4
@ IJTSRD | Available Online @ www ISSN No: 245 Inte R Secure and for L P. Purnamani Sai MCA Final Year, Lakireddy Bal College of Engineering, Mylava Andra Pradesh, India ABSTRACT Activity tracking applications, wher record and transfer data about their l exercises e.g., the courses of their progressively well known. Such empower clients to impart data and co companions on activity based social ne addition, now and again, to get reb medical coverage premiums by demo direct standard wellness exercises. Be t they raise protection and security issues co-ops know the correct locations of th clients can report counterfeit locati instance, to unduly boast about their exe paper, we introduce Secure Run, a s safeguarding framework for announ based action outlines e.g., the aggreg secured and the rise pick up clients to execution while running, climbing or data is gathered utilizing location b (LBSs) and implanted sensors in cel wearable gadgets. Because of the preva applications, top portable working fram incorporate APIs that encourage the so sharing of wellness and wellbeing info various applications and gadgets .A key these applications is to empower clie outlines of their exercises an measurements and to impart this dat clients .They can share the aggrega secured, the combined height pick up taken amid their exercises. For this re tracking applications gather and send cli w.ijtsrd.com | Volume – 2 | Issue – 4 | May-Jun 56 - 6470 | www.ijtsrd.com | Volum ernational Journal of Trend in Sc Research and Development (IJT International Open Access Journ Privacy-Preserving Summarie Location-Based Activity lireddy varam, Mr. K. Phan Associate Professor, Lakireddy Balireddy Coll Mylavaram, Andra P re individuals location based exercises, are applications ontend to their etworks yet in bates on their onstrating they that as it may, s: the specialist heir client s; the ion data, for ecution. In this safe protection ncing location gate separation o monitor their cycling. This based services ll phones and alence of these meworks now ocial affair and formation over y component of ent s to get to nd execution ta to different ate separation p and the way eason, activity ients' location and wellness information, pot after their exercises, to service Keywords: Location based s networks, Activity Tracking 1. INTRODUCTION Individuals depend on activity to screen, oversee and to urg exercises. Portable applic Endomondo, Garmin Connect and Strava, and wearable gadg Nike+ Fuelband and Jawbone monitor their execution whil cycling. This data is gathered services (LBSs) and installed and wearable gadgets. Becau these applications, top versati now incorporate APIs that occasion and sharing of w information over various ap (e.g., HealthKit for iOS and G A key element of these appl clients to get to rundowns execution measurements and different clients and specia socialnetworks. For example aggregate separation secured, up and the way taken amid t reason, activity following a send clients' location and perhaps while they seek af services providers. In return n 2018 Page: 175 me - 2 | Issue 4 cientific TSRD) nal es neendra Dept. of MCA, lege of Engineering, Pradesh, India tentially while they seek es providers. service, Security, Social y following applications ge them to do physical cations, for example, t, RunKeeper, Runtastic gets, for example, Fitbit, UP, empower clients to le running, climbing or utilizing location based d sensors in cell phones use of the ubiquity of ile working frameworks encourage the social wellness and wellbeing pplications and gadgets Google Fit for Android). lications is to empower of their exercises and d to impart this data to alist co-ops on online e, clients can share the the combined rise pick their exercises. For this applications gather and wellness information, fter their exercises, to n for their information,

Secure and Privacy-Preserving Summaries for Location-Based Activity

  • Upload
    ijtsrd

  • View
    4

  • Download
    0

Embed Size (px)

