SlideShare a Scribd company logo
GLOBALSOFT TECHNOLOGIES 
IEEE PROJECTS & SOFTWARE DEVELOPMENTS 
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE 
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS 
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com 
Privacy-Preserving and Content-Protecting Location Based 
Queries 
ABSTRACT: 
In this paper we present a solution to one of the location-based query problems. 
This problem is defined as follows: (i) a user wants to query a database of location 
data, known as Points Of Interest (POIs), and does not want to reveal his/her 
location to the server due to privacy concerns; (ii) the owner of the location data, 
that is, the location server, does not want to simply distribute its data to all users. 
The location server desires to have some control over its data, since the data is its 
asset. We propose a major enhancement upon previous solutions by introducing a 
two stage approach, where the first step is based on Oblivious Transfer and the 
second step is based on Private Information Retrieval, to achieve a secure solution 
for both parties. The solution we present is efficient and practical in many 
scenarios. We implement our solution on a desktop machine and a mobile device 
to assess the efficiency of our protocol. We also introduce a security model and 
analyse the security in the context of our protocol. Finally, we highlight a security 
weakness of our previous work and present a solution to overcome it.
EXISTING SYSTEM: 
The Location Server (LS), which offers some LBS, spends its resources to compile 
information about various interesting POIs. Hence, it is expected that the LS would 
not disclose any information without fees. Therefore the LBS has to ensure that 
LS’s data is not accessed by any unauthorized user. During the process of 
transmission the users should not be allowed to discover any information for which 
they have not paid. It is thus crucial that solutions be devised that address the 
privacy of the users issuing queries, but also prevent users from accessing content 
to which they do not have authorization. 
DISADVANTAGES OF EXISTING SYSTEM: 
 Among many challenging barriers to the wide deployment of such 
application, privacy assurance is a major issue 
 The user can get answers to various location based queries, 
PROPOSED SYSTEM: 
 In this paper, we propose a novel protocol for location based queries that has 
major performance improvements with respect to the approach by Ghinita at 
el. And. Like such protocol, our protocol is organized according to two
stages. In the first stage, the user privately determines his/her location within 
a public grid, using oblivious transfer. This data contains both the ID and 
associated symmetric key for the block of data in the private grid. In the 
second stage, the user executes a communicational efficient PIR, to retrieve 
the appropriate block in the private grid. This block is decrypted using the 
symmetric key obtained in the previous stage. 
 Our protocol thus provides protection for both the user and the server. The 
user is protected because the server is unable to determine his/her location. 
Similarly, the server’s data is protected since a malicious user can only 
decrypt the block of data obtained by PIR with the encryption key acquired 
in the previous stage. In other words, users cannot gain any more data than 
what they have paid for. We remark that this paper is an enhancement of a 
previous work. 
ADVANTAGES OF PROPOSED SYSTEM: 
 Redesigned the key structure. 
 Added a formal security model. 
 Implemented the solution on both a mobile device and desktop machine. 
SYSTEM ARCHITECTURE:
SYSTEM REQUIREMENTS: 
HARDWARE REQUIREMENTS: 
 System : Pentium IV 2.4 GHz. 
 Hard Disk : 40 GB. 
 Floppy Drive : 1.44 Mb. 
 Monitor : 15 VGA Colour. 
 Mouse : Logitech. 
 Ram : 512 Mb.
SOFTWARE REQUIREMENTS: 
 Operating system : Windows XP/7. 
 Coding Language : JAVA/J2EE 
 IDE : Netbeans 7.4 
 Database : MYSQL 
REFERENCE: 
Russell Paulet, Md. Golam Kaosar, Xun Yi, and Elisa Bertino, Fellow, IEEE 
“Privacy-Preserving and Content-Protecting Location Based Queries” IEEE 
TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 
26, NO. 5, MAY 2014

More Related Content

DOCX
JPJ1424 Privacy-Preserving and Content-Protecting Location Based Queries
PDF
privacy preserving abstract
PPTX
Analysis the Privacy preserving and content protecting location based on queries
DOCX
privacy-preserving and content-protecting location based queries
DOC
Privacy preserving and content-protecting location based queries
DOCX
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Preserving location privacy in geo s...
DOCX
Logical design of io t
PPTX
Lecture 17
JPJ1424 Privacy-Preserving and Content-Protecting Location Based Queries
privacy preserving abstract
Analysis the Privacy preserving and content protecting location based on queries
privacy-preserving and content-protecting location based queries
Privacy preserving and content-protecting location based queries
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Preserving location privacy in geo s...
Logical design of io t
Lecture 17

What's hot (16)

DOCX
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
PPTX
Io t introduction
DOCX
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
DOCX
Control cloud data access privilege and
PPTX
Attributes based encryption with verifiable outsourced decryption
PPTX
Attribute-Based Encryption for Cloud Security
DOCX
Identity based proxy-oriented data uploading and remote data integrity checki...
PPTX
3.pillars of embedded io t and physical devices
PDF
Edcon - Hardware wallets and smart contracts
DOCX
A secure protocol for spontaneous wireless ad hoc networks creation
PDF
IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKI...
PPTX
A Fully Anonymous Attribute-Based Encryption to Control Cloud Data Access and...
DOCX
JPD1422 Secure Data Retrieval for Decentralized Disruption-Tolerant Military...
PPT
PPT FOR IDBSDDS SCHEMES
PPTX
Case studies in io t smart-home
PDF
Psdot 3 building and maintaining trust in internet voting with biometrics aut...
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
Io t introduction
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Control cloud data access privilege and
Attributes based encryption with verifiable outsourced decryption
Attribute-Based Encryption for Cloud Security
Identity based proxy-oriented data uploading and remote data integrity checki...
3.pillars of embedded io t and physical devices
Edcon - Hardware wallets and smart contracts
A secure protocol for spontaneous wireless ad hoc networks creation
IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKI...
A Fully Anonymous Attribute-Based Encryption to Control Cloud Data Access and...
JPD1422 Secure Data Retrieval for Decentralized Disruption-Tolerant Military...
PPT FOR IDBSDDS SCHEMES
Case studies in io t smart-home
Psdot 3 building and maintaining trust in internet voting with biometrics aut...
Ad

Viewers also liked (7)

PDF
F0423038041
PDF
Using Randomized Response Techniques for Privacy-Preserving Data Mining
PDF
A Review Study on the Privacy Preserving Data Mining Techniques and Approaches
PDF
Performance Analysis of Hybrid Approach for Privacy Preserving in Data Mining
PPTX
Privacy preserving in data mining with hybrid approach
PPT
Data mining and privacy preserving in data mining
PDF
32 Ways a Digital Marketing Consultant Can Help Grow Your Business
F0423038041
Using Randomized Response Techniques for Privacy-Preserving Data Mining
A Review Study on the Privacy Preserving Data Mining Techniques and Approaches
Performance Analysis of Hybrid Approach for Privacy Preserving in Data Mining
Privacy preserving in data mining with hybrid approach
Data mining and privacy preserving in data mining
32 Ways a Digital Marketing Consultant Can Help Grow Your Business
Ad

Similar to 2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting location based queries (20)

