SlideShare a Scribd company logo
Do Your Projects With Domain Experts…
Copyright © 2015 LeMeniz Infotech. All rights reserved
Page number 1
LeMeniz Infotech
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
EPLQ: Efficient Privacy-Preserving Location-based
Query over Outsourced Encrypted Data
Abstract:
With the pervasiveness of smart phones, locationbased services
(LBS) have received considerable attention and become more
popular and vital recently. However, the use of LBS also poses a
potential threat to user’s location privacy. In this paper, aiming
at spatial range query, a popular LBS providing information
about POIs (Points Of Interest) within a given distance, we
present an efficient and privacy-preserving location based query
solution, called EPLQ. Specifically, to achieve
privacypreserving spatial range query, we propose the first
predicateonly encryption scheme for inner product range, which
can be used to detect whether a position is within a given
circular area in a privacy-preserving way. To reduce query
latency, we further design a privacy-preserving tree index
structure in EPLQ. Detailed security analysis confirms the
security properties of EPLQ. In addition, extensive experiments
are conducted, and the results demonstrate that EPLQ is very
efficient in privacypreserving spatial range query over
outsourced encrypted data. In particular, for a mobile LBS user
Do Your Projects With Domain Experts…
Copyright © 2015 LeMeniz Infotech. All rights reserved
Page number 2
LeMeniz Infotech
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
using an Android phone, around 0.9 second is needed to
generate a query; and it also only requires a commodity
workstation, which plays the role of the cloud in our
experiments, a few seconds to search POIs.
Introduction:
A few decades ago, location-based services (LBS) were used in
military only. Today, thanks to advances in information and
communication technologies, more kinds of LBS have appeared,
and they are very useful for not only organizations but also
individuals. Let’s take the spatial range query, one kind of LBS
that we will focus on in this paper, as an example. Spatial range
query is a widely used LBS, which allows a user to find POIs
(Point Of Interests) within a given distance to his/her location,
i.e., the query point. As illustrated in Fig. 1, with this kind of
LBS, a user could obtain the records of all restaurants within
walking distance (say 500 meters). Then the user can go through
Do Your Projects With Domain Experts…
Copyright © 2015 LeMeniz Infotech. All rights reserved
Page number 3
LeMeniz Infotech
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
these records to find a desirable restaurant considering price and
reviews
Existing system:
In Existing System some sensitive location data of organization
users may involve trade secret or national security. Protecting
the privacy of user location in LBS has attracted considerable
interest. However significant challenges still remain in the
design of privacypreserving LBS, and new challenges arise
particularly due to data outsourcing. In recent years, there is a
growing trend of outsourcing data including LBS data because
of its financial and operational benefits significant challenges
still remain in the design of privacypreserving LBS, and new
challenges arise particularly due to data outsourcing. In recent
years, there is a growing trend of outsourcing data including
LBS data because of its financial and operational benefits
Do Your Projects With Domain Experts…
Copyright © 2015 LeMeniz Infotech. All rights reserved
Page number 4
LeMeniz Infotech
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
Disadvantages:
 Querying encrypted LBS data without privacy breach is a
big challenge, and we need to protect not only the user
locations from the LBS provider and cloud, but also LBS
data from the cloud.
 The cryptographic or privacy-enhancing techniques used to
realize privacy-preserving query usually result in high
computational cost and/or storage cost at user side.
Proposed System :
In proposed System we implemented EPLQ, an efficient privacy
preserving spatial range query solution for smart phones, which
preserves the privacy of user location, and achieves
confidentiality of LBS data. To realize EPLQ, we have designed
a novel predicate-only encryption scheme for inner product
range named IPRE and a novel privacy-preserving index tree
named ˆ ss-tree. EPLQ’s efficacy has been evaluated with
theoretical analysis and experiments, and detailed analysis
shows its security against known-sample attacks and ciphertext-
Do Your Projects With Domain Experts…
Copyright © 2015 LeMeniz Infotech. All rights reserved
Page number 5
LeMeniz Infotech
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
only attacks. Our techniques have potential usages in other kinds
of privacy-preserving queries. If the query can be performed
through comparing inner products to a given range, the proposed
IPRE and ˆ ss-tree may be applied to realize privacy-preserving
query. Two potential usages are privacypreserving similarity
query and long spatial range query. In the future, we will design
solutions for these scenarios and identify more usages.
Advantages:
 Efficiency
 Accuracy
 Security
Architecture:
Do Your Projects With Domain Experts…
Copyright © 2015 LeMeniz Infotech. All rights reserved
Page number 6
LeMeniz Infotech
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
Hardware Requirement:
 System : Pentium IV 2.4 GHz.
 Hard Disk : 40 GB.
 Floppy Drive : 44 Mb.
 Monitor : 15 VGA Colour.
 Mouse : Logitech
 Ram : 512 Mb.
 MOBILE : ANDROID
Software Requirement:
 Operating system : Windows 7.
 Coding Language : Java 1.7
 Tool Kit : Android 2.3 ABOVE
 IDE : Eclipse