DESCRIPTION

Activity tracking applications, where individuals record and transfer data about their location based exercises e.g., the courses of their exercises, are progressively well known. Such applications empower clients to impart data and contend to their companions on activity based social networks yet in addition, now and again, to get rebates on their medical coverage premiums by demonstrating they direct standard wellness exercises. Be that as it may, they raise protection and security issues the specialist co ops know the correct locations of their clients the clients can report counterfeit location data, for instance, to unduly boast about their execution. In this paper, we introduce Secure Run, a safe protection safeguarding framework for announcing location based action outlines e.g., the aggregate separation secured and the rise pick up clients to monitor their execution while running, climbing or cycling. This data is gathered utilizing location based services LBSs and implanted sensors in cell phones and wearable gadgets. Because of the prevalence of these applications, top portable working frameworks now incorporate APIs that encourage the social affair and sharing of wellness and wellbeing information over various applications and gadgets .A key component of these applications is to empower clients to get to outlines of their exercises and execution measurements and to impart this data to different clients .They can share the aggregate separation secured, the combined height pick up and the way taken amid their exercises. For this reason, activity tracking applications gather and send clients location and wellness information, potentially while they seek after their exercises, to services providers. P. Purnamani Sai | Mr. K. Phaneendra "Secure and Privacy-Preserving Summaries for Location-Based Activity" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-4 , June 2018, URL: https://www.ijtsrd.com/papers/ijtsrd12971.pdf Paper URL: http://www.ijtsrd.com/computer-science/other/12971/secure-and-privacy-preserving-summaries-for-location-based-activity/p-purnamani-sai

Citation preview

Page 1: Secure and Privacy-Preserving Summaries for Location-Based Activity

@ IJTSRD | Available Online @ www.ijtsrd.com

ISSN No: 2456

InternationalResearch

Secure and Privacyfor Location

P. Purnamani Sai MCA Final Year, Lakireddy BalireddyCollege of Engineering, Mylavaram,

Andra Pradesh, India

ABSTRACT Activity tracking applications, where individualsrecord and transfer data about their location based exercises e.g., the courses of their exercises, are progressively well known. Such applications empower clients to impart data and contend to their companions on activity based social networks yet in addition, now and again, to get rebates on their medical coverage premiums by demonstrating they direct standard wellness exercises. Be that as it may, they raise protection and security issues: the specialist co-ops know the correct locations of their clientclients can report counterfeit location data, for instance, to unduly boast about their execution. In this paper, we introduce Secure Run, a safe protection safeguarding framework for announcing location based action outlines e.g., the aggregate sepsecured and the rise pick up clients to monitor their execution while running, climbing or cycling. This data is gathered utilizing location based services (LBSs) and implanted sensors in cell phones and wearable gadgets. Because of the prevalence applications, top portable working frameworks now incorporate APIs that encourage the social affair and sharing of wellness and wellbeing information over various applications and gadgets .A key component of these applications is to empower clientoutlines of their exercises and execution measurements and to impart this data to different clients .They can share the aggregate separation secured, the combined height pick up and the way taken amid their exercises. For this reason, activity tracking applications gather and send clients' location

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 4 | May-Jun

ISSN No: 2456 - 6470 | www.ijtsrd.com | Volume

International Journal of Trend in Scientific Research and Development (IJTSRD)

International Open Access Journal

Secure and Privacy-Preserving Summariesfor Location-Based Activity

MCA Final Year, Lakireddy Balireddy College of Engineering, Mylavaram,

Mr. K. PhaneendraAssociate Professor, Dept. of MCA,

Lakireddy Balireddy College of Engineering, Mylavaram, Andra Pradesh, India

Activity tracking applications, where individuals record and transfer data about their location based exercises e.g., the courses of their exercises, are progressively well known. Such applications empower clients to impart data and contend to their

networks yet in ition, now and again, to get rebates on their

medical coverage premiums by demonstrating they direct standard wellness exercises. Be that as it may, they raise protection and security issues: the specialist

ops know the correct locations of their clients; the clients can report counterfeit location data, for instance, to unduly boast about their execution. In this paper, we introduce Secure Run, a safe protection safeguarding framework for announcing location based action outlines e.g., the aggregate separation secured and the rise pick up clients to monitor their execution while running, climbing or cycling. This data is gathered utilizing location based services (LBSs) and implanted sensors in cell phones and wearable gadgets. Because of the prevalence of these applications, top portable working frameworks now incorporate APIs that encourage the social affair and sharing of wellness and wellbeing information over various applications and gadgets .A key component of these applications is to empower clients to get to outlines of their exercises and execution measurements and to impart this data to different clients .They can share the aggregate separation secured, the combined height pick up and the way taken amid their exercises. For this reason, activity tracking applications gather and send clients' location

and wellness information, potentially while they seek after their exercises, to services providers.

