy-Based Location Privacy in Mobile Services MobiDE (2008) 16–23
  • 5. 13 International Journal for Modern Trends in Science and Technology S. Prashanth, Ms. L. Sunitha Rani : Cloaking Areas Location Based Services Using Dynamic Grid System & Privacy Encryption [11]Bamba, B., Liu, L., Pesti, P., Wang, T.: Supporting anonymous location queries in mobile environments with privacy grid. In: Proceedings of the International World Wide Web Conference, WWW (2008) [12]Gedik, B.,Liu, L.: Protecting location privacy with personalized k-anonymity: Architecture and algorithms. In: IEEE Transactions on Mobile Computing, TMC (2008) 1–18 [13]Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the International Conference on Mobile Systems,Applications, and Services, MobiSys (2003) [14]Roman Schlegel, Member, IEEE, Chi-Yin Chow, Member, IEEE, Qiong Huang, Member, IEEE, and Duncan S. Wong, Member, IEEE, “User-Defined Privacy Grid System for Continuous Location-Based Services”, IEEE Transactions on Mobile Computing, 2015. [15]Ardagna, C. A., Cremonini, M., Damiani, E., De Capitani di Vimercati S., Samarati, P.: Location privacy protection through obfuscation based techniques. Data and Applications Security XXI, Volume 4602 (2007) [16]Wightman, P.M.; Jimeno, M.A; Jabba, D.; Labrador, M.: Matlock: A location obfuscation technique for accuracy-restricted applications. 2012 IEEE Wireless Communications and Networking Conference (WCNC) (2012) [17]Di Pietro, R., Mandati, R., Verde, N.V.: Track me if you can: Transparent obfuscation for Location based Services. 2013 IEEE 14th International Symposium and Workshops on World of Wireless, Mobile and Multimedia Networks (WoWMoM) (2013)