1 / 4

Secure and Privacy Preserving Summaries for Location Based Activity

Activity tracking applications, where individuals record and transfer data about their location based exercises e.g., the courses of their exercises, are progressively well known. Such applications empower clients to impart data and contend to their companions on activity based social networks yet in addition, now and again, to get rebates on their medical coverage premiums by demonstrating they direct standard wellness exercises. Be that as it may, they raise protection and security issues the specialist co ops know the correct locations of their clients the clients can report counterfeit location data, for instance, to unduly boast about their execution. In this paper, we introduce Secure Run, a safe protection safeguarding framework for announcing location based action outlines e.g., the aggregate separation secured and the rise pick up clients to monitor their execution while running, climbing or cycling. This data is gathered utilizing location based services LBSs and implanted sensors in cell phones and wearable gadgets. Because of the prevalence of these applications, top portable working frameworks now incorporate APIs that encourage the social affair and sharing of wellness and wellbeing information over various applications and gadgets .A key component of these applications is to empower clients to get to outlines of their exercises and execution measurements and to impart this data to different clients .They can share the aggregate separation secured, the combined height pick up and the way taken amid their exercises. For this reason, activity tracking applications gather and send clients location and wellness information, potentially while they seek after their exercises, to services providers. P. Purnamani Sai | Mr. K. Phaneendra "Secure and Privacy-Preserving Summaries for Location-Based Activity" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-4 , June 2018, URL: https://www.ijtsrd.com/papers/ijtsrd12971.pdf Paper URL: http://www.ijtsrd.com/computer-science/other/12971/secure-and-privacy-preserving-summaries-for-location-based-activity/p-purnamani-sai<br>

