Skip to main content

Anonymity-based Privacy-preserving Data Reporting for Participatory Sensing ABSTRACT

Anonymity-based Privacy-preserving Data
Reporting for Participatory Sensing

Abstract:
In this paper, we propose an efficient anonymous data reporting protocol for participatory sensing, which provides strong privacy protection, data accuracy and generality. The protocol consists of two stages, namely slot reservation and message submission. In the slot reservation stage, a group of N participants cooperate to assign each member a message slot in a vector which is essentially a message submission schedule, in such a manner that each participant’s slot is oblivious to other members and the application server. In the message submission stage, each participant transmits an encoded data to the application server based on the slot information known only to herself, in such a way that the application server cannot link a data to a specific participant. With such a data reporting protocol, the link between the data and the participants is broken, and as a result, participant’s privacy is protected. We conduct theoretical analysis of the correctness and anonymity of our protocol, as well as experiments to demonstrate the efficiency in small-scale applications with periodic data sampling.

Existing System:
v In existing methods, if the application server colludes with a global eavesdropper who can monitor the traffic across the network, it can link each data with its contributor.
v Privacy in participatory sensing systems has been addressed by many works, instead of sending an accurate location to the server, spatial cloaking is employed to calculate an anonymity set.
v As a result, the user is protected. The work in also follows this idea of generalization, in which k pieces of data are combined together before sending to the server, with the intension of adding enough “confusion” in the data to make it difficult to obtain exact times and locations for the individual data.

Proposed system:
v Privacy in participatory sensing systems has been addressed by many works, instead of sending an accurate location to the server, spatial cloaking is employed to calculate an anonymity set.
v  As a result, the user is protected. The work in  also follows this idea of generalization, in which k pieces of data are combined together before sending to the server, with the intension of adding enough “confusion” in the data to make it difficult to obtain exact times and locations for the individual data.
v  The most efficient anonymous message protocol so far is proposed in , where a ((N, N)-SS) secret sharing protocol is employed for both slot reservation and data submission.
v  The computation is efficient, as it doesn’t use public key encryption. But the communication cost is very heavy.

Problem statement:
Privacy protection is an important issue in participatory sensing. We propose an anonymous data reporting protocol for participatory applications to protect user privacy. The intuition behind the protocol is that, if the data itself does not contain identification information, and we can break the link between the data and the participant that reports the data, the user’s privacy can be protected. The anonymous data reporting protocol is divided into two stages, a slot reservation stage and a data submission stage.

Implementation of modules:
                                         System architecture:


In this Anonymity-based Privacy-preserving Data Reporting for Participatory Sensing five  modules such as given below,

1. Participant module.
2. Application Server module.
3. End Users module.
4. Privacy.
5. Trusted certification authority.

Participant Module:
 particiaptor can submit online reports using public/private keys, that may be related to personal ,group,community.participator can have limitation for submitting records into the server.

Participator can perform the following works

v .participator registeration.
v participator  login.
v view profile.
v slot reservation.
v Data submission.

Application Server module:

Application server is nothing but admin after admin login, he will collect the information from the server and analyze  the reports and prepare statistics, after that view the end user requests.
Steps:

v server login.
v view participator online reports collect the statistics.
v view end user details.

Trusted Certification authority:
 We assume that each participant Pi has a private/public key pair (xi, yi), and each participant knows the public keys of all the others. Thus, all participants can identify each other by public keys. In practice, the participants apply their key pairs from a trusted certification authority whose job is to associate each individual with her public key. Or alternatively, each participant can generate the key pair herself and publish the public key at the application server, if she does not trust any authority.
Steps:
v login.
v view user requests.
v accept user slot requests and provide pair of public/private keys.

End User module:
User can view the online reports and give the feed backs according to the type of posts.
Steps:
v user registeration.
v user login.
v search
v give feed backs and suggestions.

Participatory Privacy sensing:

participating in a participatory sensing task, especially a community-scale task, could result in private information leakage. Some tasks require users to submit data containing sensitive information, for example, disease symptoms. Some applications don’t directly use sensitive data, but still result in privacy leakage. For example, in a power consumption monitoring application , from temporally fine-grained energy consumption reports submitted by users, household activities can be inferred easily. In addition, data in participatory sensing application are usually geo- and timetagged. From multiple data reported by a participant, an adversary can derive much sensitive information. Thus, users are reluctant to contribute to the sensing campaigns, if their privacy cannot be protected.
A variety of methods have been proposed to protect the privacy of each participant for participatory sensing applications. A naive mechanism to protect the privacy is to use pseudonyms. However, as demonstrated in , the use of pseudonyms does not necessarily guarantee privacy. Some privacy protection methods employ generalization or perturbation, both of which intend to allow the application server to determine community trends without revealing individual data, by deliberately reducing the accuracy or precision of the sensed data.

Conclusion:
 Privacy protection is an important issue in participatory sensing. We propose an anonymous data reporting protocol for participatory applications to protect user privacy. The intuition behind the protocol is that, if the data itself does not contain identification information, and we can break the link between the data and the participant that reports the data, the user’s privacy can be protected. The anonymous data reporting protocol is divided into two stages, a slot reservation stage and a data submission stage. We propose an anonymous slot reservation scheme based on public key encryption and message shuffle, and a data submission scheme based on efficient XOR operation. The theoretical analysis verifies the correctness and the anonymity of the protocol. The experiments demonstrate that, for small-scale applications with only tens of participants where data is collected in a periodic manner, the proposed protocol is efficient and applicable.





Comments

Popular posts from this blog

Jio

Reliance Jio planning its own  cryptocurrency called JioCoin  elder son Akash Ambani leading the JioCoin project, Reliance Jio plans to build a 50-member team of young professionals to work on blockchain technology, which can also be used to develop applications such as smart contracts and supply chain management logistics

PUNCHING MACHINE

ACCIDENT AVOIDING SYSTEM FOR PUNCHING MACHINE SYNOPSIS The aim of our project is to take a system-wide approach to preventing the machine accident. The system includes not just the machine and the operator; but rather, it includes everything from the initial design of the machine to the training of everyone that is responsible for any aspect of it, to the documentation of all changes, to regular safety audits and a finally a corporate culture of safety-first. Design is the part of a machine's life where the greatest impact can be made in relation to avoiding accidents. The designer should ensure that the machine is safe to set up and operate, safe to install, safe to maintain, safe to repair, and safe to decommission. Although safe operation is usually at the forefront of a designer's mind, safe maintenance and repair should also be a high priority. Around 50% of fatal accidents involving industrial equipment are associated with maintenance activities, and design...