Keywords: Location based service, Security, Social networks, Activity Tracking

1. INTRODUCTION

Individuals depend on activity following applications to screen, oversee and to urge them to do physical exercises. Portable applications, for example, Endomondo, Garmin Connect, RunKeeper, Runtastic and Strava, and wearable gadgets, for example, Fitbit, Nike+ Fuelband and Jawbone UP, empower clients to monitor their execution while running, climbing or cycling. This data is gathered utilizing location based services (LBSs) and installed sensors in cell phones and wearable gadgets. Because of the ubiquity othese applications, top versatile working frameworks now incorporate APIs that encourage the social occasion and sharing of wellness and wellbeing information over various applications and gadgets (e.g., HealthKit for iOS and Google Fit for Android). A key element of these applications is to empower clients to get to rundowns of their exercises and execution measurements and to impart this data to different clients and specialist cosocialnetworks. For example, clients can share the aggregate separation secured, the combined rise pick up and the way taken amid their exercises. For this reason, activity following applications gather and send clients' location and wellness information, perhaps while they seek after their exercises, to services providers. In return for their information,

Jun 2018 Page: 175

www.ijtsrd.com | Volume - 2 | Issue – 4

Scientific (IJTSRD)

International Open Access Journal

Preserving Summaries

Phaneendra Associate Professor, Dept. of MCA,

Lakireddy Balireddy College of Engineering, Mylavaram, Andra Pradesh, India

and wellness information, potentially while they seek after their exercises, to services providers.

Location based service, Security, Social

Individuals depend on activity following applications to screen, oversee and to urge them to do physical exercises. Portable applications, for example, Endomondo, Garmin Connect, RunKeeper, Runtastic and Strava, and wearable gadgets, for example, Fitbit,

ike+ Fuelband and Jawbone UP, empower clients to monitor their execution while running, climbing or cycling. This data is gathered utilizing location based services (LBSs) and installed sensors in cell phones and wearable gadgets. Because of the ubiquity of these applications, top versatile working frameworks now incorporate APIs that encourage the social occasion and sharing of wellness and wellbeing information over various applications and gadgets (e.g., HealthKit for iOS and Google Fit for Android).

ey element of these applications is to empower clients to get to rundowns of their exercises and execution measurements and to impart this data to different clients and specialist co-ops on online socialnetworks. For example, clients can share the

e separation secured, the combined rise pick up and the way taken amid their exercises. For this reason, activity following applications gather and send clients' location and wellness information, perhaps while they seek after their exercises, to

providers. In return for their information,

Page 2: Secure and Privacy-Preserving Summaries for Location-Based Activity

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 4 | May-Jun 2018 Page: 176

clients are offered different motivating forces. For instance, clients can get rebates, coupons or even money [4], [5], [6], grants at rivalries [8] or just indicates enhance their social notoriety. What's more, numerous networks, including enormous names, for example, British Petroleum (BP), Bank of America and Autodesk, are giving activity GPS beacons to their workers to energize more beneficial ways of life and, accordingly, enhance efficiency and lower corporate protection costs [9]. Correspondingly, medical coverage networks, for example, United Health, Kaiser Foundation Group, Humana Group and Aetna have made projects to incorporate activity GPS beacons into their arrangements, i.e., buyers are remunerated by the safety net providers with bring down rates in view of their action outlines [6].

2. RELATED WORK

Cheating on activity based socialnetworks is turning into a significant issue. For instance, He et al. [3] demonstrate that clients can without much of a stretch abrogate four square’s GPS check instruments by altering the qualities returned by the calls to the geo-location API of cell phones. So also, Polakis et al. [4] utilize a discovery way to deal with reveal the systems utilized by Foursquare and Facebook Places to identify location assaults and propose a few approaches to go around them. Additionally, work from Carbunar and Potharaju [2] break down information from Foursquare and Gowalla and find that motivators to cheat exist since individuals effectively registration and gather rewards. In this manner, it is important to painstakingly adjust impetuses with a more powerful confirmation of clients' location claims. In such manner, Zhang et al. [4] demonstrate that phony registration lead not exclusively to money related misfortunes for the scenes offering exceptional arrangements on location based registration yet in addition to the debasement of the nature of service gave by suggestion frameworks that depend on clients' location data. Carbunar et al. [11] additionally demonstrate that there is strain amongst protection and rightness in location based applications, where clients can't demonstrate that they have fulfilled identification conditions without uncovering the time and location of their registration. In the interim, to protect against swindling, analysts have additionally proposed a few instruments that offer secure check of location data. From a wide point of view, such systems can be gathered in three classifications: foundation autonomous, framework needy and half and half components. In the

