ISSN ONLINE(2320-9801) PRINT (2320-9798)
S.Thirunavukkarasu, Dr.K.P.Kaliyamurthie
|
Related article at Pubmed, Scholar Google |
Visit for more related articles at International Journal of Innovative Research in Computer and Communication Engineering
The pervasive diffusion of mobile communication devices and the technical improvements of location techniques are fostering the development of new applications that use the physical position of users to offer location-based services for business, social, or informational purposes. The concept of location privacy can be defined as the right of individuals to decide how, when, and for which purposes their location information can be released to other parties. The physical location of users is rapidly becoming easily available as a class of personal information that can be processed for providing new online and mobile services, generally called Location-Based Services (LBSs). Customer oriented applications, social networks, and monitoring services can be greatly enriched with data reporting where people are, how they are moving, or whether they are close to specific locations. In such a context, privacy concerns are increasing and call for sophisticated solutions able to guarantee different levels of location privacy to the users. In this project, we address this problem and present a solution based on different obfuscation operators that, when used individually or in combination, protect the privacy of the location information of users.
INTRODUCTION |
||
The physical location of users is rapidly becoming easily available as a class of personal information that can be processed for providing new online and mobile services, generally called Location-Based Services (LBSs). In locationbased services, users with location-aware mobile devices are able to make queries about their surroundings anywhere and at any time. To protect location privacy, one typical approach is to apply different obfuscation operators used individually or in combination, protect the privacy of the location information of users. | ||
II.PROJECT SCOPE |
||
The concept of location privacy can be defined as the right of individuals to decide how, when, and for which purposes their location information can be released to other parties customer oriented applications, social networks, and monitoring services can be greatly enriched with data reporting where people are, how they are moving, or whether they are close to specific locations. In such a context, privacy concerns are increasing and call for sophisticated solutions able to guarantee different levels of location privacy to the users. In this paper, we address this problem and present a solution based on different obfuscation operators | ||
III.OVERALL DESCRIPTION |
||
Product Perspective |
||
In our product, we address this problem and present a solution based on different obfuscation operators to protect the privacy of the location information of users. We also introduce an adversary model and provide an analysis of the proposed obfuscation operators to evaluate their robustness against adversaries aiming to reverse the obfuscation effects to retrieve a location that better approximates the location of the users. 1) we allow the users to express their privacy preferences in a simple and intuitive way and 2) to enforce the privacy preferences through a set of techniques robust against a relevant class of deobfuscation attacks | ||
Product Features |
||
Key aspects of our process, called obfuscation it means its allow users to express their privacy preferences in a simple and intuitive way and also enforce the privacy preferences through a set of techniques robust a against a relevant class of deobfuscation attacks while users have just to select a relevance value, the robustness of the solution is guaranteed by randomly selecting one of the techniques to produce the obfuscated location. We provide security to user information, by applying different obfuscation operators. | ||
User Classes and Characteristics |
||
Client - He is the person, who sends the query to the agent and receives the result | ||
Agent - It acts as middleware, which receives and the send the query to the server, and send the result to the client | ||
LBS - Location based server provides the result by processing the query. | ||
Motivational Example |
||
In order to motivate this project, consider the scenario illustrated in Figure 1.1. | ||
A pedestrian wishes to access information about the address of the closest sushi restaurant, via a remote locationbased service provider. Although there are three nearby restaurants, our hungry pedestrian would like to protect her privacy by providing only an approximate location to the information service provider. For example, the pedestrian can obfuscate her exact location by revealing only that she is in the “City Center Park.” In this case, the service provider should still be able to correctly reply with the address of “Yo! Sushi,” using basic spatial analysis algorithms (i.e., by constructing the Voronoi diagram for the sushi restaurants). | ||
This example makes several simplifying assumptions, including a homogeneous Cartesian space with distance measured according to the Euclidean metric, and that the park does not overlap two proximal polygons. Nevertheless, this simple scenario does provide an intuitive example of a situation where it is possible to receive high-quality information services using low-quality positional information. It is this intuition that motivates this research. | ||
Computer security is a branch of computer technology known as information security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users. The term computer system security means the collective processes and mechanisms by which sensitive and valuable information and services are protected from publication, tampering or collapse by unauthorized activities or untrustworthy individuals and unplanned events respectively. The strategies and methodologies of computer security often differ from most other computer technologies because of its somewhat elusive objective of preventing unwanted computer behavior instead of enabling wanted computer behavior. | ||
IV.PREVIOUS RESEARCH |
||
In the existing system, the privacy of the users, which is already the centre of many concerns for the risks posed by current online services, can be threatened by LBSs. The publicity gained by recent security incidents that have targeted the privacy of users has revealed faulty data management practices and unauthorized trading of personal information (including ID thefts and unauthorized profiling). For instance, legal cases have been reported, where rental companies used the GPS technology to track their cars and charge users for agreement infringements, or where an organization used a location service to track its own employees. In addition, research on privacy issues has gained a relevant boost since providers of online and mobile services have often largely exceeded in collecting personal information in the name of service provision. | ||
