RobLoP: Towards Robust Privacy Preserving Against Location Dependent Attacks in Continuous LBS Queries - 2018


With the increasing popularity of location-based services (LBS), the way to preserve one's location privacy has become a key issue to be involved. The commonly used approach k-anonymity, originally designed for shielding a user's snapshot location privacy, inherently fails to preserve the user from location-dependent attacks (LDA) that include the utmost movement boundary (MMB) attacks and most arrival boundary (MAB) attacks, when the user continuously requests LBS. This Project presents RobLoP, a sturdy location privacy preserving algorithm against LDA in continuous LBS queries. The key insight of RobLoP is to theoretically derive the constraints of each MMB and MAB during a uniform means. It provides a necessary condition of the pairwise user to be safely cloaked against LDA. On top of that, RobLoP first identifies those candidate users who will be cloaked with the requesting user. RobLoP then searches for a thus-referred to as strict purpose set together with the candidate set and alternative auxiliary points, as a sufficient condition below that RobLoP can finally generate the cloaked region successfully. To the simplest of our information, RobLoP is the first work that can preserve location privacy against LDA totally and closely with a theoretical guarantee. The effectiveness and superiority of RobLoP to state-of-the-art studies are validated via extensive simulations on the important trucks data, the artificial knowledge, further because the measured data collected by ourselves.

Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here

PROJECT TITLE :Robust, Efficient Depth Reconstruction with Hierarchical Confidence-Based Matching - 2017ABSTRACT:In recent years, taking photos and capturing videos with mobile devices became increasingly standard. Emerging applications
This privacy policy has been compiled to better serve those who are concerned with how their 'Personally identifiable information' (PII) is being used online. PII, as used in Indian privacy law and information security, is information
PROJECT TITLE : Security Analysis of Handover Key Management in 4G LTESAE Networks - 2014 ABSTRACT: The goal of 3GPP Long Term Evolution/System Architecture Evolution (LTE/SAE) is to move mobile cellular wireless technology
PROJECT TITLE : R3E Reliable Reactive Routing Enhancement for Wireless Sensor Networks - 2014 ABSTRACT: Providing reliable and efficient communication under fading channels is one of the major technical challenges in wireless
PROJECT TITLE : Hop-by-Hop Message Authenticationand Source Privacy in WirelessSensor Networks - 2014 ABSTRACT: Message authentication is one of the most effective ways to thwart unauthorized and corrupted messages from being

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry