SlideShare ist ein Scribd-Unternehmen logo
1 von 5
GLOBALSOFT TECHNOLOGIES 
IEEE PROJECTS & SOFTWARE DEVELOPMENTS 
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE 
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS 
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com 
PROFILR : Toward Preserving Privacy and Functionality 
in Geosocial Networks 
ABSTRACT: 
Profit is the main participation incentive for social network providers. Its reliance 
on user profiles, built from a wealth of voluntarily revealed personal information, 
exposes users to a variety of privacy vulnerabilities. In this paper, we propose to 
take first steps toward addressing the conflict between profit and privacy in 
geosocial networks. We introduce PROFILR, a framework for constructing 
location centric profiles (LCPs), aggregates built over the profiles of users that 
have visited discrete locations (i.e., venues). P ROFIL R endows users with strong 
privacy guarantees and providers with correctness assurances. In addition to a 
venue centric approach, we propose a decentralized solution for computing real 
time LCP snapshots over the profiles of colocated users. An Android 
implementation shows that P ROFIL R is efficient; the end-to-end overhead is 
small even under strong privacy and correctness assurances.
EXISTING SYSTEM: 
Online social networks have become a significant source of personal information. 
Their users voluntarily reveal a wealth of personal data, including age, gender, 
contact information, preferences and status updates. A recent addition to this space, 
geosocial networks (GSNs) such as Yelp and Foursquare further collect fine 
grained location information, through check-ins performed by users at visited 
venues. Overtly, personal information allows GSN providers to offer a variety of 
applications, including personalized recommendations and targeted advertising, 
and venue owners to promote their businesses through spatio-temporal incentives, 
e.g., rewarding frequent customers through accumulated badges 
DISADVANTAGES OF EXISTING SYSTEM: 
 Providing personal information exposes however users to significant 
risks. 
 As social networks have been shown to leak and even sell user data to 
third parties. 
PROPOSED SYSTEM: 
First, we propose a venue centric P ROFIL R , that relieves the GSN provider from 
a costly involvement in venue specific activities. To achieve this, P ROFIL R 
stores and builds LCPs at venues. Furthermore, it relies on Benaloh’s 
homomorphic cryptosystem and zero knowledge proofs to enable oblivious and
provable correct LCP computations. We prove that P ROFIL R satisfies the 
introduced correctness and privacy properties. 
Second, we propose a completely decentralized PROFIL R extension, built around 
the notion of snapshot LCPs. The distributed P ROFIL R enables user devices to 
aggregate the profiles of co-located users, without assistance from a venue device. 
Snapshot LCPs are not bound to venues, but instead user devices can compute 
LCPs of neighbors at any location of interest. Communications in both PROFILR 
implementations are performed over ad hoc wireless connections. 
ADVANTAGES OF PROPOSED SYSTEM: 
 Privacy preserving, personalized public safety recommendations and 
 Privately building real time statistics over the profiles of venue patrons with 
Yelp accounts. 
 Evaluate PROFIL R through an Android implementation. Show that 
PROFILR is efficient even when deployed on previous generation 
Smartphones. 
SYSTEM ARCHITECTURE:
SYSTEM REQUIREMENTS: 
HARDWARE REQUIREMENTS: 
 System : Pentium IV 2.4 GHz. 
 Hard Disk : 40 GB. 
 Floppy Drive : 1.44 Mb. 
 Monitor : 15 VGA Colour. 
 Mouse : Logitech. 
 Ram : 512 Mb. 
SOFTWARE REQUIREMENTS:
 Operating system : Windows XP/7. 
 Coding Language : JAVA/J2EE 
 IDE : Netbeans 7.4 
 Database : MYSQL 
REFERENCE: 
Bogdan Carbunar, Mahmudur Rahman, Jaime Ballesteros, Naphtali Rishe, and 
Athanasios V. Vasilakos “PROFILR : Toward Preserving Privacy and 
Functionality in Geosocial Networks” IEEE TRANSACTIONS ON 
INFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 4, APRIL 
2014.

Weitere ähnliche Inhalte

Was ist angesagt?

