SlideShare a Scribd company logo
Do Your Projects With Domain Expertsโ€ฆ
Copyright ยฉ 2015 LeMeniz Infotech. All rights reserved
Page number 1
LeMeniz Infotech
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
Providing Privacy-Aware Incentives in
Mobile Sensing Systems
Abstract
Mobile sensing relies on data contributed by users through their mobile
device (e.g., smart phone) to obtain useful information about people and their
surroundings. However, users may not want to contribute due to lack of incentives
and concerns on possible privacy leakage. To effectively promote user
participation, both incentive and privacy issues should be addressed. Although
incentive and privacy have been addressed separately in mobile sensing, it is still
an open problem to address them simultaneously.
We propose two credit-based privacy-aware incentive schemes for mobile
sensing systems, where the focus is on privacy protection instead of on the design
of incentive mechanisms. Our schemes enable mobile users to earn credits by
contributing data without leaking which data they have contributed, and ensure that
malicious users cannot abuse the system to earn unlimited credits. Specifically, the
first scheme considers scenarios where an online trusted third party (TTP) is
available, and relies on the TTP to protect user privacy and prevent abuse attacks.
The second scheme considers scenarios where no online TTP is available. It
applies blind signature, partially blind signature, and a novel extended Merkle tree
technique to protect user privacy and prevent abuse attacks. Security analysis and
cost evaluations show that our schemes are secure and efficient.
INTRODUCTION
The ever-increasing popularity of mobile devices such as smart phones and
tablets and the rich set of embedded sensors that usually come with them (e.g.,
GPS, accelerometer and microphone) have created a huge opportunity of sensing.
Do Your Projects With Domain Expertsโ€ฆ
Copyright ยฉ 2015 LeMeniz Infotech. All rights reserved
Page number 2
LeMeniz Infotech
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
Mobile sensing tries to harness this opportunity by collecting sensing data through
mobile devices and utilizing the data to obtain rich information about people and
their surroundings. It has many applications in healthcare, traffic monitoring, and
environmental monitoring However, the large-scale deployment of mobile sensing
applications is hindered by two obstacles.
First, there is a lack of incentives for mobile device users to participate in mobile
sensing. To participate, a user has to trigger her sensors to measure data (e.g., to
obtain GPS locations), which may consume much power of her smart phone.
Also, the user needs to upload data to a server which may consume much of her 3G
data quota (e.g., when the data is photos)
Existing system
To participate, a user has to trigger her sensors to measure data (e.g., to
obtain GPS locations), which may consume much power of her smart phone.
Also, the user needs to upload data to a server which may consume much of her 3G
data quota (e.g., when the data is photos). Moreover, the user may have to move to
a specific location to sense the required data. Considering these efforts and
resources required from the user, an incentive scheme is strongly desired for
mobile sensing applications to proliferate. Second, private information may be
derived from a userโ€™s contributed data. Such privacy concern also prevents users
from participating. For instance, to monitor the propagation of a new flu, a server
will collect information on who have been infected by this flu. However, a patient
may not want to provide such information since it is very sensitive. To effectively
motivate users to participate, both obstacles should be overcome.
Do Your Projects With Domain Expertsโ€ฆ
Copyright ยฉ 2015 LeMeniz Infotech. All rights reserved
Page number 3
LeMeniz Infotech
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
Disadvantages
๏‚ท Lack of incentives.
๏‚ท It consumes much power.
Proposed System
To promote user participation, we proposed two credit based privacy-aware
incentive schemes for mobile sensing, corresponding to scenarios with and without
a TTP respectively. Mainly based on hash and HMAC functions, the TTP-based
scheme has very low computation cost at each node. Based on blind signature,
partially blind signature, and extended Merkle tree techniques, the TTP-free
scheme has higher overhead than the TTP-based scheme but it ensures that no third
party can break user privacy. Both schemes can efficiently support dynamic joins
and leaves. Implementations show that both schemes have short running time and
lower power consumption.
Advantages
๏‚ท Computation cost is very low for each node.
๏‚ท No third party access.
๏‚ท Short running time and low power consumption.
Hardware Requirement
๏‚ท System : Pentium IV 2.4 GHz.
๏‚ท Hard Disk : 40 GB.
๏‚ท Floppy Drive : 44 Mb.
๏‚ท Monitor : 15 VGA Colour.
Do Your Projects With Domain Expertsโ€ฆ
Copyright ยฉ 2015 LeMeniz Infotech. All rights reserved
Page number 4
LeMeniz Infotech
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
๏‚ท Mouse : Logitech
๏‚ท Ram : 512 Mb.
๏‚ท MOBILE : ANDROID
Software Requirement
๏‚ท Operating system : Windows 7.
๏‚ท Coding Language : Java 1.7
๏‚ท Tool Kit : Android 2.3 ABOVE
๏‚ท IDE : Eclipse

