LOCATION BASED SOCIAL NETWORKING CHALLENGES AND SOLUTIONS AYESHA BEGUM MOUNIKA KOLLURI SRAVANI DHANEKULA.

Slides:



Advertisements
Similar presentations
Location-Based Social Networks Yu Zheng and Xing Xie Microsoft Research Asia Chapter 8 and 9 of the book Computing with Spatial Trajectories.
Advertisements

Mining User Similarity Based on Location History Yu Zheng, Quannan Li, Xing Xie Microsoft Research Asia.
Location Cheating: A Security Challenge to Location- based Social Network Services Wenbo He 1, Xue Liu 2, Mai Ren 1 1 University of Nebraska-Lincoln 2.
UNDERSTANDING VISIBLE AND LATENT INTERACTIONS IN ONLINE SOCIAL NETWORK Presented by: Nisha Ranga Under guidance of : Prof. Augustin Chaintreau.
Yu Zheng, Lizhu Zhang, Xing Xie, Wei-Ying Ma Microsoft Research Asia
Chen Cheng1, Haiqin Yang1, Irwin King1,2 and Michael R. Lyu1
A reactive location-based service for geo-referenced individual data collection and analysis Xiujun Ma Department of Machine Intelligence, Peking University.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
1 © 2005 Nokia V1-MSI-SL.ppt / / SL Finding Communication Hot Spots of Location Based Postings Mobile Spatial Interaction Workshop ,
Data Mining.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Sparsity, Scalability and Distribution in Recommender Systems
Personalized Ontologies for Web Search and Caching Susan Gauch Information and Telecommunications Technology Center Electrical Engineering and Computer.
Text Mining: Finding Nuggets in Mountains of Textual Data Jochen Dijrre, Peter Gerstl, Roland Seiffert Presented by Drew DeHaas.
Click to edit Present’s Name Trends in Location-based Services Muhammad Aamir Cheema.
Knowledge Science & Engineering Institute, Beijing Normal University, Analyzing Transcripts of Online Asynchronous.
BOTNETS & TARGETED MALWARE Fernando Uribe. INTRODUCTION  Fernando Uribe   IT trainer and Consultant for over 15 years specializing.
Chapter 12 (Section 12.4) : Recommender Systems Second edition of the book, coming soon.
Presentation By Deepak Katta
Game Theory and Privacy Preservation in Recommendation Systems Iordanis Koutsopoulos U of Thessaly Thalis project CROWN Kick-off Meeting Volos, May 11,
A Survey on Context-Aware Computing Center for E-Business Technology Seoul National University Seoul, Korea 이상근, 이동주, 강승석, Babar Tareen Intelligent Database.
Chirag N. Modi and Prof. Dhiren R. Patel NIT Surat, India Ph. D Colloquium, CSI-2011 Signature Apriori based Network.
The 2nd International Conference of e-Learning and Distance Education, 21 to 23 February 2011, Riyadh, Saudi Arabia Prof. Dr. Torky Sultan Faculty of Computers.
Mao Ye, Peifeng Yin, Wang-Chien Lee, Dik-Lun Lee Pennsylvania State Univ. and HKUST SIGIR 11.
LCARS: A Location-Content-Aware Recommender System
Friends and Locations Recommendation with the use of LBSN
GROUP 14 Brittany Cheng Christina Guo Cong Chen Ian Ackerman Terence Tam Clayton Lord, Director of Communications and Audience Development Theatre Bay.
Planned Giving Design Center. What is the Planned Giving Design Center? National network of websites dedicated to advancing philanthropy.
Urban Point-of-Interest Recommendation by Mining User Check-in Behaviors 游晟佑
Network and Systems Security By, Vigya Sharma (2011MCS2564) FaisalAlam(2011MCS2608) DETECTING SPAMMERS ON SOCIAL NETWORKS.
© 2003 East Collaborative e ast COLLABORATIVE ® eC SoftwareProducts TrackeCHealth.
Data Mining and Machine Learning Lab Exploring Temporal Effects for Location Recommendation on Location-Based Social Networks Huiji Gao, Jiliang Tang,
Headquarters Air Mobility Command UNCLASSIFIED Unrivaled Global Reach for America … ALWAYS! HQ AMC/A6OS Cyber Surety Location-Based Services.
Mining Interesting Locations and Travel Sequences from GPS Trajectories IDB & IDS Lab. Seminar Summer 2009 강 민 석강 민 석 July 23 rd,
WALKING IN FACEBOOK: A CASE STUDY OF UNBIASED SAMPLING OF OSNS junction.
Understanding Cross-site Linking in Online Social Networks Yang Chen 1, Chenfan Zhuang 2, Qiang Cao 1, Pan Hui 3 1 Duke University 2 Tsinghua University.
Recommendation system MOPSI project KAROL WAGA
UOS 1 Ontology Based Personalized Search Zhang Tao The University of Seoul.
Sunilkumar S. Manvi and P. Venkataram Protocol Engineering and Technology Unit, ECE Dept. Indian Institute of Science Bangalore, , INDIA
Hiding in the Mobile Crowd: Location Privacy through Collaboration.
Chengjie Sun,Lei Lin, Yuan Chen, Bingquan Liu Harbin Institute of Technology School of Computer Science and Technology 1 19/11/ :09 PM.
Wang-Chien Lee i Pervasive Data Access ( i PDA) Group Pennsylvania State University Mining Social Network Big Data Intelligent.
INTERACTIVE ANALYSIS OF COMPUTER CRIMES PRESENTED FOR CS-689 ON 10/12/2000 BY NAGAKALYANA ESKALA.
Digital Citizenship Lesson 3. Does it Matter who has your Data What kinds of information about yourself do you share online? What else do you do online.
Friends and Locations Recommendation with the use of LBSN By EKUNDAYO OLUFEMI ADEOLA
Learning Geographical Preferences for Point-of-Interest Recommendation Author(s): Bin Liu Yanjie Fu, Zijun Yao, Hui Xiong [KDD-2013]
Personalization for Location-Based E-Learning Rui Zhou and Klaus Rechert Communication Systems, Dept. of Computer Science The University of Freiburg, Germany.
Personalized Course Navigation Based on Grey Relational Analysis Han-Ming Lee, Chi-Chun Huang, Tzu- Ting Kao (Dept. of Computer Science and Information.
By Gianluca Stringhini, Christopher Kruegel and Giovanni Vigna Presented By Awrad Mohammed Ali 1.
Collaborative Data Analysis and Multi-Agent Systems Robert W. Thomas CSCE APR 2013.
YOU ARE WHAT YOU EAT (AND DRINK): IDENTIFYING CULTURAL BOUNDARIES BY ANALYZING FOOD AND DRINK HABITS IN FOURSQUARE Presenter: LEUNG Pak Him.
1.Research Motivation 2.Existing Techniques 3.Proposed Technique 4.Limitations 5.Conclusion.
Search Worms, ACM Workshop on Recurring Malcode (WORM) 2006 N Provos, J McClain, K Wang Dhruv Sharma
Date: 2015/11/19 Author: Reza Zafarani, Huan Liu Source: CIKM '15
Xutao Li1, Gao Cong1, Xiao-Li Li2
Intelligent DataBase System Lab, NCKU, Taiwan Josh Jia-Ching Ying, Eric Hsueh-Chan Lu, Wen-Ning Kuo and Vincent S. Tseng Institute of Computer Science.
Intelligent DataBase System Lab, NCKU, Taiwan Josh Jia-Ching Ying 1, Wang-Chien Lee 2, Tz-Chiao Weng 1 and Vincent S. Tseng 1 1 Department of Computer.
Cryptography and Network Security Sixth Edition by William Stallings.
1 Jong Hee Kang, William Welbourne, Benjamin Stewart, Gaetano Borriello, October 2004, Proceedings of the 2nd ACM international workshop on Wireless mobile.
Speaker : Yu-Hui Chen Authors : Dinuka A. Soysa, Denis Guangyin Chen, Oscar C. Au, and Amine Bermak From : 2013 IEEE Symposium on Computational Intelligence.
Privacy-Preserving and Content-Protecting Location Based Queries.
Don’t Follow me : Spam Detection in Twitter January 12, 2011 In-seok An SNU Internet Database Lab. Alex Hai Wang The Pensylvania State University International.
Location-based Social Networks 6/11/20161 CENG 770.
TruVue LLC Visual Decision Support Tools TruVue provides location-based solutions to the healthcare industry for facility and physician network optimization.
Gang Wang, Sarita Y. Schoenebeck †, Haitao Zheng, Ben Y. Zhao UC Santa Barbara, † University of Michigan Understanding Bias and Misbehavior on Location-based.
Collaborative Filtering - Pooja Hegde. The Problem : OVERLOAD Too much stuff!!!! Too many books! Too many journals! Too many movies! Too much content!
Presented by Edith Ngai MPhil Term 3 Presentation
Location Recommendation — for Out-of-Town Users in Location-Based Social Network Yina Meng.
“Location Privacy Protection for Smartphone Users”
Social Role Evolution of an Ideological Online Community Brittany I
Presentation transcript:

LOCATION BASED SOCIAL NETWORKING CHALLENGES AND SOLUTIONS AYESHA BEGUM MOUNIKA KOLLURI SRAVANI DHANEKULA

OUTLINE  INTRODUCTION  EXAMPLES OF LBSN APPLICATIONS  PROS AND CONS OF LBSN  MOTIVATION  SELECTED PAPERS  MEASURING USER ACTIVITY ON AN ONLINE LOCATION BASED SOCIAL NETWORK.  PLACE RECOMMENDATION FROM CHECK-IN SPOTS ON LBSN.  LOCATION CHEATING ON LBSN.  COMPARISON & ANALYSIS  CONCLUSION  REFERENCES

INTRODUCTION:  LBSN is a location based service that utilizes location information to facilitate social networking.  LBSN is the convergence between location based services (LBS) and online social networking (OSN).  LBSN applications offer users the ability to look up the location of another “friend” remotely using a smart phone, desktop or other device, anytime and anywhere.  They allow users to check-in at places and share their location with friends, thereby providing a new facet of user online behavior.

EXAMPLES OF LBSN APPLICATIONS

PROS &CONS OF LBSN PROS:  It is the best means to share what we are doing and where we are at.  Nearby, locations like restaurants, parks, zoo's can be easily found out. CONS:  LBSN lacks privacy of an individual and exposes user’s information.

MOTIVATION  A measurement study of user activity is needed in order to know how users connect with friends and also how they check- in at different places on online location-based social network with hundreds of thousands of users in it.  People generally don’t know the interesting locations when they go to new place. So, the social networking sites must be able to recommend places to them based on their area of interest gathered from previous check-ins.  Location-based social network services must be able to keep track of the users who cheat on their location information.

MEASURING USER ACTIVITY ON AN ONLINE LOCATION-BASED SOCIAL NETWORK  The main aim of the paper is to present a measurement study of user activity on a popular Online Location Based Social Network.  The paper mainly investigates user activity by analyzing not only the number of friends user has, but also the number of check-ins made and the places visited.

EXISTING AND PROPOSED APPROACH Existing Approach:  User Activity measurement is focused mainly on number of friends user has. Proposed Approach:  User activity is measured based on three factors  Adding Online Friends  Making Check-ins  Visiting new places

METHODOLOGY PROPOSED  Complete data set of users is collected through a public API.  User activity is measured, based on adding online friends, making check-ins and visiting new places. Probability distribution of these factors with respect to a user are plotted individually.  Based on the dates of both the earliest and the latest check-in that a user has made, account age and activity span of the user are estimated.  The user activity age and user account age are plotted graphically based on Complementary Cumulative Distribution Function (CCDF).

