You are on page 1of 5

LOCATION-BASED QUERIES IN MOBILE ENVIRONMENTS

ABSTRACT:
In location-based services, users with location-aware mobile devices are able to make
queries about their surroundings anywhere and at any time. While this ubiquitous computing
paradigm brings great convenience for information access, it also raises concerns over potential
intrusion into user location privacy. To protect location privacy, one typical approach is to cloak
user locations into spatial regions based on user-specified privacy requirements, and to transform
location-based queries into region-based queries.
We study the representation of cloaking regions and show that a circular region generally
leads to a small result size for region based queries. Moreover, the progressive query processing
mode achieves a shorter response time than the bulk mode by parallelizing the query evaluation
and result transmission.

EXISTING SYSTEM:

Existing techniques cannot be used effectively in a wireless broadcast


environment, where only sequential data access is supported.

It may not scale to very large user populations.

In an existing system to communicate with the server, a client must most likely
use a fee-based cellular-type network to achieve a reasonable operating range.

Third, users must reveal their current location and send it to the server, which may
be undesirable for privacy reasons

PROPOSED SYSTEM:

This System is a novel approach for reducing the spatial query access latency by
leveraging results from nearby peers in wireless broadcast environments.

Our scheme allows a mobile client to locally verify whether candidate objects
received from peers are indeed part of its own spatial query result set.

The method exhibits great scalability: the higher the mobile peer density, the more the
queries answered by peers.

The query access latency can be decreased with the increase in clients.

MODULE DESCRIPTION:
NETWORK MODULE:
Client-server computing or networking is a distributed application architecture that
partitions tasks or workloads between service providers (servers) and service requesters, called
clients. Often clients and servers operate over a computer network on separate hardware. A
server machine is a high-performance host that is running one or more server programs which
share its resources with clients. A client also shares any of its resources; Clients therefore initiate
communication sessions with servers which await (listen to) incoming requests.

WIRELESS BROADCASTING:
The transmission schedule in a wireless broadcast system consists of a series of broadcast
cycles. Within each cycle the data are organized into a number of index and data buckets. A
bucket (which has a constant size) corresponds to the smallest logical unit of information, similar
to the page concept in conventional storage systems. A single bucket may be carried into multiple
network packets (i.e., the basic unit of information that is transmitted over the air). However,
they are typically assumed to be of the same size (i.e., one bucket equals one packet).

LOCATION BASED SERVICES:


In location-based services, users with location-aware mobile devices are able to make
queries about their surroundings anywhere and at any time. While this ubiquitous computing
paradigm brings great convenience for information access, it also raises concerns over potential
intrusion into user location privacy. To protect location privacy, one typical approach is to cloak
user locations into spatial regions based on user-specified privacy requirements, and to transform
location-based queries into region-based queries.
Location-based services (LBS) are emerging as a major application of mobile geospatial
technologies. In LBS, users with location-aware mobile devices are able to make queries about

their surroundings anywhere and at any time. Spatial range queries and k-nearest-neighbor
(kNN) queries are two types of the most commonly used queries in LBS. For example, a user can
make a range query to find out all shopping centers within a certain distance of her current
location, or make a kNN query to find out the k nearest gas stations. In these queries, the user has
to provide the LBS server with her current location.

PRIVACY QUERY PROCESSING:


To protect location privacy, one typical approach is to cloak user locations into spatial
regions based on user-specified privacy requirements, and to transform location-based queries
into region-based queries.
For example, a user can make a range query to find out all shopping centers within a
certain distance of her current location, or make a kNN query to find out the k nearest gas
stations. In these queries, the user has to provide the LBS server with her current location. But
the disclosure of location information to the server raises privacy.
Location cloaking is one typical approach to protecting user location privacy in LBS.
Upon receiving a location-based spatial query (e.g., a range query or a kNN query) from the user,
the system cloaks the users current location into a cloaking region based on the users privacy
requirement. The location-based spatial query is thus transformed into a region-based spatial
query before being sent to the LBS server. The LBS server then evaluates the region-based query
and returns a result superset, which contains the query results for all possible location points in
the cloaking region. Finally, the system refines the result superset to generate the exact results for
the query location.

IN MODULE GIVEN INPUT AND EXPECTED OUTPUT:

The Query location and preferred criteria are the input for Mobile Host. The Mobile Host
gets the results for the corresponding location and criteria, with considerably reducing latency
while getting results from neighboring peers.