Need a project proposal for my computer science 3 course I d

Need a project proposal for my computer science 3 course. I dont even know where to start. Need a unique program proposal as well as the program itself with all header files, implementation files, and source files. Also need it commented.

In the proposal, describe what you intend to do for your project in terms of:

-general description of the problem you will be solving

-itemized list of use cases

-list of parameters that will be part of the user interface

-what structures and algorithms will you be using

Your proposal should be submitted as a Word document giving your name, project title and four sections for each of the bulleted items listed above. Each section should have one paragraph summarizing the section, followed by text or bullets detailing them. At the end should be a References section that lists any outside sources (such as a particular implementation or problem or code library) you plan on using.

Solution

HIDING IN THE MOBILE CROWD LOCATION PRIVACY THROUGH COLLABORATION
ABSTRACT
Location-aware smartphones support various location-based services (LBSs): users query the LBS server and learnon the fly about their surroundings. However, such queries give away private information, enabling the LBS to track users. A user-collaborative privacy-preserving approach is proposed for LBSs. This solution does not requirechanging the LBS server architecture and does not assume third party servers; yet, it significantly improves users’ locationprivacy. The gain stems from the collaboration of mobile devices: they keep their context information in a buffer and pass it toothers seeking such information. Thus, a user remains hidden from the server, unless all the collaborative peers in the vicinity lackthe sought information. A novel epidemic model is developed to capture possibly time-dependent,dynamics of information propagation among users. Used in the Bayesian inference framework, this model helps analyze theeffects of various parameters, such as users’ querying rates and the lifetime of context information, on users’ location privacy.The results show that our scheme hides a high fraction of location-based queries, thus significantly enhancing users’ locationprivacy. Finally, implementation indicates that it is lightweight and the cost of collaboration is negligible.


EXISTING SYSTEM
To enhance privacy for LBS users several solutions have been proposed and two main categories are
   Centralizedand
   User-centric

Centralized approaches
Centralized approaches introduce a third party inthe system, which protects users’ privacy by operatingbetween the user and the LBS. Such an intermediaryproxy server could anonymize queriesby removing any information that identifies the useror her device.
It could blend a user’squery with those of other users, so that the LBS serveralways sees a group of queries.
User-centric approaches
User-centric approaches operate on the device. Typicallythey aim to blur the location information by,for example, having the user’s smartphone submitinaccurate, noisy GPS coordinates to the LBS server.

Disadvantages
Centralized approaches
   Only shift the problem. The threat of anuntrustworthy LBS server is addressed by the introductionof a new third-party server. Additionally,new proxy servers become as attractive for attackersas centralized LBSs.

   Other centralized approaches require the LBS tochange its operation by, for example,mandating that itprocess modified queries, or that it store data differently.
   Centralized interventions or substantial changes tothe LBS operation would be hard to adopt, simplybecause the LBS providers would have little incentiveto fundamentally change their operation.
User centric approaches
   Obfuscation approaches that protect userlocation-privacy can degrade the user experience ifusers need high privacy, e.g., LBS responses wouldbe inaccurate or untimely.
   Obfuscation also is noteffective against absence disclosure.


PROPOSED SYSTEM
   Proposed system avoids the privacy problems of users by collaborate with each otherto jointly improve their privacy, without the needfor a trusted third-party (TTP).
   In effect, the mobilecrowd acts as a TTP, and the protection mechanismbecomes a distributed protocol among users.
   Mobileusers concerned about their location privacy areindeed the most motivated to engage in protectingthemselves.
   MobiCrowd, isthat users only contact the LBS server if they cannotfind the sought information among their peers, i.e.,other nearby reachable user devices.
   The places where people gather are pointsof interest, where users are most likely to query anLBS.Thus, MobiCrowd would be used exactly whereit is most effective.
Advantages
   Users canminimize their location information leakage by hidingin the crowd.
   MobiCrowd would be mosteffective when there are many peers gathered at thesame location.


Hardware requirements:
Processor : Any Processor above 500 MHz.
Ram : 128Mb.
Hard Disk : 10 Gb.
Compact Disk : 650 Mb.
Input device : Standard Keyboard and Mouse.
Output device : VGA and High Resolution Monitor.

Software requirements:

Operating System    : Windows Family.
Language     : JDK 1.5
Front End    : Java Swing
Database           : MySQL 5.0

Need a project proposal for my computer science 3 course. I dont even know where to start. Need a unique program proposal as well as the program itself with all
Need a project proposal for my computer science 3 course. I dont even know where to start. Need a unique program proposal as well as the program itself with all

Get Help Now

Submit a Take Down Notice

Tutor
Tutor: Dr Jack
Most rated tutor on our site