ArticlePDF Available

AES-Route Server Model for Location based Services in Road Networks

Authors:

Abstract and Figures

The now ubiquitous use of location based services (LBS), within the mobile computing domain, has enabled users to receive accurate points of interest (POI) to their geo-tagged queries. While location-based services provide rich content, they are not without risks; specifically, the use of LBS poses many serious challenges with respect to privacy protection. Additionally, the efficiency of spatial query processing, and the accuracy of said results, can be problematic when applied to road networks. Existing approaches provide different online route APIs to deliver the precise POI, but mobile user demand not only Accurate, Efficient and Secure (AES) results, but results that do not threaten their privacy. In this paper, we have addressed these challenges by proposing an AES-Route Server (RS) approach for LBS, which supports common spatial queries, including Range Queries and k-Nearest Neighbor Queries. We can secure the user location through the proposed AES-RS model because it provides the query results accurate and efficiently. The proposed model satisfies the primary goals including accuracy, efficiency and privacy for a location base system.
Content may be subject to copyright.
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 8, No. 8, 2017
361 | P a g e
www.ijacsa.thesai.org
AES-Route Server Model for Location based Services
in Road Networks
Mohamad Shady Alrahhal
Department of Computer Science
King Abdulaziz University (KAU)
Jeddah, Saudi Arabia
Muhammad Usman Ashraf
Department of Computer Science
King Abdulaziz University (KAU)
Jeddah, Saudi Arabia
Adnan Abesen
Department of Computer Science
King Abdulaziz University (KAU)
Jeddah, Saudi Arabia
Sabah Arif
Department of Computer Science
Superior university Lahore
Lahore, Pakistan
AbstractThe now ubiquitous use of location based services
(LBS), within the mobile computing domain, has enabled users to
receive accurate points of interest (POI) to their geo-tagged
queries. While location-based services provide rich content, they
are not without risks; specifically, the use of LBS poses many
serious challenges with respect to privacy protection.
Additionally, the efficiency of spatial query processing, and the
accuracy of said results, can be problematic when applied to road
networks. Existing approaches provide different online route
APIs to deliver the precise POI, but mobile user demand not only
Accurate, Efficient and Secure (AES) results, but results that do
not threaten their privacy. In this paper, we have addressed these
challenges by proposing an AES-Route Server (RS) approach for
LBS, which supports common spatial queries, including Range
Queries and k-Nearest Neighbor Queries. We can secure the user
location through the proposed AES-RS model because it provides
the query results accurate and efficiently. The proposed model
satisfies the primary goals including accuracy, efficiency and
privacy for a location base system.
KeywordsMobile computing; location based services; location
based services (LBS) privacy; LBS accuracy; LBS efficiency;
ubiquitous computing
I. INTRODUCTION
Recent years have witnessed the emergence of mobile
computing technology as both a ubiquitous and extremely
popular paradigm [1], wherein mobile users are capable of
accessing information about nearby points-of-interest (POI).
The devices used (smart phones, tablets, etc.) are integrated
with a global positioning system (GPS), thereby facilitating the
usage of location-based services (LBS). In short, location-
based services are value-added services that leverage a user’s
geographic location when making queries. By geo-tagging a
query, users are able to receive more personal, and valuable,
results. While helpful, this service depends on many factors,
including Points-of-Interest, the precise information
surrounding the user and their current location, and the inherent
need for privacy protection [7].
A basic architecture for location-based services is depicted
in Fig. 1, where a mobile user connects to the LBS Server
through a communication network. The user then posts a query
to the LBS for some location by sending his current location.
The LBS then responds to mobile user with the geographically
appropriate set of results.
Fig. 1. A common LBS architecture.
In traditional mobile technologies, a mobile user posts a
spatial query, q, such as a k Nearest Neighbor (kNN) or Range
Query, to a server, requesting particular information; the server
will then process the spatial query and return results to the
mobile user with appropriate POI information [2], [3]. Without
doubt, this Point-to-Point access model (POP) is quite ideal
and easy to use. Unfortunately, several challenges arise for
spatial query processing, such as when there are multiple users
and issuing the same query, q, for their POI, or when all mobile
users belong to the same location. In these scenarios, the server
accrues additional overhead, and resources are wasted [3].
In a conventional mobile computing system, we find three
primary goals with respect to a mobile user and the issuance of
a spatial query:
(G1) Accurate results,
(G2) Efficient results and
(G3) Privacy protection
G1 and G2 always present challenges due to the inherent
realities of a mobile system. Accuracy and efficiency appear as
luxuries in a system where both the user and the query are
mobile. Additionally, LBS infrastructures and approaches have
known limitations with respect to G1 and G2. In terms of G1
for LBS systems, a very famous framework SMashQ was
proposed [5], which supports kNN query processing. The main
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 8, No. 8, 2017
362 | P a g e
www.ijacsa.thesai.org
purpose of SMashQ was to leverage online route APIs, such as
Google Maps, Yahoo Maps, Bing Maps, etc. to provide
accurate query results for live travel in real road networks.
While novel and an advancement in this research domain,
SMashQ suffered with efficiency. Each time a user posts a
query, q, to any LBS server, the LBS in turn would call the
online route API for the most recent results and then return the
results back mobile user. In short, the query response times
were tragically slow. As expected, the proposed system was
very accurate; the overhead of repeated queries on the server,
followed by the server repeated calling route API, decreased
the entire system efficiency. To overcome this problem, a more
efficient approach was proposed, Route Server (RS) [6]. The
primary goal of Route Server was to enhance the system
efficiency with respect to query response time by reducing the
number of route query requests. Furthermore, they used upper
and lower limit calculation approach for this purpose. They
also introduced a new mechanism such as Query
Parallelism by parallelizing the query with different
scenarios. RS was able to maintain accuracy while avoiding the
repeated calls to the server and the online route API. The
proposed approach seems to have addressed G1 and G2,
leaving only G3.
The rapid growth and ever-increasing number of mobile
users brings a variety of new challenges to LBS providers.
Privacy protection, G3, is inherently challenging, as users, who
want answers to their queries, must, in fact, reveal their
locations and potentially sensitive personal data in order to
receive answers to said queries.
What if the mobile user’s location is revealed?
What kind of risks could be faced when mobile user’s
precise information becomes exposed?