Ross Rubin's Presentation
Ross Rubin's PresentationRoss Rubin's Presentation
Ross Rubin's Presentation
Mediabistro
 
Nokia NFC Presentation
Nokia NFC PresentationNokia NFC Presentation
Nokia NFC Presentation
momobeijing
 
Mozillaseabird
MozillaseabirdMozillaseabird
Mozillaseabird
Sneh Raval
 
Near Field Communication
Near Field CommunicationNear Field Communication
Near Field Communication
bdobles
 
MIT Enterprise Forum, NFC Workgroup
MIT Enterprise Forum, NFC WorkgroupMIT Enterprise Forum, NFC Workgroup
MIT Enterprise Forum, NFC Workgroup
Ken Winnick
 

Was ist angesagt? (20)

Application of near field communication (nfc)
Application of near field communication (nfc)Application of near field communication (nfc)
Application of near field communication (nfc)
 
PLA 2012: Librarian's Field Guide to Near Field Communication
PLA 2012: Librarian's Field Guide to Near Field CommunicationPLA 2012: Librarian's Field Guide to Near Field Communication
PLA 2012: Librarian's Field Guide to Near Field Communication
 
Ross Rubin's Presentation
Ross Rubin's PresentationRoss Rubin's Presentation
Ross Rubin's Presentation
 
IoTMeetupGuildford#9: SocIoTal – Face-to-face enabler for detecting real soci...
IoTMeetupGuildford#9: SocIoTal – Face-to-face enabler for detecting real soci...IoTMeetupGuildford#9: SocIoTal – Face-to-face enabler for detecting real soci...
IoTMeetupGuildford#9: SocIoTal – Face-to-face enabler for detecting real soci...
 
Nfc
NfcNfc
Nfc
 
Windows Phone 8 Dev.KickStart - Sensors and integration
Windows Phone 8 Dev.KickStart - Sensors and integrationWindows Phone 8 Dev.KickStart - Sensors and integration
Windows Phone 8 Dev.KickStart - Sensors and integration
 
Nokia NFC Presentation
Nokia NFC PresentationNokia NFC Presentation
Nokia NFC Presentation
 
Mozillaseabird
MozillaseabirdMozillaseabird
Mozillaseabird
 
NFC Guidebook, 2011
NFC Guidebook, 2011NFC Guidebook, 2011
NFC Guidebook, 2011
 
Nfc
NfcNfc
Nfc
 
Near Field Communication
Near Field CommunicationNear Field Communication
Near Field Communication
 
Nfc technology fit 1012
Nfc technology fit 1012Nfc technology fit 1012
Nfc technology fit 1012
 
Nokia 700 & Nokia 701 - Try something new!
Nokia 700 & Nokia 701 - Try something new!Nokia 700 & Nokia 701 - Try something new!
Nokia 700 & Nokia 701 - Try something new!
 
MIT Enterprise Forum, NFC Workgroup
MIT Enterprise Forum, NFC WorkgroupMIT Enterprise Forum, NFC Workgroup
MIT Enterprise Forum, NFC Workgroup
 
NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)
 
Introduction to NFC
Introduction to NFCIntroduction to NFC
Introduction to NFC
 
What is nfc(4)
What is nfc(4)What is nfc(4)
What is nfc(4)
 
Smartrac webinar tap and play December 2013
Smartrac webinar tap and play December 2013Smartrac webinar tap and play December 2013
Smartrac webinar tap and play December 2013
 
Mobile mondaysmelb
Mobile mondaysmelbMobile mondaysmelb
Mobile mondaysmelb
 
Nfc
NfcNfc
Nfc
 

Andere mochten auch

Τὰ ῥήματα ἀφαιροῦμεν
Τὰ ῥήματα ἀφαιροῦμενΤὰ ῥήματα ἀφαιροῦμεν
Τὰ ῥήματα ἀφαιροῦμεν
Carlos Cabanillas
 
01 diceopolis b
01 diceopolis b01 diceopolis b
01 diceopolis b
fontegeria
 
TrainYourBrain cover
TrainYourBrain coverTrainYourBrain cover
TrainYourBrain cover
gineva
 
