Privacy-Preserving Meeting Location Determination: A Comprehensive Analysis

Categories: Technology

Introduction

Location privacy based services in mobile apps lets customers to achieve a variety of tasks, like coming up with a route from one location to a different or getting data concerning amusement venues within the neighborhood. By getting the situation of their customers, LBS area unit is capable to giving a customized expertise to their users, sadly location speech act endangers the privacy of the user and becomes vulnerable for attacks. These attacks are usually classified into external and internal, like the LBS suppliers themselves.

A good phone application like Uber, connecting passengers with personal drivers, has been the topic of abundant privacy dialogue. Uber and its staff are supposedly concerned in privacy-violating activities from stalking journalists and VIP’s. Given however powerful they are, internal attackers are unit considerably tougher to safeguard against. We tend to categories standard location service apps and study the trade-offs of privacy and practicality with the relevant Privacy-Preserving Location Proximity enhancements.

The original band procedure terminates during a single trip.

Get quality help now
KarrieWrites
KarrieWrites
checked Verified writer

Proficient in: Technology

star star star star 5 (339)

“ KarrieWrites did such a phenomenal job on this assignment! He completed it prior to its deadline and was thorough and informative. ”

avatar avatar avatar
+84 relevant experts are online
Hire writer

A good phones don't communicate in a peer-to-peer method ensuing the implementation uses a bigger protocol. The devices send messages to every other device via push notifications e.g. Base Cloud electronic communication (FCM) and Apple Push Notification Service (APSN) on iOS devices. Further, a number of the messages area unit abundant large to be sent via the FCM service, that controls the size of the messages to four KB. To send bigger messages, a mix of the applying server is needed and therefore we use FCM service , wherever the FCM services won’t to apprise once a message is on the market for on the server.

Get to Know The Price Estimate For Your Paper
Topic
Number of pages
Email Invalid email

By clicking “Check Writers’ Offers”, you agree to our terms of service and privacy policy. We’ll occasionally send you promo and account related email

"You must agree to out terms of services and privacy policy"
Write my paper

You won’t be charged yet!

This ends up in a protocol victimization seven messages instead of two as destined by the initial proposal. This message overhead is far beyond the initial example executed by anonymous authors. The ensuing application therefore involves communication between 2 shoppers and 2 servers. The shoppers area unit herein known as X and Y as within the original protocol, and the 2 servers are applying Server and FCM.

Literature Survey

Matt Duckham et al [1] has proposed the paper, “Efficient Decentralized Computation of the Topology of Spatial Regions” in 2011 and talked about the ability to inquire the topology of spatial districts in basic to the present spatial processing frameworks, as spatial databases and GIS. By difference, this paper looks up at the decentralized calculations for figuring the topology of spatial areas in remote sensor systems. The methodology creates worldwide topological data about districts, employing just the nearby learning of hubs and their quick system neighbors totaled up through spatial limit structures. Utilizing three fundamental limit structures (limit hubs, limit cycles, and limit introduction), a group of decentralized calculations is characterized that can react effectively to preview inquiries about the topology of spatial locales, including regulation and nearness questions. The correspondence many-sided quality of the calculation is Oðnþ for reasonable data sources. Experimental examination of the methodology, utilizing reenactment, likewise affirms the proficiency, adaptability, and vigor of this approach.

E.Valavanis et al [2] has projected his work “Mobishare: Sharing context-dependent data and services from mobile sources,” in 2003. This snappy moves forward in isolated correspondences development and flexible enrolling have engaged individual mobiles that we use in general day-by-day activity to wind up information and authority associations via enhancing or displace settled territory that has related with the wire line organized. Such compacted assets is significantly basic for other touching customers, making gigantic open entryways for some charming and novel apps. The MobiShare configuration provides the establishment to inescapable flexible access and segments for appropriating, finding and getting to heterogeneous compact resources in a tremendous domain, thinking about the setting of the two resources and requestors. Any distant correspondence development could be used between the contraption and system.

Pon et al [3] has anticipated about “Security of Generalized Signature Scheme based on Discrete Logarithms and Factorization” in the year 2005.This is a summed up mark plot in view of the immovability of understanding two surely understood cryptographic suppositions, the factorization and the discrete logarithm issue. These guarantee that their plan is as yet protected, says that one of these two suspicions is settled. This document in any case, will demonstrates that Pon et al's plot is unreliable against the widespread fabrication assault since the enemy can elucidate the Discrete Logarithms and Factorization.

C.A. Ardagna [4] has estimated about “An obfuscation-based approach for protecting location privacy,” in 2011.The inescapable dissemination of multipurpose dedicated widgets and the focused upgrades of the systems are enlightening the improvement of new functions that utilization the bodily position of users to offer area based management for business, social or enlightening principles. In such unique situations, safety concerns are growing and call for advanced preparations ready to ensure diverse levels of area fortification to the users. In this paper, we tackle this issue and present an answer in view of various jumbling administrators that, when utilized separately or in mix and sheltered the protection of the area data of users. We additionally present an enemy display and give an assessment of the proposed confusion administrators to assess their strength against foes meaning to turn around the jumbling impacts to recover the vicinity that better approximates the area of the clients. At long last, we present some exploratory outcomes that approve our answer.

