1 / 31

Location based Social networking challenges and solutions

Location based Social networking challenges and solutions. AyESHA Begum MOUNIKA KOLLURI Sravani Dhanekula. Outline. INTRODUCTION EXAMPLES OF LBSN APPLICATIONS PROS AND CONS OF LBSN MOTIVATION SELECTED PAPERS

monita
Télécharger la présentation

Location based Social networking challenges and solutions

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Location based Social networking challenges and solutions AyESHA Begum MOUNIKA KOLLURI SravaniDhanekula

  2. Outline • INTRODUCTION • EXAMPLES OF LBSN APPLICATIONS • PROS AND CONS OF LBSN • MOTIVATION • SELECTED PAPERS • MEASURING USER ACTIVITY ON AN ONLINE LOCATION BASED SOCIAL NETWORK. • PLACE RECOMMENDATION FROM CHECK-IN SPOTS ON LBSN. • LOCATION CHEATING ON LBSN. • COMPARISON & ANALYSIS • CONCLUSION • REFERENCES

  3. Introduction: • LBSN is a location based service that utilizes location information to facilitate social networking. • LBSN is the convergence between location based services (LBS) and online social networking (OSN). • LBSN applications offer users the ability to look up the location of another “friend” remotely using a smart phone, desktop or other device, anytime and anywhere. • They allow users to check-in at places and share their location with friends, thereby providing a new facet of user online behavior.

  4. Examples of LBSN Applications

  5. PROS &Cons of LBSN PROS: • It is the best means to share what we are doing and where we are at. • Nearby, locations like restaurants, parks, zoo's can be easily found out. CONS: • LBSN lacks privacy of an individual and exposes user’s information.

  6. Motivation • A measurement study of user activity is needed in order to know how users connect with friends and also how they check- in at different places on online location-based social network with hundreds of thousands of users in it. • People generally don’t know the interesting locations when they go to new place. So, the social networking sites must be able to recommend places to them based on their area of interest gathered from previous check-ins. • Location-based social network services must be able to keep track of the users who cheat on their location information.

  7. Measuring User Activity on an OnlineLocation-based Social Network • The main aim of the paper is to present a measurement study of user activity on a popular Online Location Based Social Network. • The paper mainly investigates user activity by analyzing not only the number of friends user has, but also the number of check-ins made and the places visited.

  8. Existing and Proposed Approach Existing Approach: • User Activity measurement is focused mainly on number of friends user has. Proposed Approach: • User activity is measured based on three factors • Adding Online Friends • Making Check-ins • Visiting new places

  9. Methodology Proposed • Complete data set of users is collected through a public API. • User activity is measured, based on adding online friends, making check-ins and visiting new places. Probability distribution of these factors with respect to a user are plotted individually. • Based on the dates of both the earliest and the latest check-in that a user has made, account age and activity span of the user are estimated. • The user activity age and user account age are plotted graphically based on Complementary Cumulative Distribution Function (CCDF).

  10. Experimental Analysis • From the graphical analysis done in the paper, it states that • It appears easier and quicker to accumulate friends than to accumulate new places and check-ins. • It has been derived that an account which has been active for a longer period is more likely to accumulate more friends, check-ins and places than an account only active for a shorter amount of time. • User account life span decays faster than exponentially.

  11. Place Recommendation from Check- in Spots on lbsN • The paper mainly discusses about a user-based collaborative filtering method to make a set of recommended places for a user, in which similarity of users is calculated and similar users’ records are used to predict places the user likes. • In addition to this,similarity of users check-in activities is calculated not only on their positions but on their semantics like shopping, eating, drinking, etc.

  12. existing APPROACH • In Collaborative Filtering Based Approach, an item is recommended to a user based on past information of the people with similar tastes and preference. • In Personalized Recommender Approach ,check-in information is crawled to generate a user/spot rating matrix. By predicting the interest of users in certain spots, this technique recommends places users have not been visited previously.

  13. Proposed approach • All of the existing methods do not consider the issue of the semantics of GPS location. • In the proposedmethod • Firstly the names of the noted places are attached to GPS location data and hierarchical category graph framework is built. • Recommendation of places is done by applying a typical CF approach that was not applied previously

  14. Description about Check in Records • SINA microblog is used as a data source to collect user’s check in spots. .

  15. Methodology • Density-based clustering method cluster’s all of users’ check in spots into several regions. • In the next step, for each cluster, the gravity center of member’s position is calculated ittorepresent the position of the cluster . • Each cluster is annotated by using POIs database. Then a semantic hierarchical category-graph framework is applied to analyze users’ interests and similarity score between clusters. • Top-N similar users are selected and the users’ records are used for user-based collaborative filtering. Based on this, some unvisited places are recommended.

