Cache Management Techniques for Privacy Preserving Location-based Services
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
project topics
Active In SP

Posts: 2,492
Joined: Mar 2010
01-04-2010, 09:07 PM

In order to access location-based services, mobile users have to disclose their exact locations to service providers. However, adversaries could collect the location information for purposes against mobile usersâ„¢ privacy. There are existing solutions for privacy protection by utilizing the K-anonymity model. However, the computational and communication costs are high. This research proposes cache management techniques for further improving user privacy protection, saving computational power, and decreasing communication costs.
Presented By:
Yu Chen
Jie Bao
Wei-Shinn Ku
Jiun-Long Huang

As a result of recent advances in wireless technologies, more and more personal mobile devices (e.g., cell phones, PDAs, etc.) possess the ability to access the Internet ubiquitously. In addition, Global Positioning System (GPS) receiver modules gradually become a standard component in new generation handheld devices. Consequently, novel location based services (LBS) allow users to launch location-dependent queries ubiquitously. Sample queries of such location based services include find me the nearest ATM and show me the gas station with the lowest price within one mile. In order to fulfill these queries, mobile users have to reveal their current locations to service providers. However, service providers may disclose the trajectory of a certain user to attackers which decreases the dependability of LBS. For protecting mobile userâ„¢s privacy, recent research in [12] proposed a framework for location based services without compromising location privacy by leveraging the K-anonymity concept [15]. In order to implement the K-anonymity mechanism, the framework contains a trusted server to collect user location information and perform cloaking procedures. Then, the trusted server will send the location- dependent query along with the cloaked spatial area to service providers to retrieve query results. The returned query solutions will be sent back to individual users by the trusted server as well. Since the trusted server has the knowledge of all query results, we propose to store them in memory and use the cached data to answer future queries. Our solution has two main advantages. First, user privacy protection can be further improved, because the trusted server does not have to forward every query to service providers and it is much more difficult for adversaries to launch correlation attacks [3]. Second, with our cache management techniques, fewer queries have to be answered by service providers. Consequently, computational resources and communication costs can be effectively saved. The rest of the paper is organized as follows: Section 2 surveys the related work of privacy protected query processing. Our own system design is detailed in Section 3. The experimental results are presented in Section 4. We conclude this paper in section 5, and we also raise some open issues for future research.

read full report

Attached Files
.ppt   Cache Management Techniques for Privacy Preserving Location-based Services.ppt (Size: 541.5 KB / Downloads: 103)
Use Search at wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Database management concepts seminar tips 9 3,819 23-07-2016, 02:17 PM
Last Post: Dhanabhagya
  crime file management system er diagram jaseelati 0 441 17-01-2015, 04:35 PM
Last Post: jaseelati
  cyber cafe management system ppt jaseelati 0 296 07-01-2015, 01:31 PM
Last Post: jaseelati
  online crime management system jaseelati 0 263 30-12-2014, 01:46 PM
Last Post: jaseelati
  crime file management system ppt jaseelati 0 229 27-12-2014, 01:17 PM
Last Post: jaseelati
  eye movement based human computer interaction techniques ppt jaseelati 0 402 23-12-2014, 03:56 PM
Last Post: jaseelati
  Privacy-Preserving Public Auditing for Secure Cloud Storage seminar ideas 4 1,327 13-09-2014, 02:35 PM
Last Post: Radhika.m
  Towards Secure and Dependable Storage Services in Cloud Computing FULL REPORT seminar ideas 5 4,152 24-03-2014, 02:51 PM
Last Post: seminar project topic
  Content Management System (CMS) seminar ideas 10 6,302 20-03-2014, 04:30 PM
Last Post: navasfiroz
  Test case Reduction-An Experimental Analysis through Coverage Techniques seminar addict 1 705 18-03-2014, 02:37 PM
Last Post: Guest