Partes internas de cpu disco duro
Partes internas de cpu disco duroPartes internas de cpu disco duro
Partes internas de cpu disco duro
gatitaluisa
 
De systhemate latinorum verborum
De systhemate latinorum verborumDe systhemate latinorum verborum
De systhemate latinorum verborum
Óscar Ramos
 
The woods
The woodsThe woods
The woods
DanaLH
 
2010 05-15讀書會-仰東的心得分享&即問即答
2010 05-15讀書會-仰東的心得分享&即問即答2010 05-15讀書會-仰東的心得分享&即問即答
2010 05-15讀書會-仰東的心得分享&即問即答
yangmarissa
 
Lista de pré inscrição online
Lista de pré inscrição onlineLista de pré inscrição online
Lista de pré inscrição online
Hugo Costa
 
03 Basis Princeples Of Design
03 Basis Princeples Of Design03 Basis Princeples Of Design
03 Basis Princeples Of Design
eretrianews
 
How Ya Bean? logo
How Ya Bean? logoHow Ya Bean? logo
How Ya Bean? logo
gineva
 

Andere mochten auch (20)

Τὰ ῥήματα ἀφαιροῦμεν
Τὰ ῥήματα ἀφαιροῦμενΤὰ ῥήματα ἀφαιροῦμεν
Τὰ ῥήματα ἀφαιροῦμεν
 
01 diceopolis b
01 diceopolis b01 diceopolis b
01 diceopolis b
 
Objectives Design
Objectives DesignObjectives Design
Objectives Design
 
TrainYourBrain cover
TrainYourBrain coverTrainYourBrain cover
TrainYourBrain cover
 
Partes internas de cpu disco duro
Partes internas de cpu disco duroPartes internas de cpu disco duro
Partes internas de cpu disco duro
 
El lobo, primera parte
El lobo, primera parteEl lobo, primera parte
El lobo, primera parte
 
Clásicas y tic
Clásicas y ticClásicas y tic
Clásicas y tic
 
De systhemate latinorum verborum
De systhemate latinorum verborumDe systhemate latinorum verborum
De systhemate latinorum verborum
 
The woods
The woodsThe woods
The woods
 
2010 05-15讀書會-仰東的心得分享&即問即答
2010 05-15讀書會-仰東的心得分享&即問即答2010 05-15讀書會-仰東的心得分享&即問即答
2010 05-15讀書會-仰東的心得分享&即問即答
 
งานBee
งานBeeงานBee
งานBee
 
Fianacial analysis
Fianacial analysisFianacial analysis
Fianacial analysis
 
Lista de pré inscrição online
Lista de pré inscrição onlineLista de pré inscrição online
Lista de pré inscrição online
 
วิธีการสมัครตัวแทนจำหน่าย
วิธีการสมัครตัวแทนจำหน่ายวิธีการสมัครตัวแทนจำหน่าย
วิธีการสมัครตัวแทนจำหน่าย
 
De Schola Loquamur
De Schola LoquamurDe Schola Loquamur
De Schola Loquamur
 
03 Basis Princeples Of Design
03 Basis Princeples Of Design03 Basis Princeples Of Design
03 Basis Princeples Of Design
 
Anatomija
AnatomijaAnatomija
Anatomija
 
How Ya Bean? logo
How Ya Bean? logoHow Ya Bean? logo
How Ya Bean? logo
 
Dia
DiaDia
Dia
 
KayWeb: KEYS to WEB TRAFFIC
KayWeb: KEYS to WEB TRAFFICKayWeb: KEYS to WEB TRAFFIC
KayWeb: KEYS to WEB TRAFFIC
 

Ähnlich wie 2014 IEEE JAVA NETWORK SECURITY PROJECT Profilr toward preserving privacy and functionality in geosocial networks

Ähnlich wie 2014 IEEE JAVA NETWORK SECURITY PROJECT Profilr toward preserving privacy and functionality in geosocial networks (20)

ANALYSING THE POTENTIAL OF BLE TO SUPPORT DYNAMIC BROADCASTING SCENARIOS
ANALYSING THE POTENTIAL OF BLE TO SUPPORT DYNAMIC BROADCASTING SCENARIOSANALYSING THE POTENTIAL OF BLE TO SUPPORT DYNAMIC BROADCASTING SCENARIOS
ANALYSING THE POTENTIAL OF BLE TO SUPPORT DYNAMIC BROADCASTING SCENARIOS
 
ANALYSING THE POTENTIAL OF BLE TO SUPPORT DYNAMIC BROADCASTING SCENARIOS
ANALYSING THE POTENTIAL OF BLE TO SUPPORT DYNAMIC BROADCASTING SCENARIOSANALYSING THE POTENTIAL OF BLE TO SUPPORT DYNAMIC BROADCASTING SCENARIOS
ANALYSING THE POTENTIAL OF BLE TO SUPPORT DYNAMIC BROADCASTING SCENARIOS
 
Analysing the Potential of BLE to Support Dynamic Broadcasting Scenarios
Analysing the Potential of BLE to Support Dynamic Broadcasting ScenariosAnalysing the Potential of BLE to Support Dynamic Broadcasting Scenarios
Analysing the Potential of BLE to Support Dynamic Broadcasting Scenarios
 
ANALYSING THE POTENTIAL OF BLE TO SUPPORT DYNAMIC BROADCASTING SCENARIOS
ANALYSING THE POTENTIAL OF BLE TO SUPPORT DYNAMIC BROADCASTING SCENARIOSANALYSING THE POTENTIAL OF BLE TO SUPPORT DYNAMIC BROADCASTING SCENARIOS
ANALYSING THE POTENTIAL OF BLE TO SUPPORT DYNAMIC BROADCASTING SCENARIOS
 
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
 
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
 
apidays LIVE Paris 2021 - The GDPR Developer Guide by Jerome Gorin, CNIL
apidays LIVE Paris 2021 - The GDPR Developer Guide by Jerome Gorin, CNIL apidays LIVE Paris 2021 - The GDPR Developer Guide by Jerome Gorin, CNIL
apidays LIVE Paris 2021 - The GDPR Developer Guide by Jerome Gorin, CNIL
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
 
Rococo Software Q3 2010
Rococo Software Q3 2010Rococo Software Q3 2010
Rococo Software Q3 2010
 
Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server
 
Ijeee 16-19-digital media hidden data extracting
Ijeee 16-19-digital media hidden data extractingIjeee 16-19-digital media hidden data extracting
Ijeee 16-19-digital media hidden data extracting
 
2013 09-01 enviroinfo presentation - final
2013 09-01 enviroinfo presentation - final2013 09-01 enviroinfo presentation - final
2013 09-01 enviroinfo presentation - final
 
Integrate All The Things WS02Con
Integrate All The Things WS02ConIntegrate All The Things WS02Con
Integrate All The Things WS02Con
 
Securing Location of User in Geo Social Networking
Securing Location of User in Geo Social NetworkingSecuring Location of User in Geo Social Networking
Securing Location of User in Geo Social Networking
 
Bitcraft - Portfolio
Bitcraft - PortfolioBitcraft - Portfolio
Bitcraft - Portfolio
 
Flexible Technologies for Smart Campus
Flexible Technologies for Smart CampusFlexible Technologies for Smart Campus
Flexible Technologies for Smart Campus
 
StarHub: The Value of Telco Big Data
StarHub: The Value of Telco Big Data  StarHub: The Value of Telco Big Data
StarHub: The Value of Telco Big Data
 
AI, ML and Graph Algorithms: Real Life Use Cases with Neo4j
AI, ML and Graph Algorithms: Real Life Use Cases with Neo4jAI, ML and Graph Algorithms: Real Life Use Cases with Neo4j
AI, ML and Graph Algorithms: Real Life Use Cases with Neo4j
 
IEEE 2014 JAVA DATA MINING PROJECTS Privacy preserving and content-protecting...
IEEE 2014 JAVA DATA MINING PROJECTS Privacy preserving and content-protecting...IEEE 2014 JAVA DATA MINING PROJECTS Privacy preserving and content-protecting...
IEEE 2014 JAVA DATA MINING PROJECTS Privacy preserving and content-protecting...
 