More Related Content

PDF
Eplq efficient privacy preserving location-based query over outsourced encryp...
PDF
NUS-ISS Learning Day 2019-Intelligence on the (bleeding) edge fog bringing ai...
PDF
NUS-ISS Learning Day 2019-Building IoT solutions with the Pi
PPTX
IoT Security
DOCX
IoT Design Principles
PDF
Will Internet of Things (IoT) be secure enough?
PPTX
security and privacy-Internet of things
Eplq efficient privacy preserving location-based query over outsourced encryp...
NUS-ISS Learning Day 2019-Intelligence on the (bleeding) edge fog bringing ai...
NUS-ISS Learning Day 2019-Building IoT solutions with the Pi
IoT Security
IoT Design Principles
Will Internet of Things (IoT) be secure enough?
security and privacy-Internet of things

What's hot (20)

DOCX
IoT Agent Design Principles
PPTX
A survey in privacy and security in Internet of Things IOT
PPTX
Security issues and solutions : IoT
PDF
Recent trends in cloud computing articles
PDF
IoT security reference architecture
DOC
Intrusion detection and anomaly detection system using sequential pattern mining
PDF
76 s201913
PDF
Securing Cloud Using Fog: A Review
PDF
509286-Aki_Koivu-Review
PDF
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
PDF
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
PPTX
IoT Security Training, IoT Security Awareness 2019
PDF
IOT Security
PDF
Security in IoT
PDF
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...
PDF
A Novel Security Approach for Communication using IOT
DOCX
It practical file
PDF
76 s201917
PDF
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
PPTX
Privacy and security in IoT
IoT Agent Design Principles
A survey in privacy and security in Internet of Things IOT
Security issues and solutions : IoT
Recent trends in cloud computing articles
IoT security reference architecture
Intrusion detection and anomaly detection system using sequential pattern mining
76 s201913
Securing Cloud Using Fog: A Review
509286-Aki_Koivu-Review
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
IoT Security Training, IoT Security Awareness 2019
IOT Security
Security in IoT
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...
A Novel Security Approach for Communication using IOT
It practical file
76 s201917
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Privacy and security in IoT
Ad

Viewers also liked (16)