How can one protect mobile user’s location privacy
from bad actors?
What factors should be involved under privacy
protection?
These questions have formed the framework for a plethora
of research within privacy and security of mobile data systems.
A variety of approaches have been proposed to overcome
privacy protection related challenges. Many depend on specific
scenarios and basic privacy attributes such as the mobile user’s
identity, his current location, and time information [9]. For
instance, a mobile user, who is at an unknown and unimportant
location, may have no issue in sharing his personal data. But if
the same mobile user is inside a residence or within its
proximity, this location data may inadvertently reveal addition
information that an adversary could misuse. Accordingly,
many privacy attacks were identified, effectively creating a
taxonomy of attacks, and respective solutions were proposed,
each with its advantages and disadvantages.
A. Location Privacy Attacks
LBS location privacy attacks depend on protection
attributes, described previously. Therefore, based on these
protection attributes, we have classified Location Privacy
Attacks into two major categories as follows (Fig. 2):
Fig. 2. Classification of location privacy attacks.
1) Location Homogenity Attacks
Location Homogeneity attacks are one the most common
attacks seen within LBS systems. They take advantage of the
rare case in k-anonymity, where a sensitive value is
indistinguishable and posted along a set of k-cluster values.
Despite the dataset being k-anonymized, the sensitive value is
revealed by any adversary [8], [9]. Additional homogeneity
attacks include map utilization by reducing the area. In this
case, the adversary reveals the diversity of the position
information by analysing some location related information.
2) Background Knowledge Attack
In this attack, the attacker exploits the mobile user’s
contextual information and is able to accurately predict precise
data. The contextual information of the user provides the
background knowledge to the malicious attacker. In short, the
attacker is able to leverage the background knowledge to prune
the set of possible answers.
Maximum Movement Boundary Attack is another
background knowledge based attack approach used by
adversaries to reveal mobile user’s actual information.
The adversary discovers the mobile user’s region by
identifying the maximum movement between two
successful POI against posted queries in that specific
region [10].
Multiple Query Attacks The attacker follows the
query log and identifies the query posted or updated
frequently within a specific interval. The attacker
effectively shrinks the specific region based on where
he got consecutive query updates of a particular k-
anonymity set and corresponding actual query [9], [11].
Context Linking Attacks are categorized into three
groups: personal context linking attacks, probability
distribution attacks, and map matching attacks. Personal
context linking attacks are related to the personal
contextual information of a mobile user, which might
be belong to his preferences or POI. Whereas
probability distribution attacks are based on the high
probability function of mobile user’s location position.
An adversary discovers the user’s most frequent visited
location position, along with a particular time span, and
then applies a probability function to identify his
precise information. Finally, Map matching is the third
context linking attack, wherein a mobile user can be
traced for a certain location by removing all irrelevant
regions from the Map. Moreover, in order to leak the
actual location information, an adversary could use the
semantic information gained from the Map [12].
Location Privacy Attacks
Location Homogeneity
Attack
Background Knowledge
Attack
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 8, No. 8, 2017
363 | P a g e
www.ijacsa.thesai.org
B. Location Privacy Approaches
A variety of approaches have been proposed to solve the
aforementioned privacy attacks.
1) K-anonymity
One of the most commonly used approaches for location
privacy preserving in LBS system is K-Anonymity, which
insures that the precise information of targeted mobile user is
indistinguishable from the value of set K-1 posts to LBS
server. We can find out the probability [13] to trace the actual
user’s data as follows:
Let’s have K a set of position of all anonymity users K
= {k1, k2, k3, ... ,kn-1}. Therefore Probability of target user
could be discovered as: 1/ K (1)
The basic idea of k-anonymity to protect location privacy
was demonstrated by Gruteser and Grunwald [31]. The theme
of k-anonymity was that a mobile user can post a query, q, to
the LBS server with an obfuscation area, along with k-1
anonymity positions of other users, rather than sending his
precise location position. Certainty, k-anonymity approach is
better in order to achieve the location privacy in LBS system;
but in some cases, there are serious challenges when using this
approach as follows:
Homogenous Attack.
Background Knowledge Attack.
2) Cryptography Based Approaches
Cryptography is another powerful approach to preserve a
user’s location privacy from malicious attackers in a LBS
system. The core idea behind cryptography based approach is
utilization of encryption and decryption schemes for precise
data that need to be sent over a network. A mobile user posts a
query over the network; this query includes his secret data,
which is encrypted by apply some particular algorithms at
mobile user’s end. The same algorithm is available at server
side to decrypt the data sent by user and utilized for further
processing. The use of encryption and decryption schemes is
dependent on the required level and kind of privacy.
Cryptography approaches are classified into two main phases
and then sub types as shown below in Fig. 3.
Fig. 3. Cryptography classification.
Certainly cryptography approach is very secured and
implementable for LBS system but In contrast, a big challenge
for cryptography based approach is the requirement of a
massive level of computation during encryption and decryption
takes more time than the system required. In LBS system, time
is very significant attribute in order to provide the results
efficiently. However, implementation of cryptography might
be costly regarding to this factor [4].
3) Mix Zones
Beresford introduced a new approach as Mix Zone for
privacy location protection in mobile computing system [14].
Main theme of Mix zone was to conceal the precise location
position of mobile user in his current locating region just like
showing that No existing in this area. Once a mobile user
enters in a mix zone area, his ID is shuffled by all other users
belonging to that particular zone and the user’s precise location
is protected. The major challenge for this approach is that an
eavesdropper can easily find out the sensitive data of multiple
mobile users through limited mix zone area [15].
4) Position Dummies
Leading to privacy location protection in LBS system, a
new approach was introduced as Position Dummies. The
fundamental principle of position dummies approach is that,
user sends his actual position along with number of dummy
location where mobile user precise information is
indistinguishable [16]. Once user change his position from A to
B with (x, y) coordinates, he posts a new query by sending his
current position along with new dummies according to new
place as shown in Fig. 4.
Fig. 4. Dummies on changing position.
In past, it has been remained a major challenge for dummy
position that how to generate the number of dummies that have
to post along user query to find any route path or POI [17],
[26]. Later on, this challenge was overtaken by introducing
different tools to generate these dummies [18]. In this paper,
we also have proposed an efficient algorithm to generate the
dummies at user end and then post to LBS along actual data.
