You are on page 1of 19

m    


r The details of the client is kept as a secret so that
personal information of the client is not known to the
3rd party other than the user and the client.
c 

g •fficiency and privacy are two fundamental issues in moving
object monitoring. This project proposes a Æ  


  framework that addresses both issues. The
framework distinguishes itself from the existing work by being
the first to holistically address the issues of location updating in
terms of monitoring accuracy, efficiency, and privacy,
particularly, when and how mobile clients should send location
updates to the server. Based on the notions of safe region and
most probable result, PAM performs location updates only
when they would likely alter the query results. Furthermore, by
designing various client update strategies, the framework is
flexible and able to optimize accuracy, privacy, or efficiency. We
develop efficient query evaluation/reevaluation and safe region
computation algorithms in the framework. The experimental
results show that PAM substantially outperforms traditional
schemes in terms of monitoring accuracy, CPU cost, and
scalability while achieving close-to-optimal communication
cost.
P  c    
m    
Õ 
we assume that the clients are privacy conscious. That is,
the clients do not want to expose their genuine point
locations to the database server to avoid
spatiotemporal correlation inference attack , by which
an adversary may infer usersǯ private information such
as political affiliations, alternative lifestyles, or medical
problems. For example, knowing that a user is inside a
heart specialty clinic during business hours, the
adversary can infer that the user
might have a heart problem. This has been cited as a
major privacy threat in location-based services and
mobile computing. To protect against it, most existing
work suggests replacing accurate point locations by
bounding boxes to reduce location resolutions. With a
large enough location box covering the sensitive place
(e.g., the clinic) as well as a good number of other
insensitive places, the success rate or confidence of
such spatiotemporal correlation inference can be
reduced significantly.
~n our monitoring framework, we take the same privacy-
aware approach. Specifically, each time a client detects
his/her genuine point location, it is encapsulated into a
bounding box. Then, the client-side location updater
decides whether or not to update that box to the server.1
Without any other knowledge about the client locations
or moving patterns, upon receiving such a box, the server
can only presume that the genuine point location is
distributed uniformly in this box. To simplify the
presentation in this
•  P 
r There are some techniques to do encryption and
decryption. Also the encryption and decryption is
built in and will be doing for certain dataǯs manually.
But here the privacy preserving always go-ahead with
the personal data provided for the Human in online.
  P 
r Privacy-aware monitoring:-
r Privacy of the client is maintained.
r The data stored in the database is in encrypted form.
cm
 
3 
   
 
r A first (front-end) tier of data protection mechanisms will
be directly enforced at the traffic probe device, thereby
guaranteeing that the data delivered to the controller will be
already privacy-protected.
r A second (back-end) tier will enforce access procedures to
the collected data and will orchestrate the operation of
reversing, when strictly needed, the data protection
mechanisms set forth by the first tier. Furthermore, it will
make available security features, such as the correct level of
security on the management and storage platforms, as well
as will support procedures devised to anonymise and export
data traces to third party users and external monitoring
applications.
m  
r Administrator(Government):-
r Client(Passengers):-
r Third Party User(Agents):-
m   
r Administrator(Government):-
r The administrator have the highest priority ie ., he
can view the information about all the users.
m   
r Client(Passengers):-
r He have only a limited amount of rights ie., he can
only view the details of the other users and he cannot
edit the details of 3rd party users.
m   
r Third Party User(Agents):-
r He cannot view the details of any users.
r ~f he tries to view the details of users it will be in an
encrypted form.
J 
 
J   
  
r Core 2 Duo r JAVA
r 2.6 GHz Processor Speed r J2••
r 2 GB RAM
r Color Monitor
r 110 Keys Keyboard
î    
g A framework for monitoring continuous spatial
queries over moving objects. The framework is the
first to holistically address the issue of location
updating with regard to monitoring accuracy,
efficiency, and privacy. We provide detailed
algorithms for query evaluation/ reevaluation and safe
region computation in this framework. We also devise
three-client update strategies that optimize accuracy,
privacy, and efficiency, respectively.

You might also like