PROFILR Toward Preserving Privacy and Functionality in Geosocial Networks 
PROFILR Toward Preserving Privacy and Functionality in 
Geosocial Networks 
Profit is the main participation incentive for social network providers. Its reliance on user 
profiles, built from a wealth of voluntarily revealed personal information, exposes users to a 
variety of privacy vulnerabilities. In this paper, we propose to take first steps toward addressing 
the conflict between profit and privacy in geosocial networks. We introduce PROFILR, a 
framework for constructing location centric profiles (LCPs), aggregates built over the profiles of 
users that have visited discrete locations (i.e., venues). P ROFIL R endows users with strong 
privacy guarantees and providers with correctness assurances. In addition to a venue centric 
approach, we propose a decentralized solution for computing real time LCP snapshots over the 
profiles of colocated users. An Android implementation shows that P ROFIL R is efficient; the 
end-to-end overhead is small even under strong privacy and correctness assurances. 
Online social networks have become a significant source of personal information. Their users 
voluntarily reveal a wealth of personal data, including age, gender, contact information, 
preferences and status updates. A recent addition to this space, geosocial networks (GSNs) such 
as Yelp and Foursquare further collect fine grained location information, through check- ins 
performed by users at visited venues. Overtly, personal information allows GSN providers to 
offer a variety of applications, including personalized recommendations and targeted advertising, 
and venue owners to promote their businesses through spatio-temporal incentives, e.g., 
rewarding frequent customers through accumulated badges 
DISADVANTAGES OF EXISTING SYSTEM: 
 Providing personal information exposes however users to significant risks. 
 As social networks have been shown to leak and even sell user data to third 
Contact: 9703109334, 9533694296 
ABSTRACT: 
EXISTING SYSTEM: 
parties. 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
PROFILR Toward Preserving Privacy and Functionality in Geosocial Networks 
First, we propose a venue centric P ROFIL R , that relieves the GSN provider from a costly 
involvement in venue specific activities. To achieve this, P ROFIL R stores and builds LCPs at 
venues. Furthermore, it relies on Benaloh’s homomorphic cryptosystem and zero knowledge 
proofs to enable oblivious and provable correct LCP computations. We prove that P ROFIL R 
satisfies the introduced correctness and privacy properties. 
Second, we propose a completely decentralized PROFIL R extension, built around the no tion of 
snapshot LCPs. The distributed P ROFIL R enables user devices to aggregate the profiles of co-located 
users, without assistance from a venue device. Snapshot LCPs are not bound to venues, 
but instead user devices can compute LCPs of neighbors at any location of interest. 
Communications in both PROFILR implementations are performed over ad hoc wireless 
connections. 
ADVANTAGES OF PROPOSED SYSTEM: 
 Privacy preserving, personalized public safety recommendations and 
 Privately building real time statistics over the profiles of venue patrons with Yelp 
 Evaluate PROFIL R through an Android implementation. Show that PROFILR is 
efficient even when deployed on previous generation Smartphones. 
Contact: 9703109334, 9533694296 
PROPOSED SYSTEM: 
accounts. 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
PROFILR Toward Preserving Privacy and Functionality in Geosocial Networks 
SYSTEM ARCHITECTURE: 
SYSTEM REQUIREMENTS: 
HARDWARE REQUIREMENTS: 
 System : Pentium IV 2.4 GHz. 
 Hard Disk : 40 GB. 
 Floppy Drive : 1.44 Mb. 
 Monitor : 15 VGA Colour. 
 Mouse : Logitech. 
 Ram : 512 Mb. 
Contact: 9703109334, 9533694296 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
PROFILR Toward Preserving Privacy and Functionality in Geosocial Networks 
SOFTWARE REQUIREMENTS: 
 Operating system : Windows XP/7. 
 Coding Language : JAVA/J2EE 
 IDE : Netbeans 7.4 
 Database : MYSQL 
Bogdan Carbunar, Mahmudur Rahman, Jaime Ballesteros, Naphtali Rishe, and Athanasios V. 
Vasilakos “PROFILR : Toward Preserving Privacy and Functionality in Geosocial 
Networks” IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 
VOL. 9, NO. 4, APRIL 2014. 
Contact: 9703109334, 9533694296 
REFERENCE: 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in