Position dummies have been considers the most approachable
technique to secure the user’s precise location information. In
our proposed AES-RS approach, we have implemented
position dummies technique and made a secured route server
approach for location based services in road network as
discussed in other section.
The remainder of the paper is organized as follows. Section
II describes related work, while the proposed AES-RS
approach is discussed in Section III. In Section IV, we have
discussed the implementation and results. Finally, Section V
discusses the conclusion and future work directions.
Cryptograp
hy
Symmetr
ic
Asymmetr
ic
CB
C
DE
S
RS
A
Digital
Signature
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 8, No. 8, 2017
364 | P a g e
www.ijacsa.thesai.org
II. RELATED WORK
In this section, we have illustrated the existing approaches
utilized by others, advantages, limitations and future
perspective directions to provide privacy for location
protection of these approaches.
W. Sun, C. Chen and B. Zheng [19] emphasized road
networks query processing approach. They proposed Network
Partition Indexing (NPI) an Air Indexing that was supportive
for spatial queries such as Range Query, CNN Query and kNN
query. The basic idea of NPI was the processing of these
spatial queries on road network by splitting the whole road
network into small number of regions. They consider the road
network concerning area as a grid G, and make its partition
into number of cells where some information like upper and
lower limit of each cell, border point and data segment was
pre-computed to utilized in future query processing. Once
mobile user posted any spatial query for a POI or route path,
using these precomputed parameters, server broadcast the
results in response through wireless network. They
implemented NPI approach in real application and evaluated
valued results. The one major challenge using this NPI
approach was lost of information in case of link error over the
network. They considered error-resilient and efficiency as
future related challenges.
Z. Shao, D. Taniar and K. Adhinugraha presented Range-
kNN queries supportive approach for privacy protection in
[20]. The proposed algorithm was basically consisting of two
major parts. In first part, they presented a new approach as
Landmark Tree (LT) that was used to discover an appropriate
landmark area by concealing the actual user’s actual position.
For LT, only a radius as parameter was required from mobile
user for Range-kNN query implementation. After discovering
the query range, another part as search algorithm was
implemented to find out the most nearest neighbor from LT. In
shortly, first part is responsible to find position inside the query
range whereas second part is responsible to discover the
location position from outside the range such as iNN (i > 1).
The proposed algorithm was implementable limited to static
objects but not for complex moving objects in real time
applications.
B. Niu et al introduced Cashing-Based approach for
location privacy protection of user’s position in Location
Based Service system [21]. Cashing based approach leads
basically two algorithms such as CaDSA that was related to k-
anonymization to improve privacy through utilizing cashing
dummy selections. Leading to CaDSA the author discovers
some other performance effecting attributes such as how to
normalize distance and how we can make sure the data
freshness. Leading to privacy enhancement, the second
algorithm called enhanced CADSA was proposed.
Admittedly, the proposed algorithms provide privacy in
location but the overhead of frequent queries to LBS makes the
system performance down.
In [22], [23], the authors emphasized on location
monitoring challenge for real time distributed system in mobile
environment. According to author, the mobile objects should
itself be responsive rather than increasing load on central
server for objects related computation. In order to develop such
a responsive system, they make a set of assumptions such
follows:
The Moving Objects (MOs) have ability to locate its
position.
MOs have ability to determine their velocity vector.
All MOs existing in mobile environment have ability of
computation for assigning tasks.
There is a synchronized clock among MOs.
They considered that in mobile computing system a
distributed approach should be discovered that support
continues moving queries along moving objects and proposed
MobiEyes. Furthermore, they brought in some optimization
approaches constrict self-computation power at MOs end.
Admittedly, the proposed approach is valuable but assumptions
for such system are still challenges and future work for LBS
system.
More on privacy protection, as discussed above Route-
Server approach is one of the most efficient and accurate query
results providing approach in LBS road networks. But the
major challenge for RS was privacy protection of mobile user’s
precise information from adversary who can infer the faulty
information in real data when a mobile user wants to post a
spatial query for any route path or POI. We grouped privacy
goal as G3 in above section.
Leading to G3, Privacy protection is another major
challenge for LBS in road networks as it is very common
practice to send some personal information when user issues
any query for some POI information such as cinemas, bars,
friend’s location or any route path on a road network. For
instance, Let’s have a set Q of queries {q1, q2, q3 … qn} where
each q Q belongs to Q set and posted as a route query, it will
allow to an adversary to infer some false information by
revealing mobile user’s precise information [4] which is a big
challenge for Route Server approach. In order to improve the
privacy factor in Route Server algorithm we have proposed
AES-RS a new secure approach presented in next section.
III. AES-RS SYSTEM MODEL
This section consists of proposed AES-RS system
architecture which is essentially enhanced Route Server
Architecture. One of the major components of AES-RS model
is middleware Location Server that must be considered
carefully. However before moving toward AES-RS model, we
must introduce briefly the common models of location servers
(LS) that are being used in LBS system [27], [28], 30]. These
models are assorted into three basic categories including
Untrusted Location Server (ULS), Trusted Location Server
(TLS) and Peer to Peer based network (P2P) [29] where each
model consist of three components as Mobile User Devices,
Location Server and clients. In basic scenario each client
interact with location server for desired POI or location
finding, Location server further contact with clients to get the
requested position. From Fig. 5(a) that elaborates the untrusted
location server model, Fig. 5(b) shows the trusted location
server using anonymizer that ensure trustworthy to deal with
dummy position based request model or k-anonymity model
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 8, No. 8, 2017
365 | P a g e
www.ijacsa.thesai.org
and Fig. 5(c) describes the third option as peer to peer network
where each mobile user could interact with other mobile users
or devices to find out the desired location or POI [8].
(a) (b) (c)
(a) Untrusted Location Server. (b) Trusted Location Server using anonymizer.
(c) Peer to peer network.
Fig. 5. Common LBS models.
Subsequently AES-RS is dummy position based model
where a request is made along with number of dummy
positions, however based on model features, we have selected
second option as Trusted Location Server to ensure the
provision of locations to mobile devices or users with privacy.
