ISSN ONLINE(2320-9801) PRINT (2320-9798)

Yakışıklı erkek tatil için bir beldeye gidiyor burada kendisine türk Porno güzel bir seksi kadın ayarlıyor Onunla beraber otel odasına gidiyorlar Otel odasına rokettube giren kadın ilk önce erkekle sohbet ederek işi yavaş halletmeye çalışıyor sex hikayeleri Kocası fabrikatör olan sarışın Rus hatun şehirden biraz uzak olan bir türk porno kasabaya son derece lüks bir villa yaptırıp yerleşiyor Kocasını işe gönderip mobil porno istediği erkeği eve atan Rus hatun son olarak fotoğraf çekimi yapmak üzere türk porno evine gelen genç adamı bahçede azdırıyor Güzel hatun zengin bir iş adamının porno indir dostu olmayı kabul ediyor Adamın kendisine aldığı yazlık evde sikiş kalmaya başlayan hatun bir süre sonra kendi erkek arkadaşlarını bir bir çağırarak onlarla porno izle yapıyor Son olarak çağırdığı arkadaşını kapıda üzerinde beyaz gömleğin açık sikiş düğmelerinden fışkıran dik memeleri ile karşılayıp içeri girer girmez sikiş dudaklarına yapışarak sevişiyor Evin her köşesine yayılan inleme seslerinin eşliğinde yorgun düşerek orgazm oluyor

Certain Investigations on Securing Moving Data Objects

P.Andrew1, J.Anish Kumar1, R.Santhya1, Prof.S.Balamurugan1, S.Charanyaa2
  1. Department of IT, Kalaignar Karunanidhi Institute of Technology, Coimbatore, TamilNadu, India
  2. Senior Software Engineer Mainframe Technologies Former, Larsen & Tubro (L&T) Infotech, Chennai TamilNadu, India
Related article at Pubmed, Scholar Google

Visit for more related articles at International Journal of Innovative Research in Computer and Communication Engineering

Abstract

Recently there is a steep rise in usage of location –aware devices such as many GSM mobile phones, GPS enabled PDA’s, location sensors, and active RFID tags. Due to this device usage scenario, the device generate a large collection of moving data objects with the help of trajectory data , all these data are used for various data identification and analysis process. For instance consider traffic control, one can hack the control unit of traffic control management. Therefore it is way clear that a hacker may collect many temporal data to cover sensational massages of an organization and especially he/she can discover much personal information of third party/check points of many premises. Typically personal data (data privacy) may also fetch. Due to user’s identity replacement which is actual like terminal i.e. Quasi Identifiers (QID) of moving data are linked to external information to re-identify individual existence, thus the attacker can be able to track and trace the anonymous moving objects back into individuals. This paper gives a survey on recent trends and a new strategy for securing trajectory moving data objects.

 

Keywords

GSM, Trajectory Data, Moving Object Data, Data Privacy, Quasi Identifier, Security Attack