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...
 

Mehr von IEEEBEBTECHSTUDENTSPROJECTS

Mehr von IEEEBEBTECHSTUDENTSPROJECTS (20)

2014 IEEE DOTNET IMAGE PROCESSING PROJECT Localization of license plate numbe...
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Localization of license plate numbe...2014 IEEE DOTNET IMAGE PROCESSING PROJECT Localization of license plate numbe...
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Localization of license plate numbe...
 
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Image classification using multisca...
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Image classification using multisca...2014 IEEE DOTNET IMAGE PROCESSING PROJECT Image classification using multisca...
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Image classification using multisca...
 
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Edge based ivd segmentation system
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Edge based ivd segmentation system2014 IEEE DOTNET IMAGE PROCESSING PROJECT Edge based ivd segmentation system
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Edge based ivd segmentation system
 
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Designing an-efficient-image
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Designing an-efficient-image2014 IEEE DOTNET IMAGE PROCESSING PROJECT Designing an-efficient-image
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Designing an-efficient-image
 
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Click prediction-for-web-image-rera...
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Click prediction-for-web-image-rera...2014 IEEE DOTNET IMAGE PROCESSING PROJECT Click prediction-for-web-image-rera...
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Click prediction-for-web-image-rera...
 
2014 IEEE JAVA IMAGE PROCESSING PROJECT Image classification using multiscale...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Image classification using multiscale...2014 IEEE JAVA IMAGE PROCESSING PROJECT Image classification using multiscale...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Image classification using multiscale...
 
2014 IEEE JAVA IMAGE PROCESSING PROJECT Hierarchical prediction and context a...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Hierarchical prediction and context a...2014 IEEE JAVA IMAGE PROCESSING PROJECT Hierarchical prediction and context a...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Hierarchical prediction and context a...
 
2014 IEEE JAVA IMAGE PROCESSING PROJECT Designing an-efficient-image encryption
2014 IEEE JAVA IMAGE PROCESSING PROJECT Designing an-efficient-image encryption2014 IEEE JAVA IMAGE PROCESSING PROJECT Designing an-efficient-image encryption
2014 IEEE JAVA IMAGE PROCESSING PROJECT Designing an-efficient-image encryption
 
2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...
 
2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...
 
2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...
2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...
2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...
 
2014 IEEE JAVA SERVICE COMPUTING PROJECT Web service recommendation via explo...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Web service recommendation via explo...2014 IEEE JAVA SERVICE COMPUTING PROJECT Web service recommendation via explo...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Web service recommendation via explo...
 
2014 IEEE JAVA SERVICE COMPUTING PROJECT Scalable and accurate prediction of ...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Scalable and accurate prediction of ...2014 IEEE JAVA SERVICE COMPUTING PROJECT Scalable and accurate prediction of ...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Scalable and accurate prediction of ...
 
2014 IEEE JAVA SERVICE COMPUTING PROJECT Privacy enhanced web service composi...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Privacy enhanced web service composi...2014 IEEE JAVA SERVICE COMPUTING PROJECT Privacy enhanced web service composi...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Privacy enhanced web service composi...
 
2014 IEEE JAVA SERVICE COMPUTING PROJECT Decentralized enactment of bpel proc...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Decentralized enactment of bpel proc...2014 IEEE JAVA SERVICE COMPUTING PROJECT Decentralized enactment of bpel proc...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Decentralized enactment of bpel proc...
 
2014 IEEE JAVA SERVICE COMPUTING PROJECT A novel time obfuscated algorithm fo...
2014 IEEE JAVA SERVICE COMPUTING PROJECT A novel time obfuscated algorithm fo...2014 IEEE JAVA SERVICE COMPUTING PROJECT A novel time obfuscated algorithm fo...
2014 IEEE JAVA SERVICE COMPUTING PROJECT A novel time obfuscated algorithm fo...
 