ijtsrd
Download Presentation

Secure and Privacy Preserving Summaries for Location Based Activity

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. International Research Research and Development (IJTSRD) International Open Access Journal Secure and Privacy-Preserving Summaries for Location-Based Activity International Journal of Trend in Scientific Scientific (IJTSRD) International Open Access Journal ISSN No: 2456 ISSN No: 2456 - 6470 | www.ijtsrd.com | Volume www.ijtsrd.com | Volume - 2 | Issue – 4 Secure and Privacy for Location Preserving Summaries P. Purnamani Sai MCA Final Year, Lakireddy Balireddy College of Engineering, Mylavaram, Andra Pradesh, India Mr. K. Phaneendra Associate Professor, Dept. of MCA, Lakireddy Balireddy College of Engineering, Mylavaram, Andra Pradesh, India Mylavaram, Andra Pradesh, India Phaneendra MCA Final Year, Lakireddy Balireddy College of Engineering, Mylavaram, Associate Professor, Dept. of MCA, Lakireddy Balireddy College of Engineering, ABSTRACT Activity tracking applications, where individuals record and transfer data about their location based exercises e.g., the courses of their exercises, are progressively well known. empower clients to impart data and contend to their companions on activity based social networks yet in addition, now and again, to get rebates on their medical coverage premiums by demonstrating they direct standard wellness exercises. Be that as it may, they raise protection and security issues: the specialist co-ops know the correct locations of their client clients can report counterfeit location data, for instance, to unduly boast about their execution. In this paper, we introduce Secure Run, a safe protection safeguarding framework for announcing location based action outlines e.g., the aggregate sep secured and the rise pick up clients to monitor their execution while running, climbing or cycling. This data is gathered utilizing location based services (LBSs) and implanted sensors in cell phones and wearable gadgets. Because of the prevalence applications, top portable working frameworks now incorporate APIs that encourage the social affair and sharing of wellness and wellbeing information over various applications and gadgets .A key component of these applications is to empower client outlines of their exercises measurements and to impart this data to different clients .They can share the aggregate separation secured, the combined height pick up and the way taken amid their exercises. For this reason, activity tracking applications gather and send clients' location tracking applications gather and send clients' location and wellness information, potentially while they seek after their exercises, to services providers. after their exercises, to services providers. and wellness information, potentially while they seek Activity tracking applications, where individuals record and transfer data about their location based exercises e.g., the courses of their exercises, are progressively well known. empower clients to impart data and contend to their Keywords: Location based service, Security, Social networks, Activity Tracking Location based service, Security, Social Such Such applications applications networks yet in 1.INTRODUCTION ition, now and again, to get rebates on their medical coverage premiums by demonstrating they direct standard wellness exercises. Be that as it may, they raise protection and security issues: the specialist ops know the correct locations of their clients; the clients can report counterfeit location data, for instance, to unduly boast about their execution. In this paper, we introduce Secure Run, a safe protection safeguarding framework for announcing location based action outlines e.g., the aggregate separation secured and the rise pick up clients to monitor their execution while running, climbing or cycling. This data is gathered utilizing location based services (LBSs) and implanted sensors in cell phones and wearable gadgets. Because of the prevalence of these applications, top portable working frameworks now incorporate APIs that encourage the social affair and sharing of wellness and wellbeing information over various applications and gadgets .A key component of these applications is to empower clients to get to outlines of their exercises measurements and to impart this data to different clients .They can share the aggregate separation secured, the combined height pick up and the way taken amid their exercises. For this reason, activity Individuals depend on activity following applications to screen, oversee and to urge them to do physical exercises. Portable applications, Endomondo, Garmin Connect, RunKeeper, Runtastic and Strava, and wearable gadgets, for example, Fitbit, ike+ Fuelband and Jawbone UP, empower clients to monitor their execution while running, climbing or cycling. This data is gathered utilizing location based services (LBSs) and installed sensors in cell phones and wearable gadgets. Because of the ubiquity of these applications, top versatile working frameworks now incorporate APIs that encourage the social occasion and sharing of wellness and wellbeing information over various applications and gadgets (e.g., HealthKit for iOS and Google Fit for Android). ey element of these applications is to empower clients to get to rundowns of their exercises and execution measurements and to impart this data to different clients and specialist co-ops on online socialnetworks. For example, clients can share the e separation secured, the combined rise pick up and the way taken amid their exercises. For this reason, activity following applications gather and send clients' location and wellness information, perhaps while they seek after their exercises, to Individuals depend on activity following applications to screen, oversee and to urge them to do physical exercises. Portable applications, Endomondo, Garmin Connect, RunKeeper, Runtastic and Strava, and wearable gadgets, for example, Fitbit, Nike+ Fuelband and Jawbone UP, empower clients to monitor their execution while running, climbing or cycling. This data is gathered utilizing location based services (LBSs) and installed sensors in cell phones and wearable gadgets. Because of the ubiquity o these applications, top versatile working frameworks now incorporate APIs that encourage the social occasion and sharing of wellness and wellbeing information over various applications and gadgets (e.g., HealthKit for iOS and Google Fit for Android). A key element of these applications is to empower clients to get to rundowns of their exercises and execution measurements and to impart this data to different clients and specialist co socialnetworks. For example, clients can share the aggregate separation secured, the combined rise pick up and the way taken amid their exercises. For this reason, activity following applications gather and send clients' location and wellness information, perhaps while they seek after their exercises, to services providers. In return for their information, providers. In return for their information, for for example, example, and and execution execution @ IJTSRD | Available Online @ www.ijtsrd.com @ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 4 | May-Jun Jun 2018 Page: 175