More Related Content

What's hot

Future of IoT: Key Challenges to Face
Future of IoT: Key Challenges to FaceFuture of IoT: Key Challenges to Face
Future of IoT: Key Challenges to Face
Altoros
ย 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
ijsrd.com
ย 
How Artificial Intelligence Will Kickstart the Internet of Thnigs
How Artificial Intelligence Will Kickstart the Internet of Thnigs How Artificial Intelligence Will Kickstart the Internet of Thnigs
How Artificial Intelligence Will Kickstart the Internet of Thnigs
Ahmed Banafa
ย 
Application development for the internet of things
Application development for the internet of thingsApplication development for the internet of things
Application development for the internet of things
Pankesh Patel
ย 
From the Internet of Computers to the Internet of Things
From the Internet of Computers to the Internet of ThingsFrom the Internet of Computers to the Internet of Things
From the Internet of Computers to the Internet of Things
The Marketing Distillery
ย 
Iot architecture report
Iot architecture reportIot architecture report
Iot architecture report
Niranjan Kumar
ย 
8 trends of IoT in 2018
8 trends of IoT in 20188 trends of IoT in 2018
8 trends of IoT in 2018
Ahmed Banafa
ย 
Internet of Things building blocks
Internet of Things building blocksInternet of Things building blocks
Internet of Things building blocks
The Marketing Distillery
ย 
IoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesIoT Standardization and Implementation Challenges
IoT Standardization and Implementation Challenges
Ahmed Banafa
ย 
Introduction to IoT
Introduction to IoTIntroduction to IoT
Introduction to IoT
Mohamed Abdulfattah Gaber
ย 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
asfaw Alene
ย 
Fundamental Concept of Internet of Things
Fundamental Concept of Internet of ThingsFundamental Concept of Internet of Things
Fundamental Concept of Internet of Things
IRJET Journal
ย 
IOT: The Evolving World of Realtime BigData by Jerry Power
IOT: The Evolving World of Realtime BigData by Jerry PowerIOT: The Evolving World of Realtime BigData by Jerry Power
IOT: The Evolving World of Realtime BigData by Jerry Power
Data Con LA
ย 
Operationalize analytics through modern data strategy
Operationalize analytics through modern data strategyOperationalize analytics through modern data strategy
Operationalize analytics through modern data strategy
Nagarro
ย 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligence
Prakhyath Rai
ย 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
inventy
ย 
Iot Market Readiness
Iot Market ReadinessIot Market Readiness
Iot Market Readiness
Murali Munagapati
ย 
Io t & amp; industry 4.0,internet of things
Io t & amp; industry 4.0,internet of thingsIo t & amp; industry 4.0,internet of things
Io t & amp; industry 4.0,internet of things
SumanPramanik7
ย 
Integrated smart door system in apartment room based on internet
Integrated smart door system in apartment room based on internetIntegrated smart door system in apartment room based on internet
Integrated smart door system in apartment room based on internet
TELKOMNIKA JOURNAL
ย 
ะ„ะ’ะ“ะ•ะะ†ะ™ ะŸะะกะ„ะšะ ยซIoT ัะบ ั†ะต ั‚ะตัั‚ัƒะฒะฐั‚ะธยป Lviv QA Day 2019
ะ„ะ’ะ“ะ•ะะ†ะ™ ะŸะะกะ„ะšะ ยซIoT ัะบ ั†ะต ั‚ะตัั‚ัƒะฒะฐั‚ะธยป Lviv QA Day 2019ะ„ะ’ะ“ะ•ะะ†ะ™ ะŸะะกะ„ะšะ ยซIoT ัะบ ั†ะต ั‚ะตัั‚ัƒะฒะฐั‚ะธยป Lviv QA Day 2019
ะ„ะ’ะ“ะ•ะะ†ะ™ ะŸะะกะ„ะšะ ยซIoT ัะบ ั†ะต ั‚ะตัั‚ัƒะฒะฐั‚ะธยป Lviv QA Day 2019
QADay
ย 