framework free approach, a client acquires location confirm from her neighbors by utilizing short-extend correspondence advancements, for example, Bluetooth [5]. In particular, Talasila et al. [7] propose anlocation verification convention where an arrangement of clients help check every others' location claims. The convention works by keeping a brought together expert that, in light of clients spatiotemporal connection, chooses whether such claims are bona fide or not. Also, Zhu and Cao [6] propose a framework where commonly co-found clients depend on Bluetooth interchanges to create their location asserts that are then sent to an incorporated location verifier. Notwithstanding the security and protection ensures displayed in [8], Zhu and Cao [9] empower singular clients to assess their own location protection and choose whether to acknowledge location evidence asks for by different clients. Jadliwala et al. [13] give a formal examination of the conditions required in a specially appointed system to empower any separation based restriction conventions in remote systems. Comparative methodologies

3. PROPOSED SYSTEM

Our abnormal state outline objective is to assemble an activity tracking framework that ensures the genuineness of the client's activity information as for swindling clients who attempt to unduly build their execution and secures the clients' location protection concerning inquisitive system administrators and specialist networks that endeavor to track them. In this segment, we exhibit SecureRun, our answer for secure and protection safeguarding activity rundowns. To start with, we give an abnormal state diagram of SecureRun and characterize the fundamental tasks it includes. At that point, we give an itemized depiction of each of the previously mentioned activities.

Page 3: Secure and Privacy-Preserving Summaries for Location-Based Activity

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 4 | May-Jun 2018 Page: 177

ARCHITECTURE DIAGRAM:

4. ANDROID MODULES

Action updates: Activity Updates is one of the primary modules from the client side. On the off chance that any activity directed in any region the subtle elements of the action will be refreshed here. Each client cannot have the consent for activity refreshes .for action refreshes first client need to demand to the Admin. He have specialist to offer authorization to the client. Administrator gives a client name and secret word to the client by means of email. Client can just updates the action by utilizing this username and secret key. This is for anticipating counterfeit updates.

Action View: In this module is for customary clients. The clients can see all the Activity's in the present day. This current activity's are transferred the enrolled clients so these can be believed actions. In this module client can check the root from the Activity territory to client current zone. Current region location can be taken utilizing GPS.

Client Activity: After survey the activity's client begins their activities. On the off chance that a client beginning an action, its present location will be taken and the stop watch will be begins. The stop watch will be keep running until the point when the client stops the action. Utilizing the beginning and completion location the separation will be computed in the guide.

View User Activity: In this module give a record to all activity that client done, this module give two sort of record. Initial one will give all the action that the client take part and the following activity give to figure the aggregate no of separation canvassed by the client in a specific date.

Admin Side Modules:

Provide Activity upload Permission: User ask for activity refreshing. Administrator sees the demand and gives authorization when just the client is substantial. Administrator gives a client name and secret word. Utilizing this username and watchword client can transfer the action.

Send Email: The Admin gave client name and secret word is send to the client by means of email. So this is the more secure method for exchange.

View User Activity: The client transferred action can be seen from the administrator side. This module can be utilized to screen all the client activities in the framework.

Compute Total Distance: Admin can likewise figure the separation keep running by specific individual. This module will be utilized to check the client activity's in date insightful.

5. Algorithm Techniques

We now portray SecureRun's examining algorithm. The examining algorithm decides the inspecting times/positions at which the client demands location proofs from the entrance focuses in her correspondence go.