Mobile users represent them in all the most important areas of growth within the on-line market, therefore it's no surprise that mobile social networks have begun turning into additional and extra well-liked. Mobile social networks have conjointly become quite as refined as non-mobile powerhouses like facebook. Positioning technologies like Wireless localization techniques, and world positioning system offers rise to location-aware social networks. It permits mobile users to attach and converse with one another at intervals a neighborhood physical proximity, supported some criteria like similar interests and hobbies. However the situation knowledge denote to social networks are revealing sources too. Thus friend matching has become the sensitive a part of mobile social networks. It’s very a challenge for developers to preserve the privacy of user’s non-public data.

System Requirements

Hardware Requirements:

  • System : Pentium IV 2.4 GHz
  • RAM : 4 GB
  • Hard Disk : 500 GB

Software Requirements:

  • Operating system : Windows XP Professional/Windows7
  • Language Used : Java (Jdk 1.7)
  • Database : My-SQL 5.0
  • Web Server : TomCAT 7.0
  • Database GUI : SQLYog
  • IDE : Eclipse Galileo
  • JDBC Connection : Type 4- Native Drive

System Design

Methodology:

  • Optimal Meeting Location Calculation
  • Centroid Calculation
  • Euclidean Distance Calculation
  • Encryption & Decryption Process
  • MVC Architecture

The methodology encompasses the calculation of the optimal meeting location through centroid and Euclidean distance calculations, encryption & decryption processes, and MVC architecture, aimed at determining a common meeting point that minimizes time and workload for users.

  • Optimal Meeting Location Calculation: Utilizes the geometric center and Euclidean distances between points to find a central meeting location.
  • Encryption & Decryption Process: Employs the AES Algorithm to protect data privacy during transmission.
  • MVC Architecture: Adopts a Model-View-Controller approach to separate the application logic, user interface, and input control, enhancing system modularity and scalability.

Project Design

The project design includes a system architecture that integrates client systems, servers, and a gateway to facilitate the secure and efficient determination of an optimal meeting location. The design also incorporates use case and sequence diagrams to illustrate the system's functionality and database diagrams to detail the data structure.

Conclusion

We have connected the popular location based social maps and identified scenarios where privacy-preserving location proximity is desired. We conclude that the protocol can be fruitfully applied to a number of popular applications, in particular for the ones that facilitate meetings in real life between strangers, such as meet-up and dating apps which shows that the protocol is efficient enough for implementation in real applications. In order to review the performance of our algorithms in an exceedingly real deployment, we have tendency to implement and check their execution potency on mobile phones.

References

  1. AngelList, “Location based services startups,” Sep. 2014, https://angel.co/location-based-services.
  2. A. Lella, “Number of Mobile-Only Internet Users Now Exceeds Desktop-Only in the U.S.” https:// www.comscore.com/Insights/Blog/Number-of-MobileOnly-Internet-Users-Now-Exceeds-Desktop-Only-in-theU.S, Apr. 2015
  3. L. Siksnys, J. R. Thomsen, S. Saltenis, M. L. Yiu, and O. Andersen, “A location privacy aware friend locator,” in Advances in Spatial and Temporal Databases, 11thInternational Symposium, SSTD 2009. [Online].
  4. P. Paillier, “Public-key cryptosystems based on composite degree residuosity classes,” in Advances in Cryptology -EUROCRYPT 1999
  5. M. Terrovitis, “Privacy preservation in the dissemination of location data,” SIGKDD Explorations, vol. 13, no. 1, 2011
  6. P. A. Hallgren, M. Ochoa, and A. Sabelfeld, “Innercircle: A parallelizable decentralized privacy-preserving location prox-imity protocol,” in PST. IEEE, 2015, pp. 1–6.
  7. S. Mascetti, D. Freni, C. Bettini, X. S. Wang, and Jajodia, “Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies,” VLDB J., vol. 20, no. 4, 2011
  8. C. Gentry, “Fully homomorphic encryption using ideal lat-tices,” in STOC, 2009, pp. 169–178.
Updated: Feb 18, 2024
Cite this page

Privacy-Preserving Meeting Location Determination: A Comprehensive Analysis. (2024, Feb 18). Retrieved from https://studymoose.com/document/privacy-preserving-meeting-location-determination-a-comprehensive-analysis

Live chat  with support 24/7

👋 Hi! I’m your smart assistant Amy!

Don’t know where to start? Type your requirements and I’ll connect you to an academic expert within 3 minutes.

get help with your assignment