  2. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 clients are offered different motivating forces. For instance, clients can get rebates, coupons or even money [4], [5], [6], grants at rivalries [8] or just indicates enhance their social notoriety. What's more, numerous networks, including enormous names, for example, British Petroleum (BP), Bank of America and Autodesk, are giving activity GPS beacons to their workers to energize more beneficial ways of life and, accordingly, enhance efficiency and lower corporate protection costs [9]. Correspondingly, medical coverage networks, for example, United Health, Kaiser Foundation Group, Humana Group and Aetna have made projects to incorporate activity GPS beacons into their arrangements, i.e., buyers are remunerated by the safety net providers with bring down rates in view of their action outlines [6]. framework free approach, a client acquires location confirm from her neighbors by utilizing short-extend correspondence advancements, Bluetooth [5]. In particular, Talasila et al. [7] propose anlocation verification arrangement of clients help check every others' location claims. The convention works by keeping a brought together expert that, in light of clients spatiotemporal connection, chooses whether such claims are bona fide or not. Also, Zhu and Cao [6] propose a framework where commonly co-found clients depend on Bluetooth interchanges to create their location asserts that are then sent to an incorporated location verifier. Notwithstanding the security and protection ensures displayed in [8], Zhu and Cao [9] empower singular clients to assess their own location protection and choose whether to acknowledge location evidence asks for by different clients. Jadliwala et al. [13] give a formal examination of the conditions required in a specially appointed system to empower any separation based restriction conventions in remote methodologies for example, convention where an 2.RELATED WORK Cheating on activity based socialnetworks is turning into a significant issue. For instance, He et al. [3] demonstrate that clients can without much of a stretch abrogate four square’s GPS check instruments by altering the qualities returned by the calls to the geo- location API of cell phones. So also, Polakis et al. [4] utilize a discovery way to deal with reveal the systems utilized by Foursquare and Facebook Places to identify location assaults and propose a few approaches to go around them. Additionally, work from Carbunar and Potharaju [2] break down information from Foursquare and Gowalla and find that motivators to cheat exist since individuals effectively registration and gather rewards. In this manner, it is important to painstakingly adjust impetuses with a more powerful confirmation of clients' location claims. In such manner, Zhang et al. [4] demonstrate that phony registration lead not exclusively to money related misfortunes for the scenes offering exceptional arrangements on location based registration yet in addition to the debasement of the nature of service gave by suggestion frameworks that depend on clients' location data. Carbunar et al. [11] additionally demonstrate that there is strain amongst protection and rightness in location based applications, where clients can't demonstrate that they have fulfilled identification conditions without uncovering the time and location of their registration. In the interim, to protect against swindling, analysts have additionally proposed a few instruments that offer secure check of location data. From a wide point of view, such systems can be gathered in three classifications: foundation autonomous, framework needy and half and half components. In the systems. Comparative 3.PROPOSED SYSTEM Our abnormal state outline objective is to assemble an activity tracking framework that ensures the genuineness of the client's activity information as for swindling clients who attempt to unduly build their execution and secures the clients' location protection concerning inquisitive system administrators and specialist networks that endeavor to track them. In this segment, we exhibit SecureRun, our answer for secure and protection safeguarding activity rundowns. To start with, we give an abnormal state diagram of SecureRun and characterize the fundamental tasks it includes. At that point, we give an itemized depiction of each of the previously mentioned activities. @ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 4 | May-Jun 2018 Page: 176

  3. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 ARCHITECTURE DIAGRAM: Admin Side Modules: Provide Activity upload Permission: User ask for activity refreshing. Administrator sees the demand and gives authorization when just the client is substantial. Administrator gives a client name and secret word. Utilizing this username and watchword client can transfer the action. Send Email: The Admin gave client name and secret word is send to the client by means of email. So this is the more secure method for exchange. View User Activity: The client transferred action can be seen from the administrator side. This module can be utilized to screen all the client activities in the framework. 4.ANDROID MODULES Compute Total Distance: Admin can likewise figure the separation keep running by specific individual. This module will be utilized to check the client activity's in date insightful. Action updates: Activity Updates is one of the primary modules from the client side. On the off chance that any activity directed in any region the subtle elements of the action will be refreshed here. Each client cannot have the consent for activity refreshes .for action refreshes first client need to demand to the Admin. He have specialist to offer authorization to the client. Administrator gives a client name and secret word to the client by means of email. Client can just updates the action by utilizing this username and secret key. This is for anticipating counterfeit updates. 5.Algorithm Techniques Action View: In this module is for customary clients. The clients can see all the Activity's in the present day. This current activity's are transferred the enrolled clients so these can be believed actions. In this module client can check the root from the Activity territory to client current zone. Current region location can be taken utilizing GPS. Client Activity: After survey the activity's client begins their activities. On the off chance that a client beginning an action, its present location will be taken and the stop watch will be begins. The stop watch will be keep running until the point when the client stops the action. Utilizing the beginning and completion location the separation will be computed in the guide. We now portray SecureRun's examining algorithm. The examining algorithm decides the inspecting times/positions at which the client demands location proofs from the entrance correspondence go. focuses in her 6.CONCLUSION View User Activity: In this module give a record to all activity that client done, this module give two sort of record. Initial one will give all the action that the client take part and the following activity give to figure the aggregate no of separation canvassed by the client in a specific date. In this paper, we have proposed Secure Run, a framework for giving confirmations of location based exercises. SecureRun depends on the current remote access point systems sent in urban regions at the cost of just a product overhaul, subsequently mitigating the requirement for secure and private @ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 4 | May-Jun 2018 Page: 177

