Toward
Privacy Preserving and Collusion Resistance in a Location Proof Updating System
ABSTRACT:
Today’s location-sensitive service
relies on user’s mobile device to determine the current location. This allows
malicious users to access a restricted resource or provide bogus alibis by
cheating on their locations. To address this issue, we propose A Privacy-Preserving
Location proof Updating System (APPLAUS) in which co-located Bluetooth enabled
mobile devices mutually generate location proofs and send updates to a location
proof server. Periodically changed pseudonyms are used by the mobile devices to
protect source location privacy from each other, and from the untrusted
location proof server. We also develop user-centric location privacy model in
which individual users evaluate their location privacy levels and decide
whether and when to accept the location proof requests. In order to defend
against colluding attacks, we also present between’s ranking-based and
correlation clustering-based approaches for outlier detection. APPLAUS can be
implemented with existing network infrastructure, and can be easily deployed in
Bluetooth enabled mobile devices with little computation or power cost.
Extensive experimental results show that APPLAUS can effectively provide
location proofs, significantly preserve the source location privacy, and
effectively detect colluding attacks.
EXISTING SYSTEM:
There are many kinds of
location-sensitive applications. One category is location-based access control.
For example, a hospital may allow patient information access only when doctors
or nurses can prove that they are in a particular room of the hospital. Another
class of location-sensitive applications requires users to provide past
location proofs such as auto insurance quote in which auto insurance companies
offer discounts to drivers who can prove that they take safe routes during
their daily commutes, police investigations in which detectives are interested
in finding out if a person was at a murder scene at some time, and location-based
social networking in which a user can ask for a location proof from the service
requester and accepts the request only if the sender is able to present a valid
location proof. The common theme across these location sensitive applications
is that they offer a reward or benefit to users located in a certain
geographical location at a certain time. Thus, users have the incentive to
cheat on their locations.
DISADVANTAGES
OF EXISTING SYSTEM:
·
In the location-sensitive applications
there is a lack of secure mechanism to provide their current or past locations
to applications and services.
·
Although cellular service providers have
tracking services that can help verify the locations of mobile users in real
time, the accuracy is not good enough and the location history cannot be
verified.
PROPOSED SYSTEM:
In this paper, we propose A
Privacy-Preserving Location proof Updating System (APPLAUS), which does not
rely on the wide deployment of network infrastructure or the expensive trusted
computing module. In APPLAUS, Bluetooth enabled mobile devices in range mutually
generate location proofs, which are uploaded to an untrusted location proof
server that can verify the trust level of each location proof. An authorized
verifier can query and retrieve location proofs from the server. Moreover, our
location proof system guarantees user location privacy from every party. More
specifically, we use statistically updated pseudonyms at each mobile device to
protect location privacy from each other, and from the untrusted location proof
server. We develop a user-centric location privacy model in which individual
users evaluate their location privacy levels in real time and decide whether
and when to accept a location proof request. In order to defend against
colluding attacks, we also present between’s ranking-based and correlation
clustering-based approaches for outlier detection.
ADVANTAGES
OF PROPOSED SYSTEM:
APPLAUS can effectively provide location
proofs, significantly preserve the source location privacy, and effectively detect
colluding attacks.
SYSTEM ARCHITECTURE:
SYSTEM PROTOCOL:
ALGORITHMS USED:
Algorithm 1. Location Proof Update Scheduling for
the prover
SYSTEM CONFIGURATION:-
HARDWARE CONFIGURATION:-
ü Processor - Pentium –IV
ü Speed - 1.1
Ghz
ü RAM - 256
MB(min)
ü Hard Disk -
20 GB
ü Key Board -
Standard Windows Keyboard
ü Mouse - Two
or Three Button Mouse
ü Monitor - SVGA
SOFTWARE CONFIGURATION:-
ü Operating System :
Windows XP
ü Programming Language :
JAVA/J2EE.
ü Java Version :
JDK 1.6 & above.
ü Database :
MYSQL
REFERENCE:
Zhichao Zhu, Student Member, IEEE, and
Guohong Cao, Fellow, IEEE “Toward Privacy Preserving and Collusion Resistance
in a Location Proof Updating System”- IEEE
TRANSACTIONS ON MOBILE COMPUTING, VOL. 12, NO. 1, JANUARY 2013.