A. AES-RS System Arcitecture
AES-RS (Secured Route Server) architecture is
enhancement by location privacy perspectives in Route Server
Architecture proposed by [6]. AES-RS system architecture
consists of three major entities such as mobile user, LBS and
Route API. In AES-RS, mobile user part is now differ as in RS
architecture as shown in Fig. 6. We implemented dummy
position approach to protect user’s location privacy where a
mobile user locating to grid area G post a query q along
multiple dummies to AES-RS for any route path or POI. AES-
RS executes that query, find out the required results from local
Log L if find then return the required query results to user
otherwise call Route API for the latest results.
In order to approach the goals G3 discussed in previous
section, we have modified the definition 2 as query results
for range and KNN query. Let’s a query q a set of dummy
positions along actual location locating to Grid G and having
time limited T, the results for Range query is:
Q = {k1, k2, k3 ….. kn} then the query resulting
definition should be modified q by Q, considering the multiple
positions instead of single actual position. However,
       
And for KNN with K size
            
   
According to our AES-RS approach, before posting query
to LBS, measure the minimum (L lower limit) and maximum
(U upper limit) width and height of the specific area called grid
G. The purpose to determine (L, U) coordinates is to make
partition of G into equal number of cells Ci. Each cell (E,
V) C representing that cells are connected through set of V
Vertices and E Edges where (v V) and (e E) as shown in
Fig. 7. Further to generate dummy positions, vertices are
calculated beyond each cell and one cell position is attached to
mobile user’s actual position. Finally, an array is generated that
contained all dummy K positions and index of actual user’s
position by following the proposed algorithm DDA (Dummy
Data Array.
Input: User location (X, Y), Anonymous_Area A,
Anonymity_Number K;
Output: array[K(x,y) + (X,Y)]
Procedure:
1: G(L, U) \\ Calculate Both Height and Width, U,L limit.
2: C ←  \\ Calculate Number of cells in G
3: (V,E) C \\ Determine vertices and edges of each cell.
4: Px ← Random (0, v(C-1)) , Py= ← Random (0, v(C-1))
5: array[0 to C][ 0 to C] \\ Initialize 2-D array
6: i = 0, j =0 , x,y=0 \\ Initialize values upto x-axis, y-axis
7: While (i < (C-1)) \\ Fill array with dummy positions
8: While (j < (C-1))
9: if ( Ci.posX != X and Cj.posY != Y)
10: x ← C.posX , y ← C.posY
11: array[i][j] ← x , y
12: j ++; // Repeat step 8
13: end if
14: end loop
15: i ++; // Repeat step 7
16: end loop
17: add Px,Py in array
18: Return array
Fig. 6. RES-RS system arcitecture.
Algorithm: DDA (Dummy Data Array)
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 8, No. 8, 2017
366 | P a g e
www.ijacsa.thesai.org
Fig. 7. Grid partition into cells.
According to DDA algorithm, it takes three input
parameters as (X,Y) coordinates of user locating at current
position, anonymous area A which is required to generate
anonymity data and K number of dummies which are required
to generate. It consider the anonymous area A as grid G and
first calculate the upper and lower limits of whole anonymous
area with respect to height and width denoted as ˂Min_X/
Min_Y, Max_X / Max_Y>. By using computed LU limits,
anonymous area A partitioned into equal number of cells (Ci
G) according to given input number of K as in equation 2 that
was discovered by equation 3.
|C1|C2|C3|C4|- - - - - |Cn| = 1 (2)
Number of Cells =  (3)
Once, number of cells are defined, it calculates the vertices
and edges beyond each cell mentioned in step 3. Now, assign
the mobile user’s current location (Px, Py) to one random cell
from G. Next, declare an array that will contain all the dummy
positions and fill it according to number of cells because each
cell is located with one dummy position. Once the array with
dummy positions is filled, it adds the index of user’s actual
position in array and return.
B. AES-RS for Spatial Queries
As AES-RS is supportive for spatial queries such as Range
query and KNN query as well. In this section, we present the
consequences of Secured Route Server approach for spatial
queries for a given query point q, along with a value d and data
set P that reduce the number of requests. As described above,
for AES-RS approach, we have used a Trusted Location Server
(TLS) which ensure that only actual query request posted from
mobile device to TLS along with set of dummy locations array
will be computed to determine the POI or desired location.
However, there will not be any change in spatial queries.
For range query in AES-RS, it first comport the distance
range search for data set P on G road graph from q query point,
denoted as range (q, d, P) = {o | o P ˄ || o, q || d} and
then store the retrieved results from range in a set R. Similarly
for KNN query with given query point q with data set P on G
road network, a K Nearest Neighbor (KNN) query determine
the k objects in P whole network distance which is represented
as follows:
            

   
Unlike range query, KNN query doesn’t have the fixed area
for searching and contingent upon the current location of query
point q and k value it find out the candidate point by defining
upper and lower bounds.
C. AES-RS Effects on Accuracy
The one objective of RS algorithm was to provide accurate
query results. As accuracy assurance in RS algorithm was
achieved by calling route API frequently to get most updated
query results and generate log L for Ѱt routes that is validate
till expiry time otherwise expire routes Ѱt. In case of
dummies along actual position, certainly it requires larger
space to manage log L but no effect on accuracy in query
results. However we can manage L by adding more memory
space in the system.
D. AES-RS Effects on Effecincy
Efficiency was another essence factor in AES-RS and
achieved by maintaining Ѱt routes log L. Definitely, it will
affect on query response time because of requiring number of
locations, doesn’t matter it is dummy or actual location, LBS
processing is required. But powerful approach as log L, POI
and Road Network G at LBS maintain route path and minimize
the overhead of frequent route API calling.
IV. EXPEREMENTAL AND RESULTS
In this section we demonstrated our AES-RS approach and
simulated to evaluate performance after enhancing RS
approach by privacy factor. We used Riverbed Modeler
academic edition 17.5 simulator tools that can be used to drive
accuracy and performance in real network applications. Its old
name was OPNet Modeler [24]. In our experiments, we used
france_highway road network map provided in riverbed
modeler. Further we selected multiple nodes as actual user
location where he wants a route path to find out the nearest
ATM from his current location using over the road network. In
order to protect his precise information as current location, we
draw multiple dummy positions (k-1) then posted a query
containing actual location along generated dummy positions to
LBS server through a wireless network. The tenure in which
multiple queries were posted to LBS and it respond back with
query results was evaluated by setting 1 week duration. By
following a basic wireless network routing approach, we used
two Ethernet routers and sixteen dummy nodes from different
locations were connected to each, which is further linked to an
Ethernet switch and it post user’s query to LBS for query
results. Fig. 9 illustrates the rate at which data packets are
being received by LBS server sending from Ethernet switch.