  4. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 6)T. Kohno, A. Broido, K. C. Claffy, “Remote physical device fingerprinting,” in Proc. IEEE Symp. Security Privacy, 2005, 211–225. sending specially appointed frameworks, and it gives insurance to the two clients and specialist co-ops. Our exploratory assessment, directed utilizing genuine informational collections of sent remote access- focuses and real clients' open air activities,shows that SecureRun accomplishes a decent precision while evaluating a lower-bound of the separation that clients cover amid their exercises, and it gives protection and security properties. From a down to earth viewpoint, we imagine our plan to be of enthusiasm for key associations between socialnetworkproviders and access point arranges administrators. We have centered our portrayal and assessment of SecureRun on remove rundowns and have outlined an answer for height pick up synopses too. Moreover, our verification of-idea usage of Secure Run on an external has demonstrated that it can be sent practically speaking. In that capacity, this work constitutes an initial move towards the plan of secure and private action based socialnetworks. 7)D. B. Faria, D. R. Cheriton, “Detecting identity- based attacks in wireless networks using signalprints,” in Proc. ACM Workshop Wireless Security, 2006, 43–52. 8)L. C. C. Desmond, C. C. Yuan, T. C. Pheng, R. S. Lee, “Identifying unique devices through wireless fingerprinting,” in Proc. 1st ACM Conf. Wireless Netw. Security, 2008, 46–55. 9)Interior Point OPTimizer [Online]. Available: https://projects. coin.org/Ipopt, Aug. 2015. 10)A. Boldyreva, N. Chenette, Y. Lee, A. O’Neill, “Order-preserving symmetric encryption,” in Proc. 28th Annu. Int. Conf. Adv. Cryptol.: Theory Appl. Cryptographic Techn., 2009, 224–241. 11)A. Boldyreva, N. Chenette, and A. O’Neill, “Order-preserving encryption revisited: Improved security analysis and alternative solutions,” Proc. 31st Annu. Conf. Adv. Cryptol., 2011, pp. 578– 595 REFERENCE: 1)R. Popa, F. Li, N. Zeldovich, “An ideal-security protocol for order-preserving encoding,” in Proc. IEEE Symp. Security Privacy, 2013, 463–477. 12)L. Hu, D. Evans, “Localization for mobile sensor networks,” in Proc. ACM 10th Annu.Int. Conf. Mobile Comput.Netw., 2004, pp. 45–57. 2)A. R. Beresford and F. Stajano, “User privacy in location-aware services,” in Proc. IEEE 2nd Annu. Conf. Pervasive Comput. Commun. Workshops, 2004, pp. 127–131. 13)J.-P. Sheu, W.-K.Hu, and J.-C. Lin, “Distributed localization scheme for mobile sensor networks,” IEEE Trans. Mobile Comput., vol. 9, pp. 516–526, Apr. 2010. 3)L. Buttyan, T. Holczer, I. Vajda, “On the effectiveness of changing pseudonyms to provide location privacy in VANETs,” in Proc. Workshop Security Privacy Ad-Hoc Sens. Netw., 2007, pp. 129–141. 14)S. Saroiu, A. Wolman, “Enabling new mobile applications with location proofs,” Proc. 10th Workshop Mobile Comput. Syst. Appl., 2009, p. 3. 4)C. Diaz, S. Seys, J. Claessens, B. Preneel, “Towards measuring anonymity,” Proc. 2nd Int. Conf. Privacy Enhancing Technol., 2003, pp. 54– 68. 15)D. Singelee, B. Preneel, “Location verification using secure distance bounding protocols,” in Proc. IEEE Int. Conf. Mobile Ad-Hoc Sensor Syst., 2005, pp. 1–7. 5)L. Bindschaedler, M. Jadliwala, I. Bilogrevic, P. Ginzboorg, V. Niemi, J.-P.Hubaux, “Track me if you can: On the effectiveness of context-based identifier changes in deployed mobile networks,” in Proc. NDSS, 2012, pp. 1–17. 16)J. T. Chiang, J. J. Haas, Y.-C. Hu, “Secure and precise location verification using distance bounding and simultaneous multilateration,” in Proc. 2nd Conf. Wireless Netw. Security, 2009, pp. 181–192. @ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 4 | May-Jun 2018 Page: 178

More Related