PDF
Wave 5 - The Socialisation of Brands | UM | Social Media Tracker
PDF
Highly reliable transformerless photovoltaic inverters with leakage current a...
PDF
Analyzing ad library updates in android apps
PDF
ieee projects in pondicherry | LeMeniz Infotech
PDF
Energy aware load balancing and application scaling for the cloud ecosystem
PDF
Vector sparse representation of color image using quaternion matrix analysis.
PDF
Delay dependent stability of single-loop controlled grid-connected inverters ...
PDF
Pollution in West Virginia
PPTX
Media evaluation 1 (1) (1)
PDF
BATERIAS ETNA
PPTX
Research into Similar Artists - DigiPak Analysis
PDF
Customer Experiences with Soul - Sustainable Brands Bangkok
PPTX
4th Etherum Meetup Vienna: The connection between reputation, sharing economy...
DOCX
Kontribusi pemerintah dan masyarakat dalam melestarikan kebudayaan
PDF
Digital в PR и рекламе
PDF
Diary Bert Caron
Wave 5 - The Socialisation of Brands | UM | Social Media Tracker
Highly reliable transformerless photovoltaic inverters with leakage current a...
Analyzing ad library updates in android apps
ieee projects in pondicherry | LeMeniz Infotech
Energy aware load balancing and application scaling for the cloud ecosystem
Vector sparse representation of color image using quaternion matrix analysis.
Delay dependent stability of single-loop controlled grid-connected inverters ...
Pollution in West Virginia
Media evaluation 1 (1) (1)
BATERIAS ETNA
Research into Similar Artists - DigiPak Analysis
Customer Experiences with Soul - Sustainable Brands Bangkok
4th Etherum Meetup Vienna: The connection between reputation, sharing economy...
Kontribusi pemerintah dan masyarakat dalam melestarikan kebudayaan
Digital в PR и рекламе
Diary Bert Caron
Ad

Similar to Eplq efficient privacy preserving location-based query over outsourced encrypted data (20)

PDF
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
PDF
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
PDF
Secure spatial top k query processing via untrusted location-based service pr...
PDF
Enabling fine grained multi-keyword search supporting classified sub-dictiona...
PDF
Privacy preserving relative location based services for mobile users
PDF
User privacy and data trustworthiness in mobile crowd sensing
PDF
Spe security and privacy enhancement framework for mobile devices
PDF
EPLQ:Efficient privacy preserving spatial range query for smart phones
PDF
Privacy preserving public auditing for regenerating-code-based cloud storage
PDF
User defined privacy grid system for continuous location-based services
PDF
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
PDF
Koen Matthijs
PDF
Anonymous two factor authentication in distributed systems certain goals are ...
PDF
I want you to Read intensively papers and give me a summary for ever.pdf
PDF
Top Enterprise Software Development Trends
PPTX
Exciting it trends in 2015 why you should consider shifting and upgrading yo...
PDF
Sleeping well with cloud services
PDF
Stamp enabling privacy preserving location proofs for mobile users
DOCX
Hiding in the mobile crowd location privacy through collaboration
PDF
Providing privacy aware incentives in mobile sensing systems
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
Secure spatial top k query processing via untrusted location-based service pr...
Enabling fine grained multi-keyword search supporting classified sub-dictiona...
Privacy preserving relative location based services for mobile users
User privacy and data trustworthiness in mobile crowd sensing
Spe security and privacy enhancement framework for mobile devices
EPLQ:Efficient privacy preserving spatial range query for smart phones
Privacy preserving public auditing for regenerating-code-based cloud storage
User defined privacy grid system for continuous location-based services
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Koen Matthijs
Anonymous two factor authentication in distributed systems certain goals are ...
I want you to Read intensively papers and give me a summary for ever.pdf
Top Enterprise Software Development Trends
Exciting it trends in 2015 why you should consider shifting and upgrading yo...
Sleeping well with cloud services
Stamp enabling privacy preserving location proofs for mobile users
Hiding in the mobile crowd location privacy through collaboration
Providing privacy aware incentives in mobile sensing systems

More from LeMeniz Infotech (20)