The delay in transferring data packets to LBS server were
calculated by using “Little’s theorem” [25].
N (t) = A (t) + B (t) and t 0 (4)
Where A (t) is the number of data packets which are arrived
at in time (0, t) and B (t) is the number of data packets that are
depart from source location in time (0, t).
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 8, No. 8, 2017
367 | P a g e
www.ijacsa.thesai.org
Fig. 8. Data transferring rate to LBS.
We observed that there were some other constituents like
data transferring rate as shown in Fig. 8, the delay at Ethernet
or wireless communication which could be cause of decreasing
AES-RS system performance. In our case as shown in Fig. 9,
during query transmitting over the network, delay size is very
small in Ethernet and wireless which couldn’t be reason to
decrease system performance. In Ethernet, it becomes constant
at a certain level by assuming that loss ratio in data packet is
consistently zero. In contrast, delay variation increase and
decrease after a certain time period which was overhead of
using LBS as single server. It could be maintained by utilizing
multiple LBS servers applying distributed approach.
The most significant part of AES-RS was to maintain LBS
performance in order to provide user’s query response
accurately and efficiently by protecting mobile user’s precise
location. We evaluated LBS server performance when multiple
query requests posted to it for any route path or POI and query
processing at server side to return query results. Graph in
Fig. 10 shows the number of requests posted to LBS server and
its response quick by using log L, POI and Road Network G
inside LBS.
Fig. 9. Delay in ethernet and wireless LAN.
Fig. 10. LBS server performance.
We also evaluated the route API data access rate depicted
in Fig. 10(a). The gradually decrease in graph 9 (a),(b) the
clearly shows the advantage of log L, POI and Road Network
G usage at server side that minimize route API hit rate due to
availability of data at LBS server side. At initial stage, due to
empty data in log it required to call route API for updated
query results that increased route API retransmission attempts
rate Fig. 10(b). But after a certain time t, when log L contained
number of query results it decrease route API attempt rate.
Furthermore, we assessed parallel route path approach
proposed in RS algorithm and implemented in our experiments.
Fig. 11(a), shows the results of data access delay through route
API where we implemented parallel route path approach at
LBS server side, it recognize firstly the required path against
any mobile query, then it evaluate the relevant queries which
are required route Path or POI from the same route. In this
way, it minimizes the data access delay along query hits to
LBS server.
Fig. 11. Route API rerensmission attempts and data access rate.
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 8, No. 8, 2017
368 | P a g e
www.ijacsa.thesai.org
V. CONCLUSION
In mobile computing environment, every LBS system
requires three primary goals such as accuracy, efficiency and
privacy. A significant research has been attempted and
delivered different LBS approaches to attain these goals. Route
Server (RS) is one of the approaches that provide LBS system
with accurate and efficient results for spatial queries. But RS
algorithm didn’t consider G3 as privacy goal to protect mobile
user’s precise information. However, by location privacy
perspectives, we proposed AES-RS architecture which is an
enhancement of RS algorithm and protect mobile user’s precise
location information from any adversary. On behalf of
adversary attacks for LBS system, we discussed different kind
attacks and various approaches to overcome these attacks. We
also highlighted the advantages and limitations in existing
approaches. After a critical analysis, we selected dummy
position approach that ensure mobile user’s privacy protection
in RS algorithm and proposed a new approach AES-RS as
Secure Route Server Architecture. As generating number of
dummies for Dummy Position approach was a major
challenge, we proposed an algorithm where dummy positions
are generated at user end. Further in term of evaluation (G1,
G2, G3) goals we simulated our approach using Riverbed
modeler and generated different results. We discussed Ethernet
and wireless WLAN as the factors that could be effective in
efficiency in LBS wireless network system. From experiment
results evaluation we can say AES-RS is an appropriate
approach for LBS system which secure the user privacy for
location protection by providing accurate and efficiently query
results. By future perspectives, it required to examine the
proposed solutions at large scale.
REFERENCES
[1] G.H. Forman, and J. Zahorjan. The challenges of mobile
computing.Computer 27.4 (1994): 38-47.
[2] W. Sun, et al. An Air Index for Spatial Query Processing in Road
Networks. Knowledge and Data Engineering, IEEE Transactions on
27.2 (2015): 382-395
[3] M. Wernke, et al. A classification of location privacy attacks and
approaches. Personal and Ubiquitous Computing 18.1 (2014): 163-175
[4] D. Zhang, C.-Y. Chow, Q. Li, X. Zhang, and Y. Xu, SMashQ: Spatial
mashup framework for k-NN queries in time-dependent road
networks,Distrib. Parallel Databases, vol. 31, pp. 259287, 2012.
[5] L. Yu, and M.Y. Lung. Route-Saver: Leveraging Route APIs for
Accurate and Efficient Query Processing at Location-Based Services.
Knowledge and Data Engineering, IEEE Transactions on 27.1 (2015):
235-249.
[6] A. Civilis, C.S. Jensen, and S. Pakalnis. Techniques for efficient road-
network-based tracking of moving objects.Knowledge and Data
Engineering, IEEE Transactions on 17.5 (2005): 698-712.
[7] G.K. Shin, et al. Privacy protection for users of location-based
services.Wireless Communications, IEEE 19.1 (2012): 30-39.
[8] W. Marius, et al. A classification of location privacy attacks and
approaches. Personal and Ubiquitous Computing 18.1 (2014): 163-175.
[9] G. Ghinita, M.L. Damiani, C. Silvestri and E. Bertino. Preventing
velocity-based linkage attacks in location-aware applications In:
Proceedings of the 17th ACM SIGSPATIAL international conference on
advances in geographic information systems (GIS ’09), Seattle,
Washington, pp 246255, 2009.
[10] M. Gruteser and D. Grunwald Anonymous usage of location based
services through spatial and temporal cloaking. In: Proceedings of the
1st international conference on mobile systems, applications and
services (MobiSys ’03), San Francisco, California, pp 31–42, 2009.