What's hot (20)

Future of IoT: Key Challenges to Face
Future of IoT: Key Challenges to FaceFuture of IoT: Key Challenges to Face
Future of IoT: Key Challenges to Face
ย 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
ย 
How Artificial Intelligence Will Kickstart the Internet of Thnigs
How Artificial Intelligence Will Kickstart the Internet of Thnigs How Artificial Intelligence Will Kickstart the Internet of Thnigs
How Artificial Intelligence Will Kickstart the Internet of Thnigs
ย 
Application development for the internet of things
Application development for the internet of thingsApplication development for the internet of things
Application development for the internet of things
ย 
From the Internet of Computers to the Internet of Things
From the Internet of Computers to the Internet of ThingsFrom the Internet of Computers to the Internet of Things
From the Internet of Computers to the Internet of Things
ย 
Iot architecture report
Iot architecture reportIot architecture report
Iot architecture report
ย 
8 trends of IoT in 2018
8 trends of IoT in 20188 trends of IoT in 2018
8 trends of IoT in 2018
ย 
Internet of Things building blocks
Internet of Things building blocksInternet of Things building blocks
Internet of Things building blocks
ย 
IoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesIoT Standardization and Implementation Challenges
IoT Standardization and Implementation Challenges
ย 
Introduction to IoT
Introduction to IoTIntroduction to IoT
Introduction to IoT
ย 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
ย 
Fundamental Concept of Internet of Things
Fundamental Concept of Internet of ThingsFundamental Concept of Internet of Things
Fundamental Concept of Internet of Things
ย 
IOT: The Evolving World of Realtime BigData by Jerry Power
IOT: The Evolving World of Realtime BigData by Jerry PowerIOT: The Evolving World of Realtime BigData by Jerry Power
IOT: The Evolving World of Realtime BigData by Jerry Power
ย 
Operationalize analytics through modern data strategy
Operationalize analytics through modern data strategyOperationalize analytics through modern data strategy
Operationalize analytics through modern data strategy
ย 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligence
ย 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
ย 
Iot Market Readiness
Iot Market ReadinessIot Market Readiness
Iot Market Readiness
ย 
Io t & amp; industry 4.0,internet of things
Io t & amp; industry 4.0,internet of thingsIo t & amp; industry 4.0,internet of things
Io t & amp; industry 4.0,internet of things
ย 
Integrated smart door system in apartment room based on internet
Integrated smart door system in apartment room based on internetIntegrated smart door system in apartment room based on internet
Integrated smart door system in apartment room based on internet
ย 
ะ„ะ’ะ“ะ•ะะ†ะ™ ะŸะะกะ„ะšะ ยซIoT ัะบ ั†ะต ั‚ะตัั‚ัƒะฒะฐั‚ะธยป Lviv QA Day 2019
ะ„ะ’ะ“ะ•ะะ†ะ™ ะŸะะกะ„ะšะ ยซIoT ัะบ ั†ะต ั‚ะตัั‚ัƒะฒะฐั‚ะธยป Lviv QA Day 2019ะ„ะ’ะ“ะ•ะะ†ะ™ ะŸะะกะ„ะšะ ยซIoT ัะบ ั†ะต ั‚ะตัั‚ัƒะฒะฐั‚ะธยป Lviv QA Day 2019
ะ„ะ’ะ“ะ•ะะ†ะ™ ะŸะะกะ„ะšะ ยซIoT ัะบ ั†ะต ั‚ะตัั‚ัƒะฒะฐั‚ะธยป Lviv QA Day 2019
ย 