EXPERIMENTAL ANALYSIS  From the graphical analysis done in the paper, it states that  It appears easier and quicker to accumulate friends than to accumulate new places and check-ins.  It has been derived that an account which has been active for a longer period is more likely to accumulate more friends, check- ins and places than an account only active for a shorter amount of time.  User account life span decays faster than exponentially.

PLACE RECOMMENDATION FROM CHECK- IN SPOTS ON LBSN  The paper mainly discusses about a user-based collaborative filtering method to make a set of recommended places for a user, in which similarity of users is calculated and similar users’ records are used to predict places the user likes.  In addition to this, similarity of users check-in activities is calculated not only on their positions but on their semantics like shopping, eating, drinking, etc.

EXISTING APPROACH  In Collaborative Filtering Based Approach, an item is recommended to a user based on past information of the people with similar tastes and preference.  In Personalized Recommender Approach,check-in information is crawled to generate a user/spot rating matrix. By predicting the interest of users in certain spots, this technique recommends places users have not been visited previously.

PROPOSED APPROACH  All of the existing methods do not consider the issue of the semantics of GPS location.  In the proposed method  Firstly the names of the noted places are attached to GPS location data and hierarchical category graph framework is built.  Recommendation of places is done by applying a typical CF approach that was not applied previously

DESCRIPTION ABOUT CHECK IN RECORDS  SINA microblog is used as a data source to collect user’s check in spots..

METHODOLOGY  Density-based clustering method cluster’s all of users’ check in spots into several regions.  In the next step, for each cluster, the gravity center of member’s position is calculated itto represent the position of the cluster.  Each cluster is annotated by using POIs database. Then a semantic hierarchical category-graph framework is applied to analyze users’ interests and similarity score between clusters.  Top-N similar users are selected and the users’ records are used for user-based collaborative filtering. Based on this, some unvisited places are recommended.

FIGURE SHOWING SEMANTIC HIERARCHICAL FRAMEWORK

EXPERIMENTS & ANALYSIS  SINA microblog, is used, among them, 268 users who checked in more than 25 times are selected.  In the clustering analysis,the neighborhood radius ε actually equals to distance50 meters,  After the clustering, Foursquare database is used as POIs data to annotate clusters.

EXPERIMENTAL RESULTS WITH VARIOUS RECOMMENDER PLACES FROM DIFFERENT TOP- N SIMILAR USERS.

LOCATION CHEATING: A SECURITY CHALLENGE TO LOCATION-BASED SOCIAL NETWORK SERVICES  The paper mainly discusses about the location-based mobile social network's which generally attract more no of user's, in order to provide real-world rewards to the user, when a user checks in at a certain venue or location.  This gives incentives for the cheaters to cheat on their locations.  Reasons for Location cheating  Lack of proper location verification mechanisms.  Loosely regulated anti cheating rules.

PROPOSED METHODOLOGY  Firstly, the threat of location cheating attacks is identified.  Secondly, the root cause of the vulnerability is found out, and possible defending mechanisms are outlined.  Foursquare is used as an example to introduce a novel location cheating attack. In addition to this, the foursquare website is crawled.  The crawled data is analyzed, in order to prove that the automated large scale cheating is possible.

CHEATER CODE  It is used to defend against the location cheating attacks.  Function: It is to verify the location of a device by using the GPS function of that device.  When a user claims that he/she is currently in a location far away from the location reported by the GPS of his/her phone, the check- in will be considered invalid and won’t yield any rewards.

CRITERIA FOR CHEATER CODE  Criteria used in determining location cheating in the cheater code is as follows  Frequent check-ins: This rule prevents a user from checking in frequently to get as many points as possible  Super human speed: This rule limits location cheating by a single user to a small geographic area.  Rapid-fire check-ins: This rule stops a user from checking into multiple venues in a small area and within a short time period.