[11] J. Krumm. Inference attacks on location tracks, In: Proceedings of the
5th international conference on pervasive computing (Pervasive ’07).
Springer, Toronto, pp 127143, 2007.
[12] G.Z. Ignatov, K.K. Vladimir, and R.S. Krachunov. An improved finite-
time ruin probability formula and its Mathematica
implementation. Insurance: Mathematics and Economics 29.3 (2001):
375-386.
[13] G. Singh, and A. Supriya. A Study of Encryption Algorithms (RSA,
DES, 3DES and AES) for Information Security. International Journal
of Computer Applications 67.19 (2013): 33-38.
[14] A.R. Beresford, F. Stajano. Mix zones: user privacy in location-aware
services. In: Proceedings of the second IEEE annual conference on
pervasive computing and communications workshops (PerCom ’04
Workshops), pp 127131, (2004).
[15] M.L Yiu, C.S Jensen, J. Møller and H. Lu Design and analysis of a
ranking approach to private location-based services. ACM Trans
Database Syst 36(2):142, (2011).
[16] K.G. Shin, et al. Privacy protection for users of location-based
services. Wireless Communications, IEEE 19.1 (2012): 30-39.
[17] J. Krumm. A survey of computational location privacy. Personal and
Ubiquitous Computing 13.6 (2009): 391-399.
[18] W. Sun, et al. An Air Index for Spatial Query Processing in Road
Networks. Knowledge and Data Engineering, IEEE Transactions
on 27.2 (2015): 382-395.
[19] Z. Shao, D. Taniar, and K.A. Maulana. Range-kNN queries with
privacy protection in a mobile environment. Pervasive and Mobile
Computing (2015).
[20] B. Niu, et al. Enhancing privacy through caching in location-based
services. Proc. of IEEE INFOCOM. 2015.
[21] B. Gedik and L. Liu. Mobieyes: Distributed processing of continuously
moving queries on moving objects in mobile system.Advances in
Database Technology-EDBT 2004.Springer Berlin Heidelberg, 2004.
67-87.
[22] K. Jürgen. Continuous queries over data streams-semantics and
implementation. Diss. Universitätsbibliothek Marburg, 2007.
[23] V. Sercan, and E. ERDEM. Design and Simulation of Wireless Sensor
Network Topologies Using the ZigBee Standard. International Journal
of Computer Networks and Applications (IJCNA) 2.3 (2015).
[24] Little, D.C. John, and C.G. Stephen. Little's law. Building Intuition.
Springer US, 2008. 81-100.
[25] L. Hua, C.S. Jensen, and M.L. Yiu. Pad: privacy-area aware, dummy-
based location privacy in mobile services. Proceedings of the Seventh
ACM International Workshop on Data Engineering for Wireless and
Mobile Access. ACM, 2008.
[26] A. Monika, and P. Mishra. A comparative survey on symmetric key
encryption techniques. International Journal on Computer Science and
Engineering 4.5 (2012): 877.
[27] T. Jawahar, and N. Kumar. DES, AES and Blowfish: Symmetric key
cryptography algorithms simulation based performance
analysis.International journal of emerging technology and advanced
engineering 1.2 (2011): 6-12.
[28] P. Gilbert, L.P. Cox, J.W Jung. Toward trustworthy mobile sensing.
In: Proceedings of the 11th workshop on mobile computing systems and
applications (HotMobile ’10), Annapolis, Maryland, (2010) pp 31–36.
[29] K. Barker, M. Askari, M. Banerjee, K. Ghazinour, B. Mackas, M.
Majedi, S. Pun and A. Williams A data privacy taxonomy,
Proceedings of the 26th British national conference on databases: the
final frontier (BNCOD 26), Birmingham, UK, (2009) pp 4254.
[30] M. Gruteser and D. Grunwald, Anonymous usage of locationbased
services through spatial and temporal cloaking, in ACM MobiSys’03:
Procedings of the 1st international conference on Mobile systems,
applications and services, pp. 3142, 2003.
[31] A.R Beresford, and F. Stajano. Mix zones: User privacy in location-
aware services. Pervasive Computing and Communications
Workshops, 2004. Proceedings of the Second IEEE Annual Conference
on. IEEE, 2004.
... The networks are vulnerable to various security concerns such as intrusion, fishing, hacking, and multiple encryption methods are used to curb the same. Different attacks that compromise the basic CIA triad of network security are vulnerable to IoT environments [47]. To meet the needs of their restricted architecture, lightweight algorithms are built. ...
Research
Full-text available
Cloud computing is one of the ruling storage solutions. However, the cloud computing centralized storage method is not stable. Blockchain, on the other hand, is a decentralized cloud storage system that ensures data security. Cloud environments are vulnerable to several attacks which compromise the basic confidentiality, integrity, availability, and security of the network. This research focus on decentralized, safe data storage, high data availability, and effective use of storage resources. To properly respond to the situation of the blockchain method, we have conducted a comprehensive survey of the most recent and promising blockchain state-of-the-art methods, the P2P network for data dissemination, hash functions for data authentication, and IPFS (InterPlanetary File System) protocol for data integrity. Furthermore, we have discussed a detailed comparison of consensus algorithms of Blockchain concerning security. Also, we have discussed the future of blockchain and cloud computing. The major focus of this study is to secure the data in Cloud computing using blockchain and ease for researchers for further research work.
... The advantages of profundity are seen for all matrices in Table 3 and 4. And at the end of the day we've recommended a new ResNet 200 deeper layered model [72][73][74][75]. The other suggestion we've imposed to improve the performance and the accuracy of ResNet is by tuning the batch size and learning rate. ...