PDF
A fast acquisition all-digital delay-locked loop using a starting-bit predict...
PDF
A fast fault tolerant architecture for sauvola local image thresholding algor...
PDF
A dynamically reconfigurable multi asip architecture for multistandard and mu...
PDF
Interleaved digital power factor correction based on the sliding mode approach
PDF
Bumpless control for reduced thd in power factor correction circuits
PDF
A bidirectional single stage three phase rectifier with high-frequency isolat...
PDF
A bidirectional three level llc resonant converter with pwam control
PDF
Efficient single phase transformerless inverter for grid tied pvg system with...
PDF
Grid current-feedback active damping for lcl resonance in grid-connected volt...
PDF
Connection of converters to a low and medium power dc network using an induct...
PDF
Sbvlc secure barcode based visible light communication for smartphones
PDF
Read2 me a cloud based reading aid for the visually impaired
PDF
Privacy preserving location sharing services for social networks
PDF
Pass byo bring your own picture for securing graphical passwords
PDF
An exploration of geographic authentication scheme
PDF
Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017
PDF
Context based access control systems for mobile devices
PDF
Android security a survey of issues, malware penetration, and defenses
PDF
A location and diversity-aware news feed system for mobile users
PDF
The impact of api change and fault-proneness on the user ratings of android ...
A fast acquisition all-digital delay-locked loop using a starting-bit predict...
A fast fault tolerant architecture for sauvola local image thresholding algor...
A dynamically reconfigurable multi asip architecture for multistandard and mu...
Interleaved digital power factor correction based on the sliding mode approach
Bumpless control for reduced thd in power factor correction circuits
A bidirectional single stage three phase rectifier with high-frequency isolat...
A bidirectional three level llc resonant converter with pwam control
Efficient single phase transformerless inverter for grid tied pvg system with...
Grid current-feedback active damping for lcl resonance in grid-connected volt...
Connection of converters to a low and medium power dc network using an induct...
Sbvlc secure barcode based visible light communication for smartphones
Read2 me a cloud based reading aid for the visually impaired
Privacy preserving location sharing services for social networks
Pass byo bring your own picture for securing graphical passwords
An exploration of geographic authentication scheme
Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017
Context based access control systems for mobile devices
Android security a survey of issues, malware penetration, and defenses
A location and diversity-aware news feed system for mobile users
The impact of api change and fault-proneness on the user ratings of android ...

Recently uploaded (20)

PPTX
Cell Types and Its function , kingdom of life
PDF
01-Introduction-to-Information-Management.pdf
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Basic Mud Logging Guide for educational purpose
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
RMMM.pdf make it easy to upload and study
PPTX
Lesson notes of climatology university.
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
GDM (1) (1).pptx small presentation for students
PPTX
Institutional Correction lecture only . . .
PPTX
PPH.pptx obstetrics and gynecology in nursing
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PPTX
Pharma ospi slides which help in ospi learning
PDF
Pre independence Education in Inndia.pdf
PDF
TR - Agricultural Crops Production NC III.pdf
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
Insiders guide to clinical Medicine.pdf
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Cell Types and Its function , kingdom of life
01-Introduction-to-Information-Management.pdf
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Basic Mud Logging Guide for educational purpose
Pharmacology of Heart Failure /Pharmacotherapy of CHF
RMMM.pdf make it easy to upload and study
Lesson notes of climatology university.
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
GDM (1) (1).pptx small presentation for students
Institutional Correction lecture only . . .
PPH.pptx obstetrics and gynecology in nursing
Renaissance Architecture: A Journey from Faith to Humanism
Pharma ospi slides which help in ospi learning
Pre independence Education in Inndia.pdf
TR - Agricultural Crops Production NC III.pdf
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
Insiders guide to clinical Medicine.pdf
102 student loan defaulters named and shamed – Is someone you know on the list?
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf

Eplq efficient privacy preserving location-based query over outsourced encrypted data