More Related Content

DOCX
JPJ1430 PROFILR: Toward Preserving Privacy and Functionality in Geosocial Net...
DOCX
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Profilr toward preserving privacy an...
PPTX
Blue bite mit nfc goes social feb2013
PPTX
Charlie Johnson, Digital Element: Protecting your users privacy and deliverin...
PPT
Quad Graphics nfc mit
PDF
Mobile Data Subscriber Behavior
PPT
MobiUbiq Vision
PDF
Four key points for smart city public wifi security -- C&T RF Antennas Inc
JPJ1430 PROFILR: Toward Preserving Privacy and Functionality in Geosocial Net...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Profilr toward preserving privacy an...
Blue bite mit nfc goes social feb2013
Charlie Johnson, Digital Element: Protecting your users privacy and deliverin...
Quad Graphics nfc mit
Mobile Data Subscriber Behavior
MobiUbiq Vision
Four key points for smart city public wifi security -- C&T RF Antennas Inc

What's hot (19)

PDF
(Fall 2012) Near Field Communication & Biometrics
PDF
Ross Rubin's Presentation
PPTX
DOCX
What is nfc
PPT
Thinaire deck redux
PDF
Mobile Payment - Will NFC finally unlock a new value chain?
PPTX
Nfctechnologyppt
PPTX
Next Generation NFC Solutions and Contactless Infrastructure
PDF
What is a Trusted Service Manager?
PPT
Google Wallet by Gokul raj (BMIT, Jaipur)
PDF
NFC Patents for Smartphone Mobile Payments Licensing Potential Assessment
PPTX
Party Squasher: a party disaster solution
PDF
An Overview of All Ericsson Labs APIs
PPT
What’s the Power behind 2D Barcodes? Are they the Foundation of the Revival ...
PDF
Nucleus vision onepager
PPTX
Bluetooth
PDF
All the 12 Payment Enabling Technologies & 54 Illustrative Companies
PDF
Trusted Service Manager – Role and Challenges
PDF
NFC Everywhere
(Fall 2012) Near Field Communication & Biometrics
Ross Rubin's Presentation
What is nfc
Thinaire deck redux
Mobile Payment - Will NFC finally unlock a new value chain?
Nfctechnologyppt
Next Generation NFC Solutions and Contactless Infrastructure
What is a Trusted Service Manager?
Google Wallet by Gokul raj (BMIT, Jaipur)
NFC Patents for Smartphone Mobile Payments Licensing Potential Assessment
Party Squasher: a party disaster solution
An Overview of All Ericsson Labs APIs
What’s the Power behind 2D Barcodes? Are they the Foundation of the Revival ...
Nucleus vision onepager
Bluetooth
All the 12 Payment Enabling Technologies & 54 Illustrative Companies
Trusted Service Manager – Role and Challenges
NFC Everywhere
Ad

Viewers also liked (11)

PPTX
Predicting bus arrival time based on participatory mobile phone sensing
PPTX
Sentiment analyzer and opinion mining
PDF
Opinion Mining & Sentiment Analysis Based on Natural Language Processing
PPTX
How Long to Wait? Predicting Bus Arrival Time With Mobile Phone Based Partici...
PPT
How long to wait predicting bus arrival time with mobile phone based particip...
PPTX
E-commerce Product Rating
PDF
Opinion Mining and Sentiment Analysis Issues and Challenges
PDF
Opinion mining for social media
PDF
Online Bus ticket reservation
PPTX
Online Bus Reservatiom System
Predicting bus arrival time based on participatory mobile phone sensing
Sentiment analyzer and opinion mining
Opinion Mining & Sentiment Analysis Based on Natural Language Processing
How Long to Wait? Predicting Bus Arrival Time With Mobile Phone Based Partici...
How long to wait predicting bus arrival time with mobile phone based particip...
E-commerce Product Rating
Opinion Mining and Sentiment Analysis Issues and Challenges
Opinion mining for social media
Online Bus ticket reservation
Online Bus Reservatiom System
Ad

Similar to profilr toward preserving privacy and functionality in geosocial networks (20)

DOCX
2014 IEEE JAVA NETWORK SECURITY PROJECT Profilr toward preserving privacy and...
DOCX
preserving location privacy in geosocial applications
DOC
Privacy preserving optimal meeting location determination on mobile devices
DOC
Privacy preserving optimal meeting location determination on mobile devices
DOCX
JPD1435 Preserving Location Privacy in Geosocial Applications
PPTX
Privacy preserving optimal meeting location determination on mobile devices
DOC
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Privacy preserving optimal meeting l...
PDF
Privacy preserving optimal meeting location determination on mobile devices
PDF
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
DOCX
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
DOCX
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
PDF
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...
DOC
Privacy preserving optimal meeting location determination on mobile devices
PDF
MAPS: A Multi Aspect Personalized POI Recommender System
DOC
azd document
PDF
Securing Location of User in Geo Social Networking
PDF
Predicting Venues in Location Based Social Network
PDF
PREDICTING VENUES IN LOCATION BASED SOCIAL NETWORK
PDF
H017665256
2014 IEEE JAVA NETWORK SECURITY PROJECT Profilr toward preserving privacy and...
preserving location privacy in geosocial applications
Privacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devices
JPD1435 Preserving Location Privacy in Geosocial Applications
Privacy preserving optimal meeting location determination on mobile devices
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Privacy preserving optimal meeting l...
Privacy preserving optimal meeting location determination on mobile devices
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...
Privacy preserving optimal meeting location determination on mobile devices
MAPS: A Multi Aspect Personalized POI Recommender System
azd document
Securing Location of User in Geo Social Networking
Predicting Venues in Location Based Social Network
PREDICTING VENUES IN LOCATION BASED SOCIAL NETWORK
H017665256