Article
As we know that how rapidly is corona virus spreading, starting from China, to all over the world. There are more than 5 million suspected cases and almost 0.33 million deaths according to the statistics of world meterinfo, and there are limited test kits available in hospitals because of cases are increasing rapidly on the daily bases. So, it is compulsory to build an authentic automatic detection system which gives maximum high performance to check whether the patient is Covid-19 suspect or not as an alternative to slow down the spread of coronavirus among people.In this research, we have used deep learning’s (DL) Convolutional neural network (CNN) and ResNet models. With a critical analysis, we conclude that every ResNet layered model has the high performance with error rate less than 3% on approximately all kinds of datasets of chest Xray images whether it includes rib shadow & clivade or after segmentation. We have proposed a new solution for existing model and to enhance the ResNet model by applying layered architecture style by adding more layers to our ResNet which will help to minimize the error rate. Further, to boost the performance of ResNet by tune up the batch size and learning rate, we achieve the learning rate 0.00001 that has higher accuracy as compared to the other learning rates 0.1, 0.01, 0.001 and 0.0001. The proposed study is promising framework for the covid detection that assist us to deal the COVID decease
... The game should have clear objectives and a feedback mechanism that allows the player to feel in control. When all of these aspects are in place, the player should feel completely immersed in it [27], [67][68][69][70][71][72][73]. In [12] authors emphasized on relation between user engagement and over the path of his/her action. ...
Article
A software game is an application that is not only applicable for entertainment purposes but also used in domains like business, education and health care. Software game development is a multidisciplinary process that involves art, sound, artificial intelligence (AI), control systems and human factors which makes it different from traditional software development practice. Distributed software development (DSD) facilitates decentralized zones for the availability of multidisciplinary human resources at less cost. Past studies explored many influencing factors for game development, however, how these factors majorly affect the game development in Distributed Software Development (DSD) environment yet not been studied as per our knowledge. In this research, we not only identified the most influencing factors for game development in DSD but also gauge a relationship matrix between these factors with games’ technical requirements. In our evaluation, we took twenty-nine top-rated animated games to establish a mapping of these factors present in these games. To calculate the variation in a given project budget, we execute Monte-Carlo simulations between the independent variable (influencing factors) and dependent variable (overall cost) that forecast the valuation of each variable impact on the overall nominal cost of the project. Empirical results of our research conclude that among all identified factors, ‘Physical Resources’ and ‘Freelancers’ have a significant impact on the overall project cost. Our research findings quantitatively assist the software project managers to estimate the cost deviations due to influencing factors in Distributed Software Development (DSD) environment.
... Machine and deep learning are useful as it gives real-time solution [5]. Many studies in the literature indicated that machine learning is very convenient to predict the air pollution level with the help of different algorithms [6], , [92][93][94][95][96]. The pollutants termed carbon dioxide, Sulfur dioxide, ozone, particulate matter, carbon dioxide, nitrogen oxide, ozone and hydrocarbon are the main causes of air pollution in the environment. ...
Article
Full-text available
The modern and motorized way of life has cultured air pollution. Air pollution has become the biggest rival of robust living. This situation is becoming more lethal in developing countries and so in Pakistan. Hence, this inquiry was carried out to propose an architecture design that could make real-time prediction of air pollution with another purpose of scanning the frequently adopted algorithm in past investigations. In addition, it was also intended to narrate the toxic effects of air pollution on human health. So, this research was carried out on a large dataset of Seoul as an adequate dataset of Pakistan was not attainable. The dataset consisted of three years (2017-2019) including 647,512 instances and 11 attributes. The four distinctive algorithms termed Random Forest, Linear Regression, Decision Tree and XGBoosting were employed. It was inferred that XGB is more promising and feasible in predicting concentration level of NO2, O3, SO2, PM10, PM2.5 and CO with the lowest RMSE and MAE values of 0.0111, 0.0262, 0.0168, 49.64, 41.68 and 0.1856 and 0.0067, 0.0096, 0.0017, 12.28, 7.63 and 0.0982 respectively. Furthermore, it was found out as well that the Random Forest was preferred mostly in the previous studies related to air pollution prophecy while many probes supported that air pollution is very detrimental to human health especially long-lasting exposure causes lung cancer, respiratory and cardiovascular diseases.
... For this design pattern, we recommend employing the Advanced Encryption Standard (AES) (Daemen and Rijmen, 1999). AES is currently a U.S. Government standard for data encryption, used in leading secure communication platforms, e.g., Signal, and has been studied by a range of location researchers (Kachore et al., 2015;Alrahhal et al., 2017). The benefit of such a standard is that it provides a reasonable trade-off between speed of encryption/decryption and security. ...
Article
Full-text available
Concern over the privacy of our personal location is at an all‐time high, yet the desire to share our lives with friends, family, and the public persists. Current methods and applications for sharing location content with the range of people in our lives are sorely lacking. Application users are often limited to sharing a single spatial resolution with all individuals, regardless of relation, and with little control over how this content is shared. Processes for sharing typically involve allowing a for‐profit company access to one’s location before it can be transmitted to the intended recipient. In this work we propose a set of design goals and a design pattern for sharing personal location information that are realized through a prototype mobile web application. Our approach is built on the novel idea of obfuscated and encrypted location views, and promotes a uniquely open method for sharing. The intention of this article is to demonstrate that location sharing need not require one to expose private location information to third parties, and that methods exist to put an individual back in control of their content.
... Recently, Fog computing has been used like Trusted Third Party (TTP) instead of depending on the cloud only [21], [22]. Dummy: The user camouflages himself by sending a lot of false information to the service provider, but such methods may cause an additional load on the user on the one hand and may not suit many applications that require the correct information about the user [23], [24]. ...
... Dummy misleads the SP, where the user sends a set of fake queries beside his real one to the SP [29], [30]. ...
Article
In a retail industry, sales forecasting is an important part related to supply chain management and operations between the retailer and manufacturers. The abundant growth of the digital data has minimized the traditional system and approaches to do a specific task. Sales forecasting is the most challenging task for the inventory management, marketing, customer service and Business financial planning for the retail industry. In this paper we performed predictive analysis of retail sales of Citadel POS dataset, using different machine learning techniques. We implemented different regression (Linear regression, Random Forest Regression, Gradient Boosting Regression) and time series models (ARIMA LSTM), models for sale forecasting, and provided detailed predictive analysis and evaluation. The dataset used in this research work is obtained from Citadel POS (Point Of Sale) from 2013 to 2018 that is a cloud base application and facilitates retail store to carryout transactions, manage inventories, customers, vendors, view reports, manage sales, and tender data locally. The results show that Xgboost outperformed time series and other regression models and achieved best performance with MAE of 0.516 and RMSE of 0.63.
