06-04-2011, 09:55 AM
Submitted by:
Azra khanum,
seminar on applause.doc (Size: 18.5 KB / Downloads: 58)
APPLAUS
Introduction
Privacy-Preserving Location proof Updating System (APPLAUS)is a system in which co-located Bluetooth enabled mobile devices mutually generate location proofs, and update to a location proof server. Periodically changed pseudonyms are used by the mobile devices to protect source location privacy from each other, and from the untrusted location proof server. We also develop user-centric location privacy model in which individual users evaluate their location privacy levels in real-time and decide whether and when to accept a location proof exchange request based on their location privacy levels. APPLAUS can be implemented with the existing network infrastructure and the current mobile devices, and can be easily deployed in Bluetooth enabled mobile devices with little computation or power cost. Extensive experimental results show that our scheme, besides providing location proofs effectively, can significantly preserve the source location privacy. Today’s location-sensitive service relies on user’s mobile device to determine its location and send the location to the application. This approach allows the user to cheat by having his device transmit a fake location, which might enable the user to access a restricted resource erroneously or provide bogus alibis.
Overview
Today’s location-sensitive service relies on user’s mobile device to determine its location and send the location to the application. This approach allows the user to cheat by having his device transmit a fake location, which might enable the user to access a restricted resource erroneously or provide bogus alibis.
Description:
A Privacy-Preserving Location proof Updating System (APPLAUS), which does not rely on the wide deployment of network infrastructure or the expensive trusted computing module. In APPLAUS, Bluetooth enabled mobile devices in range mutually generate location proofs, which are uploaded to a untrusted location proof server that can verify the trustworthy level of each location proof. Authorized verifier can query and retrieve hospitals,auto insurance quote,fraud detection on ebay,police investigations,,location based social metalworking location proofs the server. Moreover, our location proof system guarantees user location privacy from every party. More specifically, we use statistically changed pseudonyms at each mobile device to protect location privacy from each other, and from the
untrusted location proof server. We use user-centric location privacy model in which individual users evaluate their privacy levels in real-time and decide whether and when to accept a location proof request based on their location levels. Extensive experimental and simulation results show our scheme, besides providing location proofs effectively, significantly preserve the source location privacy.
Applications:
Hospitals,auto insurance quote,fraud detection on ebay,police investigations,,location based social networking.
Comparison
Today’s location-sensitive service relies on user’s mobile device to determine its location and send the location to the application. This approach allows the user to cheat by having his device transmit a fake location, which might enable the user to access a restricted resource erroneously or provide bogus alibis.
Advantages
APPLAUS can be implemented with the existing network infrastructure and the current mobile devices, and can be easily deployed in Bluetooth enabled mobile devices with little computation or power cost.
Devices used:
In APPLAUS, mobile nodes communicate with neighboring nodes through Bluetooth interface, and communicate with the untrusted server through cellular interface tooth enabled mobile devices mutually generate location proofs, and upload to the location proof server.
Summary:
APPLAUS,in which co-located bluetooth enabled mobile devices mutually generate location proofs and upload to the location proof server. We use statistically changed pseudonyms for each device to protect source location privacy from each other, and from the untrusted location proof server. We also develop user-centric location privacy levels in real-time and decide whether and when to accept a location proof exchange request based on their location privacy levels. It works to address the joint problem of location proof and location privacy. show that our scheme can provide location proofs effectively while preserving the source location privacy at the same time.