Viewers also liked

Bridgeless pfc modified sepic rectifier with extended gain for universal inpu...
Bridgeless pfc modified sepic rectifier with extended gain for universal inpu...Bridgeless pfc modified sepic rectifier with extended gain for universal inpu...
Bridgeless pfc modified sepic rectifier with extended gain for universal inpu...
LeMeniz Infotech
ย 
Teddy
TeddyTeddy
Teddy
vinnipukkk
ย 
Android security a survey of issues, malware penetration, and defenses
Android security a survey of issues, malware penetration, and defensesAndroid security a survey of issues, malware penetration, and defenses
Android security a survey of issues, malware penetration, and defenses
LeMeniz Infotech
ย 
ะะฐัƒะบะฐ ะธ ะธะฝะฝะพะฒะฐั†ะธะธ ะ˜ะะญะš-ะŸะพะฒะพะปะถัŒะต
ะะฐัƒะบะฐ ะธ ะธะฝะฝะพะฒะฐั†ะธะธ ะ˜ะะญะš-ะŸะพะฒะพะปะถัŒะตะะฐัƒะบะฐ ะธ ะธะฝะฝะพะฒะฐั†ะธะธ ะ˜ะะญะš-ะŸะพะฒะพะปะถัŒะต
ะะฐัƒะบะฐ ะธ ะธะฝะฝะพะฒะฐั†ะธะธ ะ˜ะะญะš-ะŸะพะฒะพะปะถัŒะต
dvdanilov
ย 
Risk aware query replacement approach for secure databases performance manage...
Risk aware query replacement approach for secure databases performance manage...Risk aware query replacement approach for secure databases performance manage...
Risk aware query replacement approach for secure databases performance manage...
LeMeniz Infotech
ย 
Wishclub Compensation Plan (EN)
Wishclub Compensation Plan (EN)Wishclub Compensation Plan (EN)
Wishclub Compensation Plan (EN)
Wishclubteam Espaรฑa
ย 
Ca co an efficient cauchy coding approach for cloud storage systems
Ca co an efficient cauchy coding approach for cloud storage systemsCa co an efficient cauchy coding approach for cloud storage systems
Ca co an efficient cauchy coding approach for cloud storage systems
LeMeniz Infotech
ย 
Retouched pictures
Retouched picturesRetouched pictures
Retouched pictures
mdrouet44
ย 
Front end converter with integrated pfc and dcโ€“dc functions for a fuel cell u...
Front end converter with integrated pfc and dcโ€“dc functions for a fuel cell u...Front end converter with integrated pfc and dcโ€“dc functions for a fuel cell u...
Front end converter with integrated pfc and dcโ€“dc functions for a fuel cell u...
LeMeniz Infotech
ย 
Q7
Q7Q7
My Pitch
My PitchMy Pitch
My Pitch
danieljacksonmedia
ย 
Two stage power conversion architecture suitable for wide range input voltage
Two stage power conversion architecture suitable for wide range input voltageTwo stage power conversion architecture suitable for wide range input voltage
Two stage power conversion architecture suitable for wide range input voltage
LeMeniz Infotech
ย 
A family of multiport buckโ€“boost converters based on dc link-inductors (dl is)
A family of multiport buckโ€“boost converters based on dc link-inductors (dl is)A family of multiport buckโ€“boost converters based on dc link-inductors (dl is)
A family of multiport buckโ€“boost converters based on dc link-inductors (dl is)
LeMeniz Infotech
ย 
Fall festival 2014 slideshow
Fall festival 2014 slideshowFall festival 2014 slideshow
Fall festival 2014 slideshow
Earl Oswalt
ย 
Bumpless control for reduced thd in power factor correction circuits
Bumpless control for reduced thd in power factor correction circuitsBumpless control for reduced thd in power factor correction circuits
Bumpless control for reduced thd in power factor correction circuits
LeMeniz Infotech
ย 
A secondary side phase-shift-controlled llc resonant converter with reduced c...
A secondary side phase-shift-controlled llc resonant converter with reduced c...A secondary side phase-shift-controlled llc resonant converter with reduced c...
A secondary side phase-shift-controlled llc resonant converter with reduced c...
LeMeniz Infotech
ย 
A novel transformer less interleaved four-phase step-down dc converter with l...
A novel transformer less interleaved four-phase step-down dc converter with l...A novel transformer less interleaved four-phase step-down dc converter with l...
A novel transformer less interleaved four-phase step-down dc converter with l...
LeMeniz Infotech
ย 
A zero voltage-transition bidirectional dcdc converter
A zero voltage-transition bidirectional dcdc converterA zero voltage-transition bidirectional dcdc converter
A zero voltage-transition bidirectional dcdc converter
LeMeniz Infotech
ย 
Analytical model of the half bridge series resonant inverter for improved pow...
Analytical model of the half bridge series resonant inverter for improved pow...Analytical model of the half bridge series resonant inverter for improved pow...
Analytical model of the half bridge series resonant inverter for improved pow...
LeMeniz Infotech
ย 

Viewers also liked (20)

Bridgeless pfc modified sepic rectifier with extended gain for universal inpu...
Bridgeless pfc modified sepic rectifier with extended gain for universal inpu...Bridgeless pfc modified sepic rectifier with extended gain for universal inpu...
Bridgeless pfc modified sepic rectifier with extended gain for universal inpu...
ย 
Teddy
TeddyTeddy
Teddy
ย 
Android security a survey of issues, malware penetration, and defenses
Android security a survey of issues, malware penetration, and defensesAndroid security a survey of issues, malware penetration, and defenses
Android security a survey of issues, malware penetration, and defenses
ย 
ะะฐัƒะบะฐ ะธ ะธะฝะฝะพะฒะฐั†ะธะธ ะ˜ะะญะš-ะŸะพะฒะพะปะถัŒะต
ะะฐัƒะบะฐ ะธ ะธะฝะฝะพะฒะฐั†ะธะธ ะ˜ะะญะš-ะŸะพะฒะพะปะถัŒะตะะฐัƒะบะฐ ะธ ะธะฝะฝะพะฒะฐั†ะธะธ ะ˜ะะญะš-ะŸะพะฒะพะปะถัŒะต
ะะฐัƒะบะฐ ะธ ะธะฝะฝะพะฒะฐั†ะธะธ ะ˜ะะญะš-ะŸะพะฒะพะปะถัŒะต
ย 
Risk aware query replacement approach for secure databases performance manage...
Risk aware query replacement approach for secure databases performance manage...Risk aware query replacement approach for secure databases performance manage...
Risk aware query replacement approach for secure databases performance manage...
ย 
Wishclub Compensation Plan (EN)
Wishclub Compensation Plan (EN)Wishclub Compensation Plan (EN)
Wishclub Compensation Plan (EN)
ย 
Ca co an efficient cauchy coding approach for cloud storage systems
Ca co an efficient cauchy coding approach for cloud storage systemsCa co an efficient cauchy coding approach for cloud storage systems
Ca co an efficient cauchy coding approach for cloud storage systems
ย 
Retouched pictures
Retouched picturesRetouched pictures
Retouched pictures
ย 
Front end converter with integrated pfc and dcโ€“dc functions for a fuel cell u...
Front end converter with integrated pfc and dcโ€“dc functions for a fuel cell u...Front end converter with integrated pfc and dcโ€“dc functions for a fuel cell u...
Front end converter with integrated pfc and dcโ€“dc functions for a fuel cell u...
ย 
Q7
Q7Q7
Q7
ย 
My Pitch
My PitchMy Pitch
My Pitch
ย 
Two stage power conversion architecture suitable for wide range input voltage
Two stage power conversion architecture suitable for wide range input voltageTwo stage power conversion architecture suitable for wide range input voltage
Two stage power conversion architecture suitable for wide range input voltage
ย 
A family of multiport buckโ€“boost converters based on dc link-inductors (dl is)
A family of multiport buckโ€“boost converters based on dc link-inductors (dl is)A family of multiport buckโ€“boost converters based on dc link-inductors (dl is)
A family of multiport buckโ€“boost converters based on dc link-inductors (dl is)
ย 
Fall festival 2014 slideshow
Fall festival 2014 slideshowFall festival 2014 slideshow
Fall festival 2014 slideshow
ย 
Bumpless control for reduced thd in power factor correction circuits
Bumpless control for reduced thd in power factor correction circuitsBumpless control for reduced thd in power factor correction circuits
Bumpless control for reduced thd in power factor correction circuits
ย 
A secondary side phase-shift-controlled llc resonant converter with reduced c...
A secondary side phase-shift-controlled llc resonant converter with reduced c...A secondary side phase-shift-controlled llc resonant converter with reduced c...
A secondary side phase-shift-controlled llc resonant converter with reduced c...
ย 
A novel transformer less interleaved four-phase step-down dc converter with l...
A novel transformer less interleaved four-phase step-down dc converter with l...A novel transformer less interleaved four-phase step-down dc converter with l...
A novel transformer less interleaved four-phase step-down dc converter with l...
ย 
A zero voltage-transition bidirectional dcdc converter
A zero voltage-transition bidirectional dcdc converterA zero voltage-transition bidirectional dcdc converter
A zero voltage-transition bidirectional dcdc converter
ย 
Analytical model of the half bridge series resonant inverter for improved pow...
Analytical model of the half bridge series resonant inverter for improved pow...Analytical model of the half bridge series resonant inverter for improved pow...
Analytical model of the half bridge series resonant inverter for improved pow...
ย 
Sรฉculos Oscuros
Sรฉculos OscurosSรฉculos Oscuros
Sรฉculos Oscuros
ย 

Similar to Providing privacy aware incentives in mobile sensing systems

I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdf
amitkhanna2070
ย 
Spe security and privacy enhancement framework for mobile devices
Spe security and privacy enhancement framework for mobile devicesSpe security and privacy enhancement framework for mobile devices
Spe security and privacy enhancement framework for mobile devices
LeMeniz Infotech
ย 
A privacy preserving framework for managing mobile ad requests and billing in...
A privacy preserving framework for managing mobile ad requests and billing in...A privacy preserving framework for managing mobile ad requests and billing in...
A privacy preserving framework for managing mobile ad requests and billing in...
LeMeniz Infotech
ย 
Privacy preserving relative location based services for mobile users
Privacy preserving relative location based services for mobile usersPrivacy preserving relative location based services for mobile users
Privacy preserving relative location based services for mobile users
LeMeniz Infotech
ย 
Iaetsd future polling system using cloud computing in support with smart clie...
Iaetsd future polling system using cloud computing in support with smart clie...Iaetsd future polling system using cloud computing in support with smart clie...
Iaetsd future polling system using cloud computing in support with smart clie...
Iaetsd Iaetsd
ย 
Secure and distributed data discovery and dissemination in wireless sensor ne...
Secure and distributed data discovery and dissemination in wireless sensor ne...Secure and distributed data discovery and dissemination in wireless sensor ne...
Secure and distributed data discovery and dissemination in wireless sensor ne...
LeMeniz Infotech
ย 
Context based access control systems for mobile devices
Context based access control systems for mobile devicesContext based access control systems for mobile devices
Context based access