SlideShare a Scribd company logo
Exploiting Service Similarity for Privacy in Location Based Search Queries 
ABSTRACT 
Location-based applications utilize the positioning capabilities of a mobile device to 
determine the current location of a user, and customize query results to include 
neighboring points of interests. However, location knowledge is often perceived as 
personal information. One of the immediate issues hindering the wide acceptance of 
location-based applications is the lack of appropriate methodologies that offer fine grain 
privacy controls to a user without vastly affecting the usability of the service. While a 
number of privacy-preserving models and algorithms have taken shape in the past few 
years, there is an almost universal need to specify one’s privacy requirement without 
understanding its implications on the service quality. In this paper, we propose a user-centric 
locationbased service architecture where a user can observe the impact of location 
inaccuracy on the service accuracy before deciding the geo-coordinates to use in a query. 
We construct a local search application based on this architecture and demonstrate how 
meaningful information can be exchanged between the user and the service provider to 
allow the inference of contours depicting the change in query results across a geographic 
area. Results indicate the possibility of large default privacy regions (areas of no change 
in result set) in such applications. 
EXISTING SYSTEM: 
There are many kinds of location-sensitive applications. One category is location-based 
access control. Another class of location-sensitive applications requires users to provide 
past location proofs such as auto insurance quote in which auto insurance companies 
offer discounts to drivers who can prove that they take safe routes during their daily
commutes, police investigations in which detectives are interested in finding out if a 
person was at a murder scene at some time, and location-based social networking in 
which a user can ask for a location proof from the service requester and accepts the 
request only if the sender is able to present a valid location proof. The common theme 
across these location sensitive applications is that they offer a reward or benefit to users 
located in a certain geographical location at a certain time. Thus, users have the incentive 
to cheat on their locations. 
DISADVANTAGES OF EXISTING SYSTEM: 
· In the location-sensitive applications there is a lack of secure mechanism to provide 
their current or past locations to applications and services. 
· Although cellular service providers have tracking services that can help verify the 
locations of mobile users in real time, the accuracy is not good enough and the 
location history cannot be verified. 
PROPOSED SYSTEM: 
We propose a user-centric locationbased service architecture where a user can 
observe the impact of location inaccuracy on the service accuracy before deciding the 
geo-coordinates to use in a query. We construct a local search application based on this 
architecture and demonstrate how meaningful information can be exchanged between the
user and the service provider to allow the inference of contours depicting the change in 
query results across a geographic area. Results indicate the possibility of large default 
privacy regions (areas of no change in result set) in such applications. 
ADVANTAGES OF PROPOSED SYSTEM: 
We can effectively provide location proofs, significantly preserve the source location 
privacy, and effectively detect colluding attacks. Mobile local search is demonstrating an 
upward market trend. 
Architecture:
Modules: 
1. Admin Module. 
2. Service quality. 
3. A local search application 
4. User Module. 
Admin Module: 
In this module admin can register and he can login. After login admin can accept 
user’s registration. Hera Admin will Check About User Information. If it is right he will 
accept. Then only users can login to website. Admin can see users list and delete users. 
Admin can accept user posts. Like information about ATMs, hotels, shopping malls and 
so on. He can delete user post information also. Admin Will See Users location. Where 
user will went and which time like that he can search about all users location information. 
And he can change his password. 
Service quality:
Towards this end, prior research have led to the development of a number of 
privacy criteria, and algorithms for their optimal achievement. However, there is no 
known attempt to bring into view the mutual interactions between the accuracy of a 
location coordinate and the service quality from an application using those coordinates. 
A LOCAL SEARCH APPLICATION: 
Mobile local search is demonstrating an upward market trend, the gap with the 
desktop counterpart diminishing in the next three years, and then rising further2. Given 
the penetration of web-enabled handheld devices in the consumer market, it has become 
exceedingly common for a user to instantly look up the information she seeks to find. 
User Module: 
In this module user can register. And he can login. After login user will enter his 
present location. Why because we don’t have any GPS in our system. That’s why we will 
give externally. Then it will redirect to maps page. It will show about your all locations in 
map. User can enter 
Details about local services. It will host after admin conformation into website. User can 
search about local services like atms, restarents and so on. User can see his total locations 
in map. He can update his profile picture. He can change his password. 
Hardware Requirements:
• System : Pentium IV 2.4 GHz. 
• Hard Disk : 40 GB. 
• Floppy Drive : 1.44 Mb. 
• Monitor : 14’ Colour Monitor. 
• Mouse : Optical Mouse. 
• Ram : 512 Mb. 
• Keyboard : 101 Keyboards. 
Software Requirements: 
• Operating system : Windows 7 32 bit. 
• Coding Language : ASP.Net 4.0 with C# 
• Data Base : SQL Server 2008.
• System : Pentium IV 2.4 GHz. 
• Hard Disk : 40 GB. 
• Floppy Drive : 1.44 Mb. 
• Monitor : 14’ Colour Monitor. 
• Mouse : Optical Mouse. 
• Ram : 512 Mb. 
• Keyboard : 101 Keyboards. 
Software Requirements: 
• Operating system : Windows 7 32 bit. 
• Coding Language : ASP.Net 4.0 with C# 
• Data Base : SQL Server 2008.

More Related Content

DOC
Location based spatial query processing in wireless broadcast environments(sy...
DOCX
exploiting service similarity for privacy in location-based search queries
PDF
Exploiting Service Similarity for Privacy in Location Based Search Queries
PDF
LPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBS
PDF
Privacy preserving relative location based services for mobile users
PPTX
Privacy preserving optimal meeting location determination on mobile devices
PDF
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...
DOC
Privacy preserving optimal meeting location determination on mobile devices
Location based spatial query processing in wireless broadcast environments(sy...
exploiting service similarity for privacy in location-based search queries
Exploiting Service Similarity for Privacy in Location Based Search Queries
LPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBS
Privacy preserving relative location based services for mobile users
Privacy preserving optimal meeting location determination on mobile devices
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...
Privacy preserving optimal meeting location determination on mobile devices

What's hot (20)

PDF
PERTURBED ANONYMIZATION: TWO LEVEL SMART PRIVACY FOR LBS MOBILE USERS
PDF
Privacy - Preserving Reputation with Content Protecting Location Based Queries
PDF
Preserving location privacy in geo social applications
DOCX
Preserving location privacy in geo social applications
PDF
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
DOCX
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES
PPTX
Seminar
DOCX
preserving location privacy in geosocial applications
PPTX
Pppppppppttttttttttttttttttttt
PDF
User defined privacy grid system for continuous location based services abstract
DOCX
Hiding in the mobile crowd location privacy through collaboration
DOC
Privacy preserving optimal meeting location determination on mobile devices
PPT
Extending Mobile Devices with Spatially Arranged Gateways to Pervasive Services.
PDF
User defined privacy grid system for continuous location-based services
PDF
Privacy preserving location sharing services for social networks(1)
PDF
IRJET- Quantify Mutually Dependent Privacy Risks with Locality Data
PDF
H0944649
PDF
privacy preserving abstract
PDF
Supporting Privacy Protection in Personalized Web Search
DOC
Indoor localization Leveraging Human Perception of Textual Signs
PERTURBED ANONYMIZATION: TWO LEVEL SMART PRIVACY FOR LBS MOBILE USERS
Privacy - Preserving Reputation with Content Protecting Location Based Queries
Preserving location privacy in geo social applications
Preserving location privacy in geo social applications
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES
Seminar
preserving location privacy in geosocial applications
Pppppppppttttttttttttttttttttt
User defined privacy grid system for continuous location based services abstract
Hiding in the mobile crowd location privacy through collaboration
Privacy preserving optimal meeting location determination on mobile devices
Extending Mobile Devices with Spatially Arranged Gateways to Pervasive Services.
User defined privacy grid system for continuous location-based services
Privacy preserving location sharing services for social networks(1)
IRJET- Quantify Mutually Dependent Privacy Risks with Locality Data
H0944649
privacy preserving abstract
Supporting Privacy Protection in Personalized Web Search
Indoor localization Leveraging Human Perception of Textual Signs
Ad

Similar to Exploiting service similarity for privacy in location based search queries (20)