6. CONCLUSION

In this paper, we have proposed Secure Run, a framework for giving secure and private confirmations of location based exercises. SecureRun depends on the current remote access point systems sent in urban regions at the cost of just a product overhaul, subsequently mitigating the requirement for

Page 4: Secure and Privacy-Preserving Summaries for Location-Based Activity

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 4 | May-Jun 2018 Page: 178

sending specially appointed frameworks, and it gives insurance to the two clients and specialist co-ops. Our exploratory assessment, directed utilizing genuine informational collections of sent remote access-focuses and real clients' open air activities,shows that SecureRun accomplishes a decent precision while evaluating a lower-bound of the separation that clients cover amid their exercises, and it gives protection and security properties. From a down to earth viewpoint, we imagine our plan to be of enthusiasm for key associations between socialnetworkproviders and access point arranges administrators. We have centered our portrayal and assessment of SecureRun on remove rundowns and have outlined an answer for height pick up synopses too. Moreover, our verification of-idea usage of Secure Run on an external has demonstrated that it can be sent practically speaking. In that capacity, this work constitutes an initial move towards the plan of secure and private action based socialnetworks.

REFERENCE:

1) R. Popa, F. Li, N. Zeldovich, “An ideal-security protocol for order-preserving encoding,” in Proc. IEEE Symp. Security Privacy, 2013, 463–477.

2) A. R. Beresford and F. Stajano, “User privacy in location-aware services,” in Proc. IEEE 2nd Annu. Conf. Pervasive Comput. Commun. Workshops, 2004, pp. 127–131.

3) L. Buttyan, T. Holczer, I. Vajda, “On the effectiveness of changing pseudonyms to provide location privacy in VANETs,” in Proc. Workshop Security Privacy Ad-Hoc Sens. Netw., 2007, pp. 129–141.

4) C. Diaz, S. Seys, J. Claessens, B. Preneel, “Towards measuring anonymity,” Proc. 2nd Int. Conf. Privacy Enhancing Technol., 2003, pp. 54–68.

5) L. Bindschaedler, M. Jadliwala, I. Bilogrevic, P. Ginzboorg, V. Niemi, J.-P.Hubaux, “Track me if you can: On the effectiveness of context-based identifier changes in deployed mobile networks,” in Proc. NDSS, 2012, pp. 1–17.

6) T. Kohno, A. Broido, K. C. Claffy, “Remote physical device fingerprinting,” in Proc. IEEE Symp. Security Privacy, 2005, 211–225.

7) D. B. Faria, D. R. Cheriton, “Detecting identity-based attacks in wireless networks using signalprints,” in Proc. ACM Workshop Wireless Security, 2006, 43–52.

8) L. C. C. Desmond, C. C. Yuan, T. C. Pheng, R. S. Lee, “Identifying unique devices through wireless fingerprinting,” in Proc. 1st ACM Conf. Wireless Netw. Security, 2008, 46–55.

9) Interior Point OPTimizer [Online]. Available: https://projects. coin.org/Ipopt, Aug. 2015.

10) A. Boldyreva, N. Chenette, Y. Lee, A. O’Neill, “Order-preserving symmetric encryption,” in Proc. 28th Annu. Int. Conf. Adv. Cryptol.: Theory Appl. Cryptographic Techn., 2009, 224–241.

11) A. Boldyreva, N. Chenette, and A. O’Neill, “Order-preserving encryption revisited: Improved security analysis and alternative solutions,” Proc. 31st Annu. Conf. Adv. Cryptol., 2011, pp. 578–595

12) L. Hu, D. Evans, “Localization for mobile sensor networks,” in Proc. ACM 10th Annu.Int. Conf. Mobile Comput.Netw., 2004, pp. 45–57.

13) J.-P. Sheu, W.-K.Hu, and J.-C. Lin, “Distributed localization scheme for mobile sensor networks,” IEEE Trans. Mobile Comput., vol. 9, pp. 516–526, Apr. 2010.

14) S. Saroiu, A. Wolman, “Enabling new mobile applications with location proofs,” Proc. 10th Workshop Mobile Comput. Syst. Appl., 2009, p. 3.

15) D. Singelee, B. Preneel, “Location verification using secure distance bounding protocols,” in Proc. IEEE Int. Conf. Mobile Ad-Hoc Sensor Syst., 2005, pp. 1–7.

16) J. T. Chiang, J. J. Haas, Y.-C. Hu, “Secure and precise location verification using distance bounding and simultaneous multilateration,” in Proc. 2nd Conf. Wireless Netw. Security, 2009, pp. 181–192.