DOCX
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
DOCX
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
PDF
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
PPTX
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
DOC
documentation for identity based secure distrbuted data storage schemes
PDF
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
DOCX
IEEE 2014 DOTNET NETWORKING PROJECTS Secure data-retrieval-for-decentralized-...
DOCX
2014 IEEE DOTNET NETWORKING PROJECT Secure data-retrieval-for-decentralized-d...
PDF
H017113842
PDF
An in-building multi-server cloud system based on shortest Path algorithm dep...
PPTX
A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing.pptx
PDF
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
DOCX
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Secure outsourced-attribute-base...
DOCX
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Secure outsourced-attribute-based...
DOCX
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Secure outsourced-attribute-based...
DOCX
Sensitive label privacy protection on social
PDF
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
PDF
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
PDF
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
DOCX
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
documentation for identity based secure distrbuted data storage schemes
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
IEEE 2014 DOTNET NETWORKING PROJECTS Secure data-retrieval-for-decentralized-...
2014 IEEE DOTNET NETWORKING PROJECT Secure data-retrieval-for-decentralized-d...
H017113842
An in-building multi-server cloud system based on shortest Path algorithm dep...
A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing.pptx
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Secure outsourced-attribute-base...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Secure outsourced-attribute-based...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Secure outsourced-attribute-based...
Sensitive label privacy protection on social
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...

More from IEEEFINALYEARSTUDENTPROJECT (20)

PDF
IEEE 2014-2015 DOTNET Projects GlobalSoft Technologies
PDF
2014 2015 ieee dotnet projects globalsoft technologies
PDF
2014 2015 ieee java projects globalsoft technologies
DOCX
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Web service recommendation via ex...
DOCX
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Securing brokerless publish subsc...
DOCX
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Rre a-game-theoretic-intrusion-re...
DOCX
2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction for web image rerank...
DOCX
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Automatic summarization of bug re...
DOCX
2014 IEEE JAVA SERVICE COMPUTING PROJECT Web service recommendation via explo...
DOCX
2014 IEEE JAVA SERVICE COMPUTING PROJECT Privacy enhanced web service composi...
DOCX
2014 IEEE JAVA SERVICE COMPUTING PROJECT Decentralized enactment of bpel proc...
DOCX
2014 IEEE JAVA SERVICE COMPUTING PROJECT A novel time obfuscated algorithm fo...
DOCX
2014 IEEE JAVA DATA MINING PROJECT Web image re ranking using query-specific ...
DOCX
2014 IEEE JAVA DATA MINING PROJECT Secure outsourced attribute based signatures
DOC
2014 IEEE JAVA DATA MINING PROJECT Mining weakly labeled web facial images fo...
DOCX
2014 IEEE JAVA DATA MINING PROJECT Discovering emerging topics in social stre...
DOCX
2014 IEEE JAVA DATA MINING PROJECT Data mining with big data
DOCX
2014 IEEE JAVA DATA MINING PROJECT A probabilistic approach to string transfo...
DOCX
2014 IEEE JAVA NETWORKING COMPUTING PROJECT Cost effective resource allocatio...
DOCX
2014 IEEE JAVA NETWORKING COMPUTING PROJECT Compact dfa scalable pattern matc...
IEEE 2014-2015 DOTNET Projects GlobalSoft Technologies
2014 2015 ieee dotnet projects globalsoft technologies
2014 2015 ieee java projects globalsoft technologies
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Web service recommendation via ex...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Securing brokerless publish subsc...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Rre a-game-theoretic-intrusion-re...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction for web image rerank...
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Automatic summarization of bug re...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Web service recommendation via explo...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Privacy enhanced web service composi...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Decentralized enactment of bpel proc...
2014 IEEE JAVA SERVICE COMPUTING PROJECT A novel time obfuscated algorithm fo...
2014 IEEE JAVA DATA MINING PROJECT Web image re ranking using query-specific ...
2014 IEEE JAVA DATA MINING PROJECT Secure outsourced attribute based signatures
2014 IEEE JAVA DATA MINING PROJECT Mining weakly labeled web facial images fo...
2014 IEEE JAVA DATA MINING PROJECT Discovering emerging topics in social stre...
2014 IEEE JAVA DATA MINING PROJECT Data mining with big data
2014 IEEE JAVA DATA MINING PROJECT A probabilistic approach to string transfo...
2014 IEEE JAVA NETWORKING COMPUTING PROJECT Cost effective resource allocatio...
2014 IEEE JAVA NETWORKING COMPUTING PROJECT Compact dfa scalable pattern matc...

Recently uploaded (20)

PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
Welding lecture in detail for understanding
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
bas. eng. economics group 4 presentation 1.pptx
PDF
Digital Logic Computer Design lecture notes
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
Sustainable Sites - Green Building Construction
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
Construction Project Organization Group 2.pptx
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
Geodesy 1.pptx...............................................
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PDF
Well-logging-methods_new................
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
Welding lecture in detail for understanding
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
bas. eng. economics group 4 presentation 1.pptx
Digital Logic Computer Design lecture notes
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Sustainable Sites - Green Building Construction
Model Code of Practice - Construction Work - 21102022 .pdf
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Foundation to blockchain - A guide to Blockchain Tech
Construction Project Organization Group 2.pptx
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Geodesy 1.pptx...............................................
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Well-logging-methods_new................
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS

2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting location based queries

  • 1. GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com Privacy-Preserving and Content-Protecting Location Based Queries ABSTRACT: In this paper we present a solution to one of the location-based query problems. This problem is defined as follows: (i) a user wants to query a database of location data, known as Points Of Interest (POIs), and does not want to reveal his/her location to the server due to privacy concerns; (ii) the owner of the location data, that is, the location server, does not want to simply distribute its data to all users. The location server desires to have some control over its data, since the data is its asset. We propose a major enhancement upon previous solutions by introducing a two stage approach, where the first step is based on Oblivious Transfer and the second step is based on Private Information Retrieval, to achieve a secure solution for both parties. The solution we present is efficient and practical in many scenarios. We implement our solution on a desktop machine and a mobile device to assess the efficiency of our protocol. We also introduce a security model and analyse the security in the context of our protocol. Finally, we highlight a security weakness of our previous work and present a solution to overcome it.
  • 2. EXISTING SYSTEM: The Location Server (LS), which offers some LBS, spends its resources to compile information about various interesting POIs. Hence, it is expected that the LS would not disclose any information without fees. Therefore the LBS has to ensure that LS’s data is not accessed by any unauthorized user. During the process of transmission the users should not be allowed to discover any information for which they have not paid. It is thus crucial that solutions be devised that address the privacy of the users issuing queries, but also prevent users from accessing content to which they do not have authorization. DISADVANTAGES OF EXISTING SYSTEM:  Among many challenging barriers to the wide deployment of such application, privacy assurance is a major issue  The user can get answers to various location based queries, PROPOSED SYSTEM:  In this paper, we propose a novel protocol for location based queries that has major performance improvements with respect to the approach by Ghinita at el. And. Like such protocol, our protocol is organized according to two
  • 3. stages. In the first stage, the user privately determines his/her location within a public grid, using oblivious transfer. This data contains both the ID and associated symmetric key for the block of data in the private grid. In the second stage, the user executes a communicational efficient PIR, to retrieve the appropriate block in the private grid. This block is decrypted using the symmetric key obtained in the previous stage.  Our protocol thus provides protection for both the user and the server. The user is protected because the server is unable to determine his/her location. Similarly, the server’s data is protected since a malicious user can only decrypt the block of data obtained by PIR with the encryption key acquired in the previous stage. In other words, users cannot gain any more data than what they have paid for. We remark that this paper is an enhancement of a previous work. ADVANTAGES OF PROPOSED SYSTEM:  Redesigned the key structure.  Added a formal security model.  Implemented the solution on both a mobile device and desktop machine. SYSTEM ARCHITECTURE:
  • 4. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb.
  • 5. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7.  Coding Language : JAVA/J2EE  IDE : Netbeans 7.4  Database : MYSQL REFERENCE: Russell Paulet, Md. Golam Kaosar, Xun Yi, and Elisa Bertino, Fellow, IEEE “Privacy-Preserving and Content-Protecting Location Based Queries” IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 26, NO. 5, MAY 2014