Current research on location privacy has mainly focused on supporting anonymity and partial identities. To a certain extent, anonymity and complete knowledge of personal information are the opposite endpoints of all the degrees of personal information knowledge managed by online services, and location information is just one type of personal information that often needs to be bound to a user identity. Anonymity is, however, not viable in the provision of an online service when the identification of users is required. In this case, a solution to protect the privacy of users consists in decreasing the accuracy of location information. | ||
V.RESEARCH METHOD |
||
In our system, we address this problem and present a solution based on different obfuscation operators to protect the privacy of the location information of users. We present a novel solution aimed at preserving the location privacy of the users by perturbing location information measured by sensing technologies. We focus on the development of techniques for protecting a single sample of location information. For the sake of concreteness, we consider locations gathered by means of cellular phones as our reference, even if our solution is not bound to a specific location technique. One important characteristic of cellular phones is their large availability and the possibility to be used as a source of location information both indoor and outdoor (on the contrary, GPS is operating mainly outdoor). | ||
Key aspects of our perturbation process, called obfuscation, are: | ||
To allow users to express their privacy preferences in a simple and intuitive way. | ||
To enforce the privacy preferences through a set of techniques robust against a relevant class of deobfuscation attacks. | ||
To this end, we introduce the concept of relevance as a metric of both location information accuracy and privacy that abstracts from the physical attributes of the sensing technology as well as from the actual technique employed to obfuscate a location. This way, while users have just to select a relevance value, the robustness of the solution is guaranteed by randomly selecting one of the techniques to produce the obfuscated location. | ||
In this module, the client or the user can register with the system in order to use the location based service. The registration process includes filling up necessary details like full name, user name, password, age and email id. Once all the information are filled, the user is said to registered. After registration, the user can login the system with his user –name and password. | ||
Now the user is allowed to use the location based service to see his current source location in Google maps. For this, under Map service, the user enters the address and the latitude – longitude value is fetched from internet. Saving this information, allows the user to view the source location of the user in Google maps. | ||
We can find all the information related to the users, who ever have registered the system in our database. We can update the system, with all the location informations that we will be providing to the user. | ||
The user now can search the required location information by sending a query which contains the details such as keyword, distance and privacy metrics. Keyword is what the user wants to search using the LSB. Distance is the distance range within which the user wants to search. Privacy metrics is nothing but privacy preference, which should be in the range 0 and 1. When the privacy metrics, | ||
tends to 0, when the location measurement is extremely inaccurate; | ||
is equal to 1, when the location measurement has achieved the best accuracy that the location techniques allow; and | ||
is in the range (0,1); otherwise, the higher the value, the higher the accuracy. Obfuscation operators are applied to these values. The operators used here are Enlarge (E), Reduce (R) and Shift (S).These obfuscation operators are applied in the middleware, which convert the original location into a safe region and then it’s sent to the service provided, where the given query is processed to provide information required by the user | ||
The user now can search the required location information by sending a query which contains the details such as keyword, distance and privacy metrics. Keyword is what the user wants to search using the LSB. Distance is the distance range within which the user wants to search. Privacy metrics is nothing but privacy preference, which should be in the range 0 and 1. When the privacy metrics, | ||
tends to 0, when the location measurement is extremely inaccurate; | ||
is equal to 1, when the location measurement has achieved the best accuracy that the location techniques allow; and | ||
is in the range (0,1); otherwise, the higher the value, the higher the accuracy. | ||
Obfuscation operators are applied to these values. The operators used here are Enlarge (E), Reduce (R) and Shift (S).These obfuscation operators are applied in the middleware, which convert the original location into a safe region and then it’s sent to the service provided, where the given query is processed to provide information required by the user | ||
VI. CONCLUSION |
||
We presented different obfuscation operators that protect the location privacy of users by changing their location information. Our proposal takes into consideration both the accuracy of location measurements and the user’s needs of privacy. We also provided an evaluation of the robustness of such operators. The analysis and the experimental results prove that our operators provide better protection than the simple enlargement usually applied by current solutions. Hence, we protect the location information of the user. | ||
VII. FUTURE ENHANCEMENT |
||
As future enhancement, the analysis of our solution assuming Gaussian-like distributions and complex location measurement shapes. | ||
the introduction of map constraints in the computation of obfuscated areas. | ||
the definition of additional techniques for degrading the temporal accuracy of location measurements. | ||
the extension of our solution to protect the path privacy of the users and | ||
the actual integration and extensive test of our solution in a real scenario. | ||
Figures at a glance |
||
|
||