Article
Full-text available
In a retail industry, sales forecasting is an important part related to supply chain management and operations between the retailer and manufacturers. The abundant growth of the digital data has minimized the traditional system and approaches to do a specific task. Sales forecasting is the most challenging task for the inventory management, marketing, customer service and Business financial planning for the retail industry. In this paper we performed predictive analysis of retail sales of Citadel POS dataset, using different machine learning techniques. We implemented different regression (Linear regression, Random Forest Regression, Gradient Boosting Regression) and time series models (ARIMA LSTM), models for sale forecasting, and provided detailed predictive analysis and evaluation. The dataset used in this research work is obtained from Citadel POS (Point Of Sale) from 2013 to 2018 that is a cloud base application and facilitates retail store to carryout transactions, manage inventories, customers, vendors, view reports, manage sales, and tender data locally. The results show that Xgboost outperformed time series and other regression models and achieved best performance with MAE of 0.516 and RMSE of 0.63.
Article
Full-text available
During the world’s challenge to confront the rapidly spreading coronavirus disease (COVID-19) pandemic and the consequent heavy losses and disruption to society, returning to normal life has become a demand. Social distancing, also known as physical distancing, plays a pivotal role in this scenario. Social distancing is a practice to maintain a safe space between a person and others who are not from the same household, preventing the spread of contagious viral diseases. To support this case, several public authorities and governments around the world have proposed social distancing applications (also known as contact-tracing apps). However, the adoption of these applications is arguable because of concerns regarding privacy and user data protection. In this study, we present a comprehensive survey of privacy-preserving techniques for social distancing applications. We provide an extensive background on social distancing applications, including measuring the physical distance between people. We also discuss various privacy-preserving techniques that are used by social distancing applications; specifically, we thoroughly analyze and compare these applications, considering multiple features. Finally, we provide insights and recommendations for designing social distancing applications while reducing the burden of privacy problems.
Article
Full-text available
Nowadays, the use of internet are growing increasingly across the world, security becomes a prime concern of issue for the society. Earlier security was a major issue for military applications but now the area of applications has been enhanced since most of the communication takes place over the web. Cryptography is an area of computer science which is developed to provide security for the senders and receivers to transmit and receive confidential data through an insecure channel by a means of process called Encryption/ Decryption. Cryptography ensures that the message should be sent without any alterations and only the authorized person can be able to open and read the message. A number of cryptographic techniques are developed for achieving secure communication. There are basically two techniques of cryptography-Symmetric and Asymmetric. This paper presents a detailed study of most of the symmetric encryption techniques with their advantages and limitations over each other.
Article
With the help of location-based services (LBS), mobile users are able to access their actual locations, which can be used to search for information around them which they are interested in. One typical thing is that mobile users are more likely to protect their personal information such as their actual locations. In order to protect the privacy of users’ personal information, we proposed Range- NN queries, which uses the query range instead of one single query point. A Landmark Tree (LT), which indexes all the location information, is used to hide the actual user location in a specific radius. Through this LT, the query range, which covers the actual user location, is sent to the server for processing instead of the actual user location. In the evaluation part, our algorithm is proved to be more precise than range queries, and the overall search performance is quite efficient.
Article
Spatial queries such as range query and kNN query in road networks have received a growing number of attention in real life. Considering the large population of the users and the high overhead of network distance computation, it is extremely important to guarantee the efficiency and scalability of query processing. Motivated by the scalable and secure properties of wireless broadcast model, this paper presents an air index called Network Partition Index (NPI) to support efficient spatial query processing in road networks via wireless broadcast. The main idea is to partition the road network into a number of regions and then build the index to carry some pre-computation information of each region. We also propose multiple client-side algorithms to facilitate the processing of different spatial queries such as kNN query, range query and CNN query. A comprehensive experimental study has been conducted to demonstrate the efficiency of our scheme.
Article
Location-based services (LBS) enable mobile users to query points-of-interest (e.g., restaurants, cafes) on various features (e.g., price, quality, variety). In addition, users require accurate query results with up-to-date travel times. Lacking the monitoring infrastructure for road traffic, the LBS may obtain live travel times of routes from online route APIs in order to offer accurate results. Our goal is to reduce the number of requests issued by the LBS significantly while preserving accurate query results. First, we propose to exploit recent routes requested from route APIs to answer queries accurately. Then, we design effective lower/upper bounding techniques and ordering techniques to process queries efficiently. Also, we study parallel route requests to further reduce the query response time. Our experimental evaluation shows that our solution is three times more efficient than a competitor, and yet achieves high result accuracy (above 98 percent).
Article
In recent years, location-based services have become very popular, mainly driven by the availability of modern mobile devices with integrated position sensors. Prominent examples are points of interest finders or geo-social networks such as Facebook Places, Qype, and Loopt. However, providing such services with private user positions may raise serious privacy concerns if these positions are not protected adequately. Therefore, location privacy concepts become mandatory to ensure the user’s acceptance of location-based services. Many different concepts and approaches for the protection of location privacy have been described in the literature. These approaches differ with respect to the protected information and their effectiveness against different attacks. The goal of this paper is to assess the applicability and effectiveness of location privacy approaches systematically. We first identify different protection goals, namely personal information (user identity), spatial information (user position), and temporal information (identity/position + time). Secondly, we give an overview of basic principles and existing approaches to protect these privacy goals. In a third step, we classify possible attacks. Finally, we analyze existing approaches with respect to their protection goals and their ability to resist the introduced attacks.
Article
The k -nearest-neighbor ( k -NN) query is one of the most popular spatial query types for location-based services (LBS). In this paper, we focus on k -NN queries in time-dependent road networks, where the travel time between two locations may vary significantly at different time of the day. In practice, it is costly for a LBS provider to collect real-time traffic data from vehicles or roadside sensors to compute the best route from a user to a spatial object of interest in terms of the travel time. Thus, we design SMashQ, a server-side spatial mashup framework that enables a database server to efficiently evaluate k -NN queries using the route information and travel time accessed from an external Web mapping service, e.g., Microsoft Bing Maps. Due to the expensive cost and limitations of retrieving such external information, we propose three shared execution optimizations for SMashQ, namely, object grouping , direction sharing , and user grouping , to reduce the number of external Web mapping requests and provide highly accurate query answers. We evaluate SMashQ using Microsoft Bing Maps, a real road network, real data sets, and a synthetic data set. Experimental results show that SMashQ is efficient and capable of producing highly accurate query answers.