DOCX
JPJ1437 Exploiting Service Similarity for Privacy in Location-Based Search Q...
PDF
Location Provider with Privacy Using Localized Server and GPS
PDF
Location Based Services, Change in Profile and Notification
DOCX
JPD1435 Preserving Location Privacy in Geosocial Applications
PDF
Android application to locate and track mobile phones(aaltm) an implementati...
PDF
Place recommendation system
PDF
Automated Mess Service Based on User's Location
PDF
IRJET- Profile Management System
DOCX
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
DOCX
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
PPTX
pg locator - a platform for searching pg hostels and rental houses php github...
PDF
Securing Location of User in Geo Social Networking
PPTX
PDF
My Places
PDF
IRJET- Next Location Prediction
DOC
azd document
PDF
IRJET - Home Appliance Rental Application
PDF
IRJET- An Android Application to Hire a Driver for Private Vehicle
PDF
A survey on hiding user privacy in location based services through clustering
JPJ1437 Exploiting Service Similarity for Privacy in Location-Based Search Q...
Location Provider with Privacy Using Localized Server and GPS
Location Based Services, Change in Profile and Notification
JPD1435 Preserving Location Privacy in Geosocial Applications
Android application to locate and track mobile phones(aaltm) an implementati...
Place recommendation system
Automated Mess Service Based on User's Location
IRJET- Profile Management System
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
pg locator - a platform for searching pg hostels and rental houses php github...
Securing Location of User in Geo Social Networking
My Places
IRJET- Next Location Prediction
azd document
IRJET - Home Appliance Rental Application
IRJET- An Android Application to Hire a Driver for Private Vehicle
A survey on hiding user privacy in location based services through clustering
Ad

More from Shakas Technologies (20)

DOCX
A Review on Deep-Learning-Based Cyberbullying Detection
DOCX
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
DOCX
A Novel Framework for Credit Card.
DOCX
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
DOCX
NS2 Final Year Project Titles 2023- 2024
DOCX
MATLAB Final Year IEEE Project Titles 2023-2024
DOCX
Latest Python IEEE Project Titles 2023-2024
DOCX
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
DOCX
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
DOCX
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
DOCX
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
DOCX
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
DOCX
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
DOCX
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
DOCX
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
DOCX
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
DOCX
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
DOCX
Fighting Money Laundering With Statistics and Machine Learning.docx
DOCX
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
DOCX
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
A Review on Deep-Learning-Based Cyberbullying Detection
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Novel Framework for Credit Card.
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
NS2 Final Year Project Titles 2023- 2024
MATLAB Final Year IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Fighting Money Laundering With Statistics and Machine Learning.docx
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...

Recently uploaded (20)

PDF
TR - Agricultural Crops Production NC III.pdf
PDF
RMMM.pdf make it easy to upload and study
PDF
Computing-Curriculum for Schools in Ghana
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
Pharma ospi slides which help in ospi learning
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PPTX
Cell Structure & Organelles in detailed.
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
Classroom Observation Tools for Teachers
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PPTX
master seminar digital applications in india
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
01-Introduction-to-Information-Management.pdf
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
TR - Agricultural Crops Production NC III.pdf
RMMM.pdf make it easy to upload and study
Computing-Curriculum for Schools in Ghana
Microbial diseases, their pathogenesis and prophylaxis
Pharma ospi slides which help in ospi learning
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Renaissance Architecture: A Journey from Faith to Humanism
Cell Structure & Organelles in detailed.
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Classroom Observation Tools for Teachers
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
master seminar digital applications in india
Anesthesia in Laparoscopic Surgery in India
FourierSeries-QuestionsWithAnswers(Part-A).pdf
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
01-Introduction-to-Information-Management.pdf
VCE English Exam - Section C Student Revision Booklet
human mycosis Human fungal infections are called human mycosis..pptx