  16. Figure showing Semantic Hierarchical Framework

  17. Experiments & Analysis • SINA microblog, is used , among them, 268 users who checked in more than 25 times are selected. • In the clustering analysis ,the neighborhood radius ε actually equals to distance50 meters, • After the clustering, Foursquare database is used asPOIs data to annotate clusters.

  18. Experimental results with various recommender places from different top-N similar users.

  19. Location Cheating: A Security Challenge to Location-based Social Network Services • The paper mainly discusses about the location-based mobile social network's which generally attract more no of user's, in order to provide real-world rewards to the user, when a user checks in at a certain venue or location. • This gives incentives for the cheaters to cheat on their locations. • Reasons for Location cheating • Lack of proper location verification mechanisms. • Loosely regulated anti cheating rules.

  20. Proposed Methodology • Firstly, the threat of location cheating attacks is identified. • Secondly, the root cause of the vulnerability is found out, and possible defending mechanisms are outlined. • Foursquare is used as an example to introduce a novel location cheating attack. In addition to this, the foursquare website is crawled. • The crawled data is analyzed, in order to prove that the automated large scale cheating is possible.

  21. Cheater Code • It is used to defend against the location cheating attacks. • Function: It is to verify the location of a device by using the GPS function of that device. • When a user claims that he/she is currently in a location far away from the location reported by the GPS of his/her phone, the check-in will be considered invalid and won’t yield any rewards.

  22. Criteria For Cheater Code • Criteria used in determining location cheating in the cheater code is as follows • Frequent check-ins: This rule prevents a user from checking in frequently to get as many points as possible • Super human speed: This rule limits location cheating by a single user to a small geographic area. • Rapid-fire check-ins: This rule stops a user from checking into multiple venues in a small area and within a short time period.

  23. different levels of cheating Attack: • Location Cheating Against G.P.S Verification: An attacker blocks the information provided by the GPS and feeds fake location information to the LBS application, thereby making the server believe that it is in fake location. • Crawling Data: By changing the ID in the URL, almost all of the user information and venue profiles is crawled. This is a serious security weakness and should be patched soon.

  24. Illustration Of Location Cheating

  25. Different Levels Of Cheating attack • Automated Cheating: • Location coordinates of victim venues are found out by computer program. • List of venues that need to be checked-in are selected automatically by analyzing the cheater code. • Cheating With Venue Profile Analysis • Location cheaters gain intelligence from the venue analysis after the crawling.

  26. Experiment Analysis of Location Cheating on Four Square • Above Normal Level of Activity:High ratio of recent check-ins to total check-ins of a user indicates that it is likely a user plays tricks to stay in the recent visits list, which is a sign of cheating. • Below Normal level of Rewards: User having a large amount of check-ins but little rewards indicates that user is detected as a cheater. • Suspicious Check-in Patterns: Check-in pattern or history is examined to tell if a user is a location cheater through further analysis of the crawled data.

  27. Possible Solutions Based on Experiments • Location Verification Techniques: • Address Mapping • Venue Side Location Verification • Mitigating Threat from Location Cheating • Access control for Crawling • Hiding information from profiles

  28. Comparison And Analysis

  29. Conclusions • All the three papers discussed on location-based services which utilize the geographical position to enrich user experiences in a variety of contexts. • The papers conclude that Location based Features can effectively measure user activity, recommend unvisited places and also detect threat of location cheating attacks.

  30. References: • Scellato, S.; Mascolo, C. Measuring user activity on an online location-basedsocial network Computer Communications Workshops (INFOCOM WKSHPS), 2011 IEEE Conference on Topic(s): Communication, Networking & Broadcasting ;Components, Circuits, Devices & Systems ; Computing & Processing (Hardware/Software) ; Engineering Profession ;General Topics for Engineers (Math, Science & Engineering) ;Signal Processing & Analysis Digital Object Identifier: 10.1109/INFCOMW.2011.5928943 Publication Year: 2011 , Page(s): 918 - 923 Cited by 1 • Hongbo, Chen; Zhiming, Chen; Arefin, Mohammad Shamsul; Morimoto, Yasuhiko Place Recommendation from Check-in Spots onLocation-Based Online Social Networks Networking and Computing (ICNC), 2012 Third International Conference on Topic(s): Communication, Networking & Broadcasting ;Components, Circuits, Devices & Systems ; Computing & Processing (Hardware/Software) Digital Object Identifier: 10.1109/ICNC.2012.29 Publication Year: 2012 , Page(s): 143 – 148 • Wenbo He; Xue Liu; Mai RenLocation Cheating: A Security Challenge toLocation-Based Social Network Services Distributed Computing Systems (ICDCS), 2011 31st International Conference on Topic(s): Communication, Networking & Broadcasting ;Computing & Processing (Hardware/Software) Digital Object Identifier: 10.1109/ICDCS.2011.42 Publication Year: 2011 , Page(s): 740 - 749 Cited by 2

  31. Thank You

More Related