22
ANALYSIS THE SECURE CONTENT PROTECTING LOCATION BASED ON QUERIES Guided by Ms v.Anusuya M.E AP/IT Presented by PR.Kavidha(9124112050 06) C.Vasanthi(9124112050 10)

Analysis the Privacy preserving and content protecting location based on queries

Embed Size (px)

Citation preview

Page 1: Analysis the Privacy preserving and content protecting location based on queries

ANALYSIS THE SECURE CONTENT PROTECTING LOCATION BASED ON QUERIES

Guided by

Ms v.Anusuya M.EAP/IT

Presented by

PR.Kavidha(912411205006)C.Vasanthi(912411205010)

Page 2: Analysis the Privacy preserving and content protecting location based on queries

ABSTRACT

• A solution to one of the location-based query problems. user wants to

query a database of location data, known as Points Of Interest.

• The first step is based on Oblivious Transfer. The second step is based

on Private Information Retrieval, to achieve a secure solution for both

parties.

• The solution we present is efficiency of our protocol. We also introduce

a security model and analyse the security in the context of novel

protocol.

Page 3: Analysis the Privacy preserving and content protecting location based on queries

EXISTING SYSTEM

• The location server (LS),which offers somes LBS spends its

resources to compile information about various interestingPOI.

• LS’sdata is not accessed by any unauthorized user.

Disadvantage:• Not protected for the user and server.

• privacy assurance is the major issue

Page 4: Analysis the Privacy preserving and content protecting location based on queries

MODEL OF EXISTING SYSTEM

Page 5: Analysis the Privacy preserving and content protecting location based on queries

PROPOSED SYSTEM

• Location based queries that as major performance improvement two

stages.

• First stage the user privately determines his/her location within a

public grid,using oblivioues transfer.

• Second stage ,the user execute a communicational efficient PIR,to

retrieve the appropriate block in the private grid.

Page 6: Analysis the Privacy preserving and content protecting location based on queries

ADVANTAGES

• Redesigned the key structure

• Added a formal security model

• Implemented the solution of mobile device and desktop machine

Page 7: Analysis the Privacy preserving and content protecting location based on queries

ARCHITECTURE DESIGN

Page 8: Analysis the Privacy preserving and content protecting location based on queries

OBLIVIOUS TRANSFER PHASE

• QueryGeneration1 (Client) (QG1): QueryGeneration1 (Client) takes

as input indices i, j, and the dimensions of the key matrix m, n, and

outputs a query Q1 and secret s1, denoted as (Q1, s1) = QG1 (i, j, m,

n).

• ResponseGeneration1 (Server) (RG1): ResponseGeneration1

(Server) takes as input the key matrix Km×n, and the query Q1, and

outputs a response R1, denoted as (R1) = RG1(Km×n,Q1).

• ResponseRetrieval1 (Client) (RR1): ResponseRetrieval1 (Client)

takes as input indices i, j, denoted as (ki,j, IDi,j) = RR1 (i, j, m, n,

(Q1, s1),R1).

Page 9: Analysis the Privacy preserving and content protecting location based on queries

PRIVATE INFORMATION RETRIEVAL PHASE

• QueryGeneration2 (Client) (QG2): QueryGeneration2 (Server) takes

as input the cell-id IDi,j , and the set of prime powers S, and outputs

a query Q2 and secret s2, denoted as (Q2, s2) = QG2(IDi,j , S).

• ResponseGeneration2 (Server) (RG2): ResponseGeneration2

(Server) takes as input the database D.

• ResponseRetrieval2 (Client) (RR2): ResponseRetrieval2(Client)

takes as input the cell-key ki,j and cell-id IDi,j , the query Q2 and

secret s2, the response R2, and outputs the data d, denoted as (d)

=RR2(ki,j, IDi,j , (Q2, s2),R2).

Page 10: Analysis the Privacy preserving and content protecting location based on queries

MODULES

1. Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure

2. Expedite Message Authentication Protocol

3. Security Analysis

a) Hash Chain Values

b) Resistance of forging attacks

c) Forward secrecy

d) Resistance to replay attacks

e) Resistance to colluding attacks

Page 11: Analysis the Privacy preserving and content protecting location based on queries

MODULES DESCRIPTION

1. Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure

• In this Module, the two basic communication modes, which

respectively allow OBUs to communicate with each other and with

the infrastructure RSUs.

• Since vehicles communicate through wireless channels, a variety of

attacks such as injecting false information, modifying and replaying

the disseminated messages can be easily launched.

Page 12: Analysis the Privacy preserving and content protecting location based on queries

2.Expedite Message Authentication Protocol

• A Trusted Authority (TA): Providing anonymous certificate and

Distributing secret keys to all OBUs in the network.

• Roadside units (RSUs): which are fixed units distributed all over

the network. The RSUsCan communicate securely with the TA.

• On-Board Units (OBUs): which are embedded in vehicles? OBUs

can communicate either with other OBUs through V2V

communications or with RSUs through V2I communications.

Page 13: Analysis the Privacy preserving and content protecting location based on queries

3.Security Analysis

– Hash Chain Values

• The values of the hash chains are continuously used in the revocation

processes, and hence, the TA can consume all the hash chain values.

– Resistance of forging attacks

• Find the TA secret key and signature. To the revocation check and

TA message and signature are unforgetable.

Page 14: Analysis the Privacy preserving and content protecting location based on queries

CENTRALIZED SERVER

Page 15: Analysis the Privacy preserving and content protecting location based on queries

FIRST MOBILE HOST

•  

Page 16: Analysis the Privacy preserving and content protecting location based on queries

SECOND MOBILE HOST

Page 17: Analysis the Privacy preserving and content protecting location based on queries

THIRD MOBILE HOST

•  

Page 18: Analysis the Privacy preserving and content protecting location based on queries

SENDING TO SERVER

Page 19: Analysis the Privacy preserving and content protecting location based on queries

RESPONSE SEND TO MIS

Page 20: Analysis the Privacy preserving and content protecting location based on queries

CENTRALIZED SERVER REPORT

Page 21: Analysis the Privacy preserving and content protecting location based on queries

CONCLUSION

• A location based query solution that employs two protocols that

enables a user to privately determine and acquire location data.

Page 22: Analysis the Privacy preserving and content protecting location based on queries

REFERENCES

[1] (2011, Jul. 7) Openssl [Online]. Available:

http://www.openssl.org/

[2] M. Bellare and S. Micali, “Non-interactive oblivious transfer and

applications,” in Proc. CRYPTO, 1990, pp. 547–557.

[3] A. Beresford and F. Stajano, “Location privacy in pervasive

computing,”IEEE Pervasive Comput., vol. 2, no. 1, pp. 46–55,

Jan.–Mar.2003.