  • 1. Do Your Projects With Domain Experts… Copyright © 2015 LeMeniz Infotech. All rights reserved Page number 1 LeMeniz Infotech 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com EPLQ: Efficient Privacy-Preserving Location-based Query over Outsourced Encrypted Data Abstract: With the pervasiveness of smart phones, locationbased services (LBS) have received considerable attention and become more popular and vital recently. However, the use of LBS also poses a potential threat to user’s location privacy. In this paper, aiming at spatial range query, a popular LBS providing information about POIs (Points Of Interest) within a given distance, we present an efficient and privacy-preserving location based query solution, called EPLQ. Specifically, to achieve privacypreserving spatial range query, we propose the first predicateonly encryption scheme for inner product range, which can be used to detect whether a position is within a given circular area in a privacy-preserving way. To reduce query latency, we further design a privacy-preserving tree index structure in EPLQ. Detailed security analysis confirms the security properties of EPLQ. In addition, extensive experiments are conducted, and the results demonstrate that EPLQ is very efficient in privacypreserving spatial range query over outsourced encrypted data. In particular, for a mobile LBS user
  • 2. Do Your Projects With Domain Experts… Copyright © 2015 LeMeniz Infotech. All rights reserved Page number 2 LeMeniz Infotech 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com using an Android phone, around 0.9 second is needed to generate a query; and it also only requires a commodity workstation, which plays the role of the cloud in our experiments, a few seconds to search POIs. Introduction: A few decades ago, location-based services (LBS) were used in military only. Today, thanks to advances in information and communication technologies, more kinds of LBS have appeared, and they are very useful for not only organizations but also individuals. Let’s take the spatial range query, one kind of LBS that we will focus on in this paper, as an example. Spatial range query is a widely used LBS, which allows a user to find POIs (Point Of Interests) within a given distance to his/her location, i.e., the query point. As illustrated in Fig. 1, with this kind of LBS, a user could obtain the records of all restaurants within walking distance (say 500 meters). Then the user can go through
  • 3. Do Your Projects With Domain Experts… Copyright © 2015 LeMeniz Infotech. All rights reserved Page number 3 LeMeniz Infotech 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com these records to find a desirable restaurant considering price and reviews Existing system: In Existing System some sensitive location data of organization users may involve trade secret or national security. Protecting the privacy of user location in LBS has attracted considerable interest. However significant challenges still remain in the design of privacypreserving LBS, and new challenges arise particularly due to data outsourcing. In recent years, there is a growing trend of outsourcing data including LBS data because of its financial and operational benefits significant challenges still remain in the design of privacypreserving LBS, and new challenges arise particularly due to data outsourcing. In recent years, there is a growing trend of outsourcing data including LBS data because of its financial and operational benefits
  • 4. Do Your Projects With Domain Experts… Copyright © 2015 LeMeniz Infotech. All rights reserved Page number 4 LeMeniz Infotech 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com Disadvantages:  Querying encrypted LBS data without privacy breach is a big challenge, and we need to protect not only the user locations from the LBS provider and cloud, but also LBS data from the cloud.  The cryptographic or privacy-enhancing techniques used to realize privacy-preserving query usually result in high computational cost and/or storage cost at user side. Proposed System : In proposed System we implemented EPLQ, an efficient privacy preserving spatial range query solution for smart phones, which preserves the privacy of user location, and achieves confidentiality of LBS data. To realize EPLQ, we have designed a novel predicate-only encryption scheme for inner product range named IPRE and a novel privacy-preserving index tree named ˆ ss-tree. EPLQ’s efficacy has been evaluated with theoretical analysis and experiments, and detailed analysis shows its security against known-sample attacks and ciphertext-
  • 5. Do Your Projects With Domain Experts… Copyright © 2015 LeMeniz Infotech. All rights reserved Page number 5 LeMeniz Infotech 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com only attacks. Our techniques have potential usages in other kinds of privacy-preserving queries. If the query can be performed through comparing inner products to a given range, the proposed IPRE and ˆ ss-tree may be applied to realize privacy-preserving query. Two potential usages are privacypreserving similarity query and long spatial range query. In the future, we will design solutions for these scenarios and identify more usages. Advantages:  Efficiency  Accuracy  Security Architecture:
  • 6. Do Your Projects With Domain Experts… Copyright © 2015 LeMeniz Infotech. All rights reserved Page number 6 LeMeniz Infotech 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com Hardware Requirement:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech  Ram : 512 Mb.  MOBILE : ANDROID Software Requirement:  Operating system : Windows 7.  Coding Language : Java 1.7  Tool Kit : Android 2.3 ABOVE  IDE : Eclipse