More from swathi78 (20)

DOC
secure mining of association rules in horizontally distributed databases
DOCX
a system for denial-of-service attack detection based on multivariate correla...
DOCX
web service recommendation via exploiting location and qo s information
DOCX
privacy-enhanced web service composition
DOCX
optimal distributed malware defense in mobile networks with heterogeneous dev...
DOCX
friend book a semantic-based friend recommendation system for social networks
DOCX
efficient authentication for mobile and pervasive computing
DOCX
cooperative caching for efficient data access in disruption tolerant networks
DOCX
an incentive framework for cellular traffic offloading
DOCX
secure outsourced attribute-based signatures
DOCX
traffic pattern-based content leakage detection for trusted content delivery ...
DOCX
the design and evaluation of an information sharing system for human networks
DOCX
the client assignment problem for continuous distributed interactive applicat...
DOCX
sos a distributed mobile q&a system based on social networks
DOCX
securing broker-less publish subscribe systems using identity-based encryption
DOCX
rre a game-theoretic intrusion response and recovery engine
DOCX
on false data-injection attacks against power system state estimation modelin...
DOCX
loca ward a security and privacy aware location-based rewarding system
DOCX
exploiting service similarity for privacy in location-based search queries
DOCX
enabling trustworthy service evaluation in service-oriented mobile social net...
secure mining of association rules in horizontally distributed databases
a system for denial-of-service attack detection based on multivariate correla...
web service recommendation via exploiting location and qo s information
privacy-enhanced web service composition
optimal distributed malware defense in mobile networks with heterogeneous dev...
friend book a semantic-based friend recommendation system for social networks
efficient authentication for mobile and pervasive computing
cooperative caching for efficient data access in disruption tolerant networks
an incentive framework for cellular traffic offloading
secure outsourced attribute-based signatures
traffic pattern-based content leakage detection for trusted content delivery ...
the design and evaluation of an information sharing system for human networks
the client assignment problem for continuous distributed interactive applicat...
sos a distributed mobile q&a system based on social networks
securing broker-less publish subscribe systems using identity-based encryption
rre a game-theoretic intrusion response and recovery engine
on false data-injection attacks against power system state estimation modelin...
loca ward a security and privacy aware location-based rewarding system
exploiting service similarity for privacy in location-based search queries
enabling trustworthy service evaluation in service-oriented mobile social net...

Recently uploaded (20)

PDF
20250617 - IR - Global Guide for HR - 51 pages.pdf
PDF
First part_B-Image Processing - 1 of 2).pdf
PPTX
"Array and Linked List in Data Structures with Types, Operations, Implementat...
DOC
T Pandian CV Madurai pandi kokkaf illaya
PDF
Cryptography and Network Security-Module-I.pdf
PDF
UEFA_Carbon_Footprint_Calculator_Methology_2.0.pdf
PPTX
Amdahl’s law is explained in the above power point presentations
PDF
Java Basics-Introduction and program control
PPTX
CyberSecurity Mobile and Wireless Devices
PPTX
A Brief Introduction to IoT- Smart Objects: The "Things" in IoT
PDF
Applications of Equal_Area_Criterion.pdf
PPTX
CN_Unite_1 AI&DS ENGGERING SPPU PUNE UNIVERSITY
PDF
Prof. Dr. KAYIHURA A. SILAS MUNYANEZA, PhD..pdf
PDF
August 2025 - Top 10 Read Articles in Network Security & Its Applications
PPTX
ASME PCC-02 TRAINING -DESKTOP-NLE5HNP.pptx
PDF
Accra-Kumasi Expressway - Prefeasibility Report Volume 1 of 7.11.2018.pdf
PPTX
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
PDF
Soil Improvement Techniques Note - Rabbi
PPTX
Petroleum Refining & Petrochemicals.pptx
PDF
August -2025_Top10 Read_Articles_ijait.pdf
20250617 - IR - Global Guide for HR - 51 pages.pdf
First part_B-Image Processing - 1 of 2).pdf
"Array and Linked List in Data Structures with Types, Operations, Implementat...
T Pandian CV Madurai pandi kokkaf illaya
Cryptography and Network Security-Module-I.pdf
UEFA_Carbon_Footprint_Calculator_Methology_2.0.pdf
Amdahl’s law is explained in the above power point presentations
Java Basics-Introduction and program control
CyberSecurity Mobile and Wireless Devices
A Brief Introduction to IoT- Smart Objects: The "Things" in IoT
Applications of Equal_Area_Criterion.pdf
CN_Unite_1 AI&DS ENGGERING SPPU PUNE UNIVERSITY
Prof. Dr. KAYIHURA A. SILAS MUNYANEZA, PhD..pdf
August 2025 - Top 10 Read Articles in Network Security & Its Applications
ASME PCC-02 TRAINING -DESKTOP-NLE5HNP.pptx
Accra-Kumasi Expressway - Prefeasibility Report Volume 1 of 7.11.2018.pdf
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
Soil Improvement Techniques Note - Rabbi
Petroleum Refining & Petrochemicals.pptx
August -2025_Top10 Read_Articles_ijait.pdf

profilr toward preserving privacy and functionality in geosocial networks

  • 1. PROFILR Toward Preserving Privacy and Functionality in Geosocial Networks PROFILR Toward Preserving Privacy and Functionality in Geosocial Networks Profit is the main participation incentive for social network providers. Its reliance on user profiles, built from a wealth of voluntarily revealed personal information, exposes users to a variety of privacy vulnerabilities. In this paper, we propose to take first steps toward addressing the conflict between profit and privacy in geosocial networks. We introduce PROFILR, a framework for constructing location centric profiles (LCPs), aggregates built over the profiles of users that have visited discrete locations (i.e., venues). P ROFIL R endows users with strong privacy guarantees and providers with correctness assurances. In addition to a venue centric approach, we propose a decentralized solution for computing real time LCP snapshots over the profiles of colocated users. An Android implementation shows that P ROFIL R is efficient; the end-to-end overhead is small even under strong privacy and correctness assurances. Online social networks have become a significant source of personal information. Their users voluntarily reveal a wealth of personal data, including age, gender, contact information, preferences and status updates. A recent addition to this space, geosocial networks (GSNs) such as Yelp and Foursquare further collect fine grained location information, through check- ins performed by users at visited venues. Overtly, personal information allows GSN providers to offer a variety of applications, including personalized recommendations and targeted advertising, and venue owners to promote their businesses through spatio-temporal incentives, e.g., rewarding frequent customers through accumulated badges DISADVANTAGES OF EXISTING SYSTEM:  Providing personal information exposes however users to significant risks.  As social networks have been shown to leak and even sell user data to third Contact: 9703109334, 9533694296 ABSTRACT: EXISTING SYSTEM: parties. Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
  • 2. PROFILR Toward Preserving Privacy and Functionality in Geosocial Networks First, we propose a venue centric P ROFIL R , that relieves the GSN provider from a costly involvement in venue specific activities. To achieve this, P ROFIL R stores and builds LCPs at venues. Furthermore, it relies on Benaloh’s homomorphic cryptosystem and zero knowledge proofs to enable oblivious and provable correct LCP computations. We prove that P ROFIL R satisfies the introduced correctness and privacy properties. Second, we propose a completely decentralized PROFIL R extension, built around the no tion of snapshot LCPs. The distributed P ROFIL R enables user devices to aggregate the profiles of co-located users, without assistance from a venue device. Snapshot LCPs are not bound to venues, but instead user devices can compute LCPs of neighbors at any location of interest. Communications in both PROFILR implementations are performed over ad hoc wireless connections. ADVANTAGES OF PROPOSED SYSTEM:  Privacy preserving, personalized public safety recommendations and  Privately building real time statistics over the profiles of venue patrons with Yelp  Evaluate PROFIL R through an Android implementation. Show that PROFILR is efficient even when deployed on previous generation Smartphones. Contact: 9703109334, 9533694296 PROPOSED SYSTEM: accounts. Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
  • 3. PROFILR Toward Preserving Privacy and Functionality in Geosocial Networks SYSTEM ARCHITECTURE: SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb. Contact: 9703109334, 9533694296 Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
  • 4. PROFILR Toward Preserving Privacy and Functionality in Geosocial Networks SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7.  Coding Language : JAVA/J2EE  IDE : Netbeans 7.4  Database : MYSQL Bogdan Carbunar, Mahmudur Rahman, Jaime Ballesteros, Naphtali Rishe, and Athanasios V. Vasilakos “PROFILR : Toward Preserving Privacy and Functionality in Geosocial Networks” IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 4, APRIL 2014. Contact: 9703109334, 9533694296 REFERENCE: Email id: academicliveprojects@gmail.com, www.logicsystems.org.in