INTRODUCTION

Several authors have undergone many survey and created their algorithms in securing moving object data. The main objective is that is to hide the spatio-temporal data to the anonymous user. The major reason is that to protect the isolated data. Since data privacy preserving is been our major goal we can do various research in this field. Ghinita et al. [44][2009] considered two conceal mechanisms in which an adversary background knowledge of maximum speed to infer more specific location information. Based on the velocity of the movement of the object the attacker could assume that the object is under a particular movement as an example if Alice is walking on the road based on her velocity of speed the attacker could find that Alice is waling if she is driving a car the attacker could find that she is driving. So based on the velocity based adversary knowledge the trajectory data could be predicted. So Ghinita considered two types of attacks: (1) the initiative without back ground information more on sensitive location map. (2) The initiative with such background information. In the first case, the privacy requirement is not allow to an attacker to diagnose the user location in the sub-region in the pretext region. In the second case, the privacy requirement direct that the probability of association between the user and the location. She consider two types of transformation on trajectory databases, temporal and spatial cloaking. The author planned two alternatives in achieving temporal cloaking: request deferral and postdating. The space and time error are generated in the temporal cloaking and spatial cloaking. In this for the low velocity the request are safe but in the case that the velocity increases the request are deferred/postdated. As the velocity increases the request for temporal data should be processed while moving. Correlation-based adversary knowledge: In this data publishing most of the attacker uses this correlation-based adversary knowledge because the attacker attain by correlating the timestamps of the user. The attacker finds the highest probability of the user location by forward motion and the backward motion model during a period of time the attacker correlates the user location by their movement. Jin et al [45]. Implemented two protocols for publishing the data. In the first they cluster the location of the users and then the data is published if the forward breach probability is below the user-defined threshold. Then they re-cluster the data at a period of time and find out the backward breach probability, by correlating forward breach probability and backward breach probability the data is published if the data does not reach the user-defined threshold. But these approaches are more effective to defend against the attacks but not to stop it.
Even though the location privacy has already been accepted as an important problem and effective privacypreserving solutions to publish the trajectories data. These trajectories data might be defined by user itself and by data mining the databases. In this world’s technology for positioning systems, the location of the trajectories data can be predicted very accurately. The location data can be obtaining through the score pairs i.e. longitude and latitude. The location can also be finding out by QIDs by identifying the frequent mining pattern technique. The QID mining looks for the frequently mined pattern and correlated with the threshold defined by the user.
The remainder of the paper is organized as follows. Section 2 deals about Literary Review and Recent Trends. Objectives are designed and are discussed in Section 3. Section 4 portrays the Working Methodology. Section 5 concludes the paper and outlines the direction for Future Work

LITERARY REVIEW AND RECENT TRENDS

In 2009b [27] authors said that nowadays the wireless networks are improving the widespread and also the lacking of technique for locating a device has also been increased efficiently. There are some techniques for verifying and guarantying a location given by the user without dome specialized software particularly in large scale networks through the Location Based Services (LBS). Usually in some of the application a device is in need o authenticate by itself to other in some way which usually takes the form of interchanging a private secret share by two like password, in order to prove the identity of the device. While the device to produce the password which disclose the password and allow the access, it is enough for the device to prove its current location is in the area of that network. This kind of location verification problems can be resolved by the methods like Active Badge and RFID. The major limitation of this method is that these are relay within a constrained area and also need an infrastructure of sensors to perform some function which inturn aims its usage to small scale network. For large scale, Vehicular Adhoc Networks (VANETs) is used which does not require any special physical infrastructure. This scheme is been chosen because of the protocol’s requirements of lameper-resistent devices and also the public key cryptography.
In 2009 c [28] this paper, the author presented results of a large-scale quantitative analysis of Brightkite, a commercial location-based social network (LSN). Unlike other social networks, Brightkite is dominated by male users who are professionals and likely to be bloggers and work in social media area. High-degree users are likely more mobile, have more friends, and send more updates. SMS and Email users are more mobile and their location updates are harder to predict. By clustering the attributes from profiles, activities, mobility, and social graphs, we can classify all users into five distinct behaviour groups. In future work, the author plan to expand their future work on the studies of social graphs using additional metrics and combine them for correlated analysis. The author also plans to extract a workload model from the location updates to evaluate the performance of location based information-sharing and privacy-preserving algorithms.
In 2010b [30] the author made a survey of recent advancements for the offering of K–anonymity in LBSs. Most of the approaches that have been proposed heavily depend on a trusted server component – that acts as an intermediate between the end user and the service provider – to preserve the anonymity of the former entity. Existing approaches are partitioned in three categories: (a) historical K–anonymity, (b) location K–anonymity, and (c) trajectory K–anonymity. In each of these categories we present some of the most prevalent methodologies that have been proposed and highlight their operation. The author informed us that the future work in this research direction will lead to more robust and thorough methodologies that better protect the privacy of the user when requesting LBSs. In 2010c [31], the author showed that their methods yield a formal theoretical protection guarantee against the re-identification attack. Through an extensive set of experiments on a real-life spatio-temporal dataset and showed that the anonymity protection achieved is considerably stronger than the theoretical worst case and the proposed techniques preserve the quality of the clustering analysis. The whole anonymization process is based on different steps using different transformation tools. At the moment there is no a strict integration of consecutive steps, although it is believed that there several margins to improve the quality of the anonymization. The author also suggested as that the further investigations could be directed to developing a generalization method that considers both spatial and temporal information in order to obtain generalized and anonymous spatio-temporal data.
In 2011b [33] the author presented decentralized methods that accomplish the efficiency of mobile devices to make wireless personal ad-hoc networks to preserve the security of users who can approach location-based services. The uniqueness of this approach is that users do not need to trust any party such as an intermediary server or peers with their locations and identities. The author also proposed an efficient algorithm for users to estimate a k-anonymous imprecise location and to randomly choose one of her peers with uniform probability who forwards the service request on behalf of the user. The author also shows an experimental evaluation using this approach can enjoy a high quality of service with a high degree of privacy.
In 2011c [34]author spoke about the extension of mobile devices with global positioning functionality like GPS and AGPS and Internet connectivity such as 3G and Wi-Fi has resulted in widespread development of locationbased services (LBS). For snapshot LBS, a mobile user only needs to report its current location to a service provider once to get its desired information. On the other hand, a mobile user has to report its location to a service provider in a periodic or on-demand manner to obtain its desired continuous LBS. Protecting user location privacy for continuous LBS is more challenging than snapshot LBS because intruders may use the spatial and temporal correlations in the user’s location samples to infer the user’s location information with higher certainty. Such user location trajectories are also very important for many applications. However, publishing such location trajectories to the public or a third party for data analysis could have serious privacy concerns. Privacy protection in continuous LBS and trajectory data publication has increasingly drawn attention from the research community and industry.
In 2012b [35], the author stated the classification of L2P2 problems into Basic L2P2 and Enhanced L2P2 problems. The difference between basic and enhanced L2P2 lies in whether the common users or all users in a sequence of cloaking areas would be used for privacy computation. For basic L2P2, a design of simple algorithm cloaking Algorithm1 is designed to address this problem. While for enhanced L2P2, the author proposed four heuristics like Cloaking Algorithm 2 for Enhanced L2P2, Cloaking Algorithm 3 for Enhanced L2P2, Cloaking Algorithm 4 for Enhanced L2P2 and Cloaking Algorithm 3 for Enhanced L2P2 to generate cloaking areas to satisfy users’ privacy requirements, where each heuristic has a different, unique criterion to expand cloaking areas. In addition, to evaluate the effectiveness of this proposed algorithms, they conducted a large number of simulations, and several interesting observations have been reported.
The author also forwarded the future work as follows,
1) Investigate other efficient heuristics for enhanced L2P2 problem
2) Test the proposed methods over other location data sets and try different location privacy measurements.
In 2012c [36], the author stated that accessing location-based services from mobile devices entails a privacy risk for users whose sensitive information can be inferred from the locations they visit. This information leakage raises the need for robust location-privacy protecting mechanisms (LPPMs). This LPPM is designed to provide user-centric location privacy; hence it is ideal to be implemented in the users’ mobile devices. This method accounts for the fact that the strongest adversary not only observes the perturbed location sent by the user but also knows the algorithm implemented by the protection mechanism. Hence, he can accomplish the information leaked by the LPPM’s algorithm to minimize his uncertainty about the user’s true location. However, the user is only aware of the adversary’s knowledge and does not make any assumption about his inference attack. Hence, she prepares the protection mechanism against the most optimal attack. By modelling the problem as a Bayesian Stackelberg competition, the author ensures that the optimal LPPM is designed anticipating such strong inference attack and also validated their method using real location traces. They have demonstrated that their approach finds the optimal attack for a given LPPM and service-quality constraint, and also shown that it is superior to other LPPMs such as basic location obfuscation where the optimal LPPM over alternatives is more significant when the service-quality constraint imposed by the user is tightened. Hence, this solution is effective exactly where it will be used. Finally, the results confirmed that loosening the service-quality constraint allows for increased privacy protection, but the magnitude of this increase strongly depends on the user profile, i.e., on the degree to which a user’s location is predictable from her LBS access profile. To the best of author’s knowledge, this is the first framework that explicitly includes the adversarial knowledge into a privacy-preserving design process, and considers the common knowledge between the privacy protector and the attacker.
In 2013 b [39] authors showed the present utilization of uncertainty information in a selection of applications in a mobile and also show the possibility of introducing artificial uncertainty into location information while using LBS without illustrating it. In 2013 c [40], the author proposed a new technique called a novel tree-based divisionary routing principle for protecting source location privacy using hide and seek strategy. This will also minimize energy consumed in hotspot and produce redundancy tactic routes in the non hotspot regions with abundant energy. Hence it achieves the maximization of the network lifetime and not only the preservation of privacy of a data.
In 2014 b [42], the author proposed a concept of fine grained privacy preserving location based service (LBS) framework called FINE which is basically for mobile devices. Also the authors proposed FINE framework combines the transformation key and proxy re-encryption to more most of computation –intensive tasks from the LB’s provides and also the cloud server or 3rd party uses which also keep the mobile devices for away from significant resource consuming operations. The further analysis of this FINE framework shows that it is source and highly efficient for mobile devices in the terms of communication and execution cost. The author laid the future work is that to reduce the cost on the cloud server lower the trust user on the cloud server honest but curious to introducers and also to calculates the effectiveness of the proposed FINE framework.
In 2014c [43], the author stated that the LBS have become an important part of our regular life. The untrusted LBS server will have information about the users in LBS and it will trace them in a different ways or also they can disclose their information to 3rd party which affects the person physically and mentally. Inorder to overcome this problem, the author suggested to use Dummy-Location Selection (DLS) algorithm which is been used inorder to attain k-anonymity for the users in LBS. The features of DLS are out of box from the existing approaches which keenly choose dummy location and also have a care about the protection of data from intruders. Firstly, on the entropy metric, the dummy locations are identified, then to assure that the selector dummy location are spread far as possible, the enhanced-DLS algorithm is been proposed. This algorithm can also enlarge the cloaking region (CR) by keeping same privacy level as the DLS algorithm.

OBJECTIVES

Even though privacy has been protected there are few open problems the two fundamental that are taken as objectives of our project:
1. Identifying secured moving data objects with high probability (Granularities of QID Location)
Though we trace people with help of modern technology such as GPS, mobile trackers, GIS, tracking IMEI number etc. we can be very accurately identify the spatial areas of the person or living area etc. There are several approaches to ascertain QID of various granularities. Ascertaining the granularity of QID location is an important and accosts problems. The locations of moving objects can be recorded precisely, down to the level of (Longitude, latitude) pairs. Kido et al divide the space into several regions. The bandit knowledge of position information of attacker is delimited by region which it belongs to. Monreale et al.[3][] consider the syntactic trajectory, which reasons over trajectories from a syntactic point of view define sensitive spatial areas and QID based on “privacy places” taxonomy. Finding the definition of quasi-identifiers in a pragmatic and triable and countable way is an open problem to hide the anonymity trajectory data in identifying the moving objects with high probability is an open problem.
2. Quick & Efficient discovery of QID of moving data objects:
Since many emerging trends assure that QID can provide either directly by end-user at the time he/she subscribe to location based service. In the QID aware anonymization technique the maximal size of the QID has a cogent collision on the algorithm performance. While run-time grows sub linearly with k, it grows super-linearly with the maximal size of the QIDs which make the performance of the algorithm less. In the case of anonymization, if the database is less, redundancy is less and location point is small, then the unification for the trajectories of moving objects is bungle. In the QID blind anonymization technique comparing with generalization approach and point matching the generalizationbased technique the generalized locations are betrayed uncontrolled information about exact locations of the points and the generalized trajectories may become useless for data mining and statistical applications which work on diminutive trajectories. After reconstruction on data publishing rather than data anonymized by means of generalization. The reconstruction is atomic and suitable for trajectory data mining applications. According to Mohammed et al.[4][] he used two algorithm (1) Apriori algorithm (2) Greedy algorithm. In the Apriori algorithm the solution to find out to avoid enumerating all possible violating sequences the authors aims to find minimal violating sequences. The q set violates LKC-privacy requirement, which stores minimal, violates sequences, to generate the next candidate set which has non-violating sequence set. The Greedy Algorithm impute the initial Score (p) to every candidate pair. In each monotony, the highest score pair will be suppressed, the remaining score pair are updated until no candidate pair monotony is available. If data to be accessed so by suppressing the data will make data under-utilized.

PROPOSED METHODOLOGY

For the intended use of data the adhoc anonymization technique is used for the location privacy data. Work in query evaluation over uncertain databases can hence be used for answering adhoc queries over anonymized data i.e. trajectory data.

CONCLUSION AND FUTURE WORK

Allocating the trajectory data from the database D into a tabulation method and based on that tabulation creating a graph and transfiguring the trajectory data as database D` and tabulating it and creating the graph based point and apply the point of matching and publish the data. So the attacker will match the points in the graph and trying all the possibilities and also trying the trajectory data in the database D`. Typically personal data (data privacy) may also fetched. Due to user’s identity replacement which is actual like terminal i.e. Quasi Identifiers (QID) of moving data are linked to external information to re-identify individual existence, thus the attacker can be able to track and trace the anonymous moving objects back into individuals. This paper rendered a survey on recent trends and a new strategy for securing moving data objects.
 

Figures at a glance

Figure 1
Figure 1

References

















































BIOGRAPHY
P.Andrew J.Aneesh and R.Santhya are currently pursuing their B.Tech. degree in Information Technology at KalaignarKarunanidhi Institute of Technology, Coimbatore, Tamil Nadu, India. Their areas of research interests include Network Security, Cloud Computing and Database Security.
Prof.S.Balamurugan obtained his B.Tech degree in Information Technology from P.S.G. College of Technology, Coimbatore, Tamil Nadu, India and M.Tech degree in Information Technology from Anna University, Tamil Nadu, India respectively. He is currently working towards his PhD degree in Information Technology at P.S.G. College of Technology, Tamil Nadu, India. At present he holds to his credit 50 papers International Journals and IEEE/ Elsevier International Conferences. He is currently working as Assistant Professor in the Department of Information Technology, Kalaignar Karunanidhi Institute of Technology, Coimbatore, Tamil Nadu, India affiliated to Anna University TamilNadu, India. He is State Rank holder in schooling. He was University First Rank holder M.Tech. Semester Examinations at Anna University, Tamilnadu, India. He served as a Joint Secretary of IT Association, Department of Information Technology, PSG College of Technology, Coimbatore, Tamilnadu, India. He is the recipient of gold medal and certificate of merit for best journal publication by his host institution consecutively for 3 years. Some of his professional activities include invited Session Chair Person for two Conferences. He has guided 12 B.Tech projects and 2 M.Tech. projects. He has won a best paper award in International Conference. His areas of research interest accumulate in the areas of Data Privacy, Database Security, Object Modeling Techniques, and Cloud Computing. He is a life member of ISTE,CSI. He has authored a chapter in an International Book "Information Processing" published by I.K. International Publishing House Pvt. Ltd, New Delhi, India, 978-81-906942-4-7. He is the author of book titled "Principles of Social Network Data Security", ISBN: 978-3-659-61207-7.
S.Charanyaa obtained her B.Tech degree in Information Technology and her M.Tech degree in Information Technology from Anna University Chennai, Tamil Nadu, India. She was gold medalist in her B.Tech. degree program. She has to her credit 12 publications in various International Journals and Conferences. Some of her outstanding achievements at school level include School First Rank holder in 10th and 12th grade. She was working as Software Engineer at Larsen & Turbo Infotech, Chennai for 3 years where she got promoted as Senior Software Engineer and worked for another 2 years. She worked at different verticals and worked at many places including Denmark, Amsderdam handling versatile clients. She is also the recipient of best team player award for the year 2012 by L&T. Her areas of research interest accumulate in the areas of Database Security, Privacy Preserving Database, Object Modeling Techniques, and Cloud Computing. She is the author of book titled "Principles of Social Network Data Security", ISBN: 978-3-659-61207-7.