Exploiting service similarity for privacy in location based search queries

  • 1. Exploiting Service Similarity for Privacy in Location Based Search Queries ABSTRACT Location-based applications utilize the positioning capabilities of a mobile device to determine the current location of a user, and customize query results to include neighboring points of interests. However, location knowledge is often perceived as personal information. One of the immediate issues hindering the wide acceptance of location-based applications is the lack of appropriate methodologies that offer fine grain privacy controls to a user without vastly affecting the usability of the service. While a number of privacy-preserving models and algorithms have taken shape in the past few years, there is an almost universal need to specify one’s privacy requirement without understanding its implications on the service quality. In this paper, we propose a user-centric locationbased service architecture where a user can observe the impact of location inaccuracy on the service accuracy before deciding the geo-coordinates to use in a query. We construct a local search application based on this architecture and demonstrate how meaningful information can be exchanged between the user and the service provider to allow the inference of contours depicting the change in query results across a geographic area. Results indicate the possibility of large default privacy regions (areas of no change in result set) in such applications. EXISTING SYSTEM: There are many kinds of location-sensitive applications. One category is location-based access control. Another class of location-sensitive applications requires users to provide past location proofs such as auto insurance quote in which auto insurance companies offer discounts to drivers who can prove that they take safe routes during their daily
  • 2. commutes, police investigations in which detectives are interested in finding out if a person was at a murder scene at some time, and location-based social networking in which a user can ask for a location proof from the service requester and accepts the request only if the sender is able to present a valid location proof. The common theme across these location sensitive applications is that they offer a reward or benefit to users located in a certain geographical location at a certain time. Thus, users have the incentive to cheat on their locations. DISADVANTAGES OF EXISTING SYSTEM: · In the location-sensitive applications there is a lack of secure mechanism to provide their current or past locations to applications and services. · Although cellular service providers have tracking services that can help verify the locations of mobile users in real time, the accuracy is not good enough and the location history cannot be verified. PROPOSED SYSTEM: We propose a user-centric locationbased service architecture where a user can observe the impact of location inaccuracy on the service accuracy before deciding the geo-coordinates to use in a query. We construct a local search application based on this architecture and demonstrate how meaningful information can be exchanged between the
  • 3. user and the service provider to allow the inference of contours depicting the change in query results across a geographic area. Results indicate the possibility of large default privacy regions (areas of no change in result set) in such applications. ADVANTAGES OF PROPOSED SYSTEM: We can effectively provide location proofs, significantly preserve the source location privacy, and effectively detect colluding attacks. Mobile local search is demonstrating an upward market trend. Architecture:
  • 4. Modules: 1. Admin Module. 2. Service quality. 3. A local search application 4. User Module. Admin Module: In this module admin can register and he can login. After login admin can accept user’s registration. Hera Admin will Check About User Information. If it is right he will accept. Then only users can login to website. Admin can see users list and delete users. Admin can accept user posts. Like information about ATMs, hotels, shopping malls and so on. He can delete user post information also. Admin Will See Users location. Where user will went and which time like that he can search about all users location information. And he can change his password. Service quality:
  • 5. Towards this end, prior research have led to the development of a number of privacy criteria, and algorithms for their optimal achievement. However, there is no known attempt to bring into view the mutual interactions between the accuracy of a location coordinate and the service quality from an application using those coordinates. A LOCAL SEARCH APPLICATION: Mobile local search is demonstrating an upward market trend, the gap with the desktop counterpart diminishing in the next three years, and then rising further2. Given the penetration of web-enabled handheld devices in the consumer market, it has become exceedingly common for a user to instantly look up the information she seeks to find. User Module: In this module user can register. And he can login. After login user will enter his present location. Why because we don’t have any GPS in our system. That’s why we will give externally. Then it will redirect to maps page. It will show about your all locations in map. User can enter Details about local services. It will host after admin conformation into website. User can search about local services like atms, restarents and so on. User can see his total locations in map. He can update his profile picture. He can change his password. Hardware Requirements:
  • 6. • System : Pentium IV 2.4 GHz. • Hard Disk : 40 GB. • Floppy Drive : 1.44 Mb. • Monitor : 14’ Colour Monitor. • Mouse : Optical Mouse. • Ram : 512 Mb. • Keyboard : 101 Keyboards. Software Requirements: • Operating system : Windows 7 32 bit. • Coding Language : ASP.Net 4.0 with C# • Data Base : SQL Server 2008.
  • 7. • System : Pentium IV 2.4 GHz. • Hard Disk : 40 GB. • Floppy Drive : 1.44 Mb. • Monitor : 14’ Colour Monitor. • Mouse : Optical Mouse. • Ram : 512 Mb. • Keyboard : 101 Keyboards. Software Requirements: • Operating system : Windows 7 32 bit. • Coding Language : ASP.Net 4.0 with C# • Data Base : SQL Server 2008.