DIFFERENT LEVELS OF CHEATING ATTACK:  Location Cheating Against G.P.S Verification: An attacker blocks the information provided by the GPS and feeds fake location information to the LBS application, thereby making the server believe that it is in fake location.  Crawling Data: By changing the ID in the URL, almost all of the user information and venue profiles is crawled. This is a serious security weakness and should be patched soon.

ILLUSTRATION OF LOCATION CHEATING

DIFFERENT LEVELS OF CHEATING ATTACK  Automated Cheating:  Location coordinates of victim venues are found out by computer program.  List of venues that need to be checked-in are selected automatically by analyzing the cheater code.  Cheating With Venue Profile Analysis  Location cheaters gain intelligence from the venue analysis after the crawling.

EXPERIMENT ANALYSIS OF LOCATION CHEATING ON FOUR SQUARE  Above Normal Level of Activity: High ratio of recent check-ins to total check-ins of a user indicates that it is likely a user plays tricks to stay in the recent visits list, which is a sign of cheating.  Below Normal level of Rewards: User having a large amount of check-ins but little rewards indicates that user is detected as a cheater.  Suspicious Check-in Patterns: Check-in pattern or history is examined to tell if a user is a location cheater through further analysis of the crawled data.

POSSIBLE SOLUTIONS BASED ON EXPERIMENTS  Location Verification Techniques:  Address Mapping  Venue Side Location Verification  Mitigating Threat from Location Cheating  Access control for Crawling  Hiding information from profiles

COMPARISON AND ANALYSIS Paper 1Paper 2Paper 3 Techniques focused on how the user activity can be effectively measured Techniques discussed for extracting the check-in spots based on user’s interest Techniques for enhancing the security of local information Experiments performed on Gowalla LBSN site Experiments performed on SINA LBSN site Experiments performed on Foursquare LBSN site It highlighted the differences in the distribution of friends, check-ins and places It recommends unvisited places by analyzing user’s interest It provides better solutions to identify possible cheaters.

CONCLUSIONS  All the three papers discussed on location-based services which utilize the geographical position to enrich user experiences in a variety of contexts.  The papers conclude that Location based Features can effectively measure user activity, recommend unvisited places and also detect threat of location cheating attacks.

REFERENCES:  Scellato, S.; Mascolo, C. Measuring user activity on an online location-basedsocial network Computer Communications Workshops (INFOCOM WKSHPS), 2011 IEEE Conference on Topic(s): Communication, Networking & Broadcasting ;Components, Circuits, Devices & Systems ; Computing & Processing (Hardware/Software) ; Engineering Profession ;General Topics for Engineers (Math, Science & Engineering) ;Signal Processing & Analysis Digital Object Identifier: /INFCOMW Publication Year: 2011, Page(s): Cited by 1Measuring user activity on an online location-basedsocial network  Hongbo, Chen; Zhiming, Chen; Arefin, Mohammad Shamsul; Morimoto, Yasuhiko Place Recommendation from Check-in Spots onLocation-Based Online Social Networks Networking and Computing (ICNC), 2012 Third International Conference on Topic(s): Communication, Networking & Broadcasting ;Components, Circuits, Devices & Systems ; Computing & Processing (Hardware/Software) Digital Object Identifier: /ICNC Publication Year: 2012, Page(s): 143 – 148Place Recommendation from Check-in Spots onLocation-Based Online Social Networks  Wenbo He; Xue Liu; Mai Ren Location Cheating: A Security Challenge toLocation-Based Social Network Services Distributed Computing Systems (ICDCS), st International Conference on Topic(s): Communication, Networking & Broadcasting ;Computing & Processing (Hardware/Software) Digital Object Identifier: /ICDCS Publication Year: 2011, Page(s): Cited by 2Location Cheating: A Security Challenge toLocation-Based Social Network Services

Thank You