Professional Documents
Culture Documents
Existing system
With the ever-increasing use of smart phones and tablet devices, location-based
services (LBSs) have experienced explosive growth in the past few years. To scale
up services, there has been a rising trend of outsourcing data management to Cloud
service providers, which provide query services to clients on behalf of data owners.
However, in this data-outsourcing model, the service provider can be untrustworthy
or compromised, thereby returning incorrect or incomplete query results to clients,
intentionally or not. Therefore, empowering clients to authenticate query results is
imperative for outsourced databases.
Proposed system
In this paper, we study the authentication problem for location-based arbitrarysubspace skyline queries (LASQs), which represent an important class of LBS
applications. We propose a basic Merkle Skyline R-tree method and a novel Partial
S4-tree method to authenticate one-shot LASQs. For the authentication of
continuous LASQs, we develop a prefetching-based approach that enables clients to
compute new LASQ results locally during movement, without frequently contacting
the server for query re-evaluation. Experimental results demonstrate the efficiency of
our proposed methods and algorithms under various system settings.
MODULES:
1. Users
2. Mobile Service Provider
3. Location Server
MODULES DESCRIPTION:
Users:
The users in our model use some location-based service provided by the location
server LS. For example, what is he nearest ATM or restaurant? The purpose of the
mobile service provider SP is to establish and maintain the communication
between the location server and the user. The location server LS owns a set of POI
records ri for 1ri . Each record describes a POI, giving GPS coordinates to its
location (xgps,ygps), and a description or name about what is at the location.
Mobile Service Provider:
We reasonably assume that the mobile service provider SP is a passive entity and is
not allowed to collude with the LS. We make this assumption because the SP can
determine the whereabouts of a mobile device, which, if allowed to collude with
the LS, completely subverts any method for privacy. There is simply no
technological method for preventing this attack. As a consequence of this
assumption, the user is able to either use GPS (Global Positioning System) or the
mobile service provider to acquire his/her coordinates.
Location Server:
We are assuming that the mobile service provider SP is trusted to maintain the
connection, we consider only two possible adversaries. Each and every one for
individual communication direction. We consider the case in which the user is the
adversary and tries to obtain more than he/she is allowed. Next we consider the
case in which the location server LS is the adversary, and tries to uniquely
associate a user with a grid coordinate.
Pentium IV
1.1 Ghz
RAM
256 MB(min)
Hard Disk
20 GB
Key Board
Mouse
Monitor
SVGA
Windows XP/7.
Coding Language
JAVA/J2EE
IDE
Netbeans 7.4
Database
MYSQL