Skip to main content

Anonymity-based Privacy-preserving Data Reporting for Participatory Sensing ABSTRACT

Anonymity-based Privacy-preserving Data
Reporting for Participatory Sensing

Abstract:
In this paper, we propose an efficient anonymous data reporting protocol for participatory sensing, which provides strong privacy protection, data accuracy and generality. The protocol consists of two stages, namely slot reservation and message submission. In the slot reservation stage, a group of N participants cooperate to assign each member a message slot in a vector which is essentially a message submission schedule, in such a manner that each participant’s slot is oblivious to other members and the application server. In the message submission stage, each participant transmits an encoded data to the application server based on the slot information known only to herself, in such a way that the application server cannot link a data to a specific participant. With such a data reporting protocol, the link between the data and the participants is broken, and as a result, participant’s privacy is protected. We conduct theoretical analysis of the correctness and anonymity of our protocol, as well as experiments to demonstrate the efficiency in small-scale applications with periodic data sampling.

Existing System:
v In existing methods, if the application server colludes with a global eavesdropper who can monitor the traffic across the network, it can link each data with its contributor.
v Privacy in participatory sensing systems has been addressed by many works, instead of sending an accurate location to the server, spatial cloaking is employed to calculate an anonymity set.
v As a result, the user is protected. The work in also follows this idea of generalization, in which k pieces of data are combined together before sending to the server, with the intension of adding enough “confusion” in the data to make it difficult to obtain exact times and locations for the individual data.

Proposed system:
v Privacy in participatory sensing systems has been addressed by many works, instead of sending an accurate location to the server, spatial cloaking is employed to calculate an anonymity set.
v  As a result, the user is protected. The work in  also follows this idea of generalization, in which k pieces of data are combined together before sending to the server, with the intension of adding enough “confusion” in the data to make it difficult to obtain exact times and locations for the individual data.
v  The most efficient anonymous message protocol so far is proposed in , where a ((N, N)-SS) secret sharing protocol is employed for both slot reservation and data submission.
v  The computation is efficient, as it doesn’t use public key encryption. But the communication cost is very heavy.

Problem statement:
Privacy protection is an important issue in participatory sensing. We propose an anonymous data reporting protocol for participatory applications to protect user privacy. The intuition behind the protocol is that, if the data itself does not contain identification information, and we can break the link between the data and the participant that reports the data, the user’s privacy can be protected. The anonymous data reporting protocol is divided into two stages, a slot reservation stage and a data submission stage.

Implementation of modules:
                                         System architecture:


In this Anonymity-based Privacy-preserving Data Reporting for Participatory Sensing five  modules such as given below,

1. Participant module.
2. Application Server module.
3. End Users module.
4. Privacy.
5. Trusted certification authority.

Participant Module:
 particiaptor can submit online reports using public/private keys, that may be related to personal ,group,community.participator can have limitation for submitting records into the server.

Participator can perform the following works

v .participator registeration.
v participator  login.
v view profile.
v slot reservation.
v Data submission.

Application Server module:

Application server is nothing but admin after admin login, he will collect the information from the server and analyze  the reports and prepare statistics, after that view the end user requests.
Steps:

v server login.
v view participator online reports collect the statistics.
v view end user details.

Trusted Certification authority:
 We assume that each participant Pi has a private/public key pair (xi, yi), and each participant knows the public keys of all the others. Thus, all participants can identify each other by public keys. In practice, the participants apply their key pairs from a trusted certification authority whose job is to associate each individual with her public key. Or alternatively, each participant can generate the key pair herself and publish the public key at the application server, if she does not trust any authority.
Steps:
v login.
v view user requests.
v accept user slot requests and provide pair of public/private keys.

End User module:
User can view the online reports and give the feed backs according to the type of posts.
Steps:
v user registeration.
v user login.
v search
v give feed backs and suggestions.