2014 IEEE DOTNET SOFTWARE ENGINEERING PROJECT Automatic summarization of bug ...
2014 IEEE DOTNET SOFTWARE ENGINEERING PROJECT Automatic summarization of bug ...2014 IEEE DOTNET SOFTWARE ENGINEERING PROJECT Automatic summarization of bug ...
2014 IEEE DOTNET SOFTWARE ENGINEERING PROJECT Automatic summarization of bug ...
 
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Repent analyzing the nature of id...
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Repent analyzing the nature of id...2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Repent analyzing the nature of id...
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Repent analyzing the nature of id...
 
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Conservation of information softw...
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Conservation of information softw...2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Conservation of information softw...
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Conservation of information softw...
 
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Automatic summarization of bug re...
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Automatic summarization of bug re...2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Automatic summarization of bug re...
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Automatic summarization of bug re...
 

Kürzlich hochgeladen

Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Kürzlich hochgeladen (20)

Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 

2014 IEEE JAVA NETWORK SECURITY PROJECT Profilr toward preserving privacy and functionality in geosocial networks

  • 1. GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com PROFILR : Toward Preserving Privacy and Functionality in Geosocial Networks ABSTRACT: Profit is the main participation incentive for social network providers. Its reliance on user profiles, built from a wealth of voluntarily revealed personal information, exposes users to a variety of privacy vulnerabilities. In this paper, we propose to take first steps toward addressing the conflict between profit and privacy in geosocial networks. We introduce PROFILR, a framework for constructing location centric profiles (LCPs), aggregates built over the profiles of users that have visited discrete locations (i.e., venues). P ROFIL R endows users with strong privacy guarantees and providers with correctness assurances. In addition to a venue centric approach, we propose a decentralized solution for computing real time LCP snapshots over the profiles of colocated users. An Android implementation shows that P ROFIL R is efficient; the end-to-end overhead is small even under strong privacy and correctness assurances.
  • 2. EXISTING SYSTEM: Online social networks have become a significant source of personal information. Their users voluntarily reveal a wealth of personal data, including age, gender, contact information, preferences and status updates. A recent addition to this space, geosocial networks (GSNs) such as Yelp and Foursquare further collect fine grained location information, through check-ins performed by users at visited venues. Overtly, personal information allows GSN providers to offer a variety of applications, including personalized recommendations and targeted advertising, and venue owners to promote their businesses through spatio-temporal incentives, e.g., rewarding frequent customers through accumulated badges DISADVANTAGES OF EXISTING SYSTEM:  Providing personal information exposes however users to significant risks.  As social networks have been shown to leak and even sell user data to third parties. PROPOSED SYSTEM: First, we propose a venue centric P ROFIL R , that relieves the GSN provider from a costly involvement in venue specific activities. To achieve this, P ROFIL R stores and builds LCPs at venues. Furthermore, it relies on Benaloh’s homomorphic cryptosystem and zero knowledge proofs to enable oblivious and
  • 3. provable correct LCP computations. We prove that P ROFIL R satisfies the introduced correctness and privacy properties. Second, we propose a completely decentralized PROFIL R extension, built around the notion of snapshot LCPs. The distributed P ROFIL R enables user devices to aggregate the profiles of co-located users, without assistance from a venue device. Snapshot LCPs are not bound to venues, but instead user devices can compute LCPs of neighbors at any location of interest. Communications in both PROFILR implementations are performed over ad hoc wireless connections. ADVANTAGES OF PROPOSED SYSTEM:  Privacy preserving, personalized public safety recommendations and  Privately building real time statistics over the profiles of venue patrons with Yelp accounts.  Evaluate PROFIL R through an Android implementation. Show that PROFILR is efficient even when deployed on previous generation Smartphones. SYSTEM ARCHITECTURE:
  • 4. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:
  • 5.  Operating system : Windows XP/7.  Coding Language : JAVA/J2EE  IDE : Netbeans 7.4  Database : MYSQL REFERENCE: Bogdan Carbunar, Mahmudur Rahman, Jaime Ballesteros, Naphtali Rishe, and Athanasios V. Vasilakos “PROFILR : Toward Preserving Privacy and Functionality in Geosocial Networks” IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 4, APRIL 2014.