Participatory Privacy sensing:

participating in a participatory sensing task, especially a community-scale task, could result in private information leakage. Some tasks require users to submit data containing sensitive information, for example, disease symptoms. Some applications don’t directly use sensitive data, but still result in privacy leakage. For example, in a power consumption monitoring application , from temporally fine-grained energy consumption reports submitted by users, household activities can be inferred easily. In addition, data in participatory sensing application are usually geo- and timetagged. From multiple data reported by a participant, an adversary can derive much sensitive information. Thus, users are reluctant to contribute to the sensing campaigns, if their privacy cannot be protected.
A variety of methods have been proposed to protect the privacy of each participant for participatory sensing applications. A naive mechanism to protect the privacy is to use pseudonyms. However, as demonstrated in , the use of pseudonyms does not necessarily guarantee privacy. Some privacy protection methods employ generalization or perturbation, both of which intend to allow the application server to determine community trends without revealing individual data, by deliberately reducing the accuracy or precision of the sensed data.

Conclusion:
 Privacy protection is an important issue in participatory sensing. We propose an anonymous data reporting protocol for participatory applications to protect user privacy. The intuition behind the protocol is that, if the data itself does not contain identification information, and we can break the link between the data and the participant that reports the data, the user’s privacy can be protected. The anonymous data reporting protocol is divided into two stages, a slot reservation stage and a data submission stage. We propose an anonymous slot reservation scheme based on public key encryption and message shuffle, and a data submission scheme based on efficient XOR operation. The theoretical analysis verifies the correctness and the anonymity of the protocol. The experiments demonstrate that, for small-scale applications with only tens of participants where data is collected in a periodic manner, the proposed protocol is efficient and applicable.





Comments

Popular posts from this blog

CLOUD WORKFLOW SCHEDULING WITH DEADLINE AND TIME SLOT ALGORITHM

CLOUD WORKFLOW SCHEDULING WITH DEADLINE AND TIME SLOT ALGORITHM Abstract Allocating service capacities in cloud computing is based on the assumption that they are unlimited and can be used at any time. However, available service capacities change with workload and cannot satisfy users’ requests at any time from the cloud provider’s perspective because cloud services can be shared by multiple tasks. Cloud service providers provide available time slots for new user’s requests based on available capacities. In this paper, we consider workflow scheduling with deadline and time slot availability in cloud computing. An iterated heuristic framework is presented for the problem under study which mainly consists of initial solution construction, improvement, and perturbation. Three initial solution construction strategies, two greedy- and fair-based improvement strategies and a perturbation strategy are proposed. Different strategies in the three phases result in several heuristics. ...

Android Tutorial

Android  is a complete set of software for mobile devices such as tablet computers, notebooks, smartphones, electronic book readers, set-top boxes etc. It contains a  linux-based Operating System ,  middleware  and  key mobile applications . It can be thought of as a mobile operating system. But it is not limited to mobile only. It is currently used in various devices such as mobiles, tablets, televisions etc. This tutorial is developed for beginners and experienced persons. Let's see the topics of android that we are going to learn. Basics of Android In this fundamental chapter, you will learn about android, its components, how to create first android application, internal of first android application etc. What is Android History and Version Software Stack Core Building Blocks Android Emulator Installing softwares Setup Eclipse Hello Android example Internal Details Dalvik VM AndroidManifest.xml R.java Hide Title Bar Activity and I...

Force Sensing Resistor FSR400

Force Sensing Resistor FSR400 This is a small  force sensitive resistor . It has a 0.16" (4 mm) diameter active sensing area. This FSR will vary its resistance depending on how much pressure is being applied to the sensing area. The harder the force, the lower the resistance. When no pressure is being applied to the FSR, its resistance will be larger than 1MΩ, with full pressure applied the resistance will be 2.5kΩ. Two pins extend from the bottom of the sensor with 0.1" pitch making it bread board friendly. These sensors are simple to set up and great for sensing pressure, but they aren't incredibly accurate. Use them to sense if it's being squeezed, but you may not want to use it as a scale. Dimensions: Overall length: 1.75" Overall width: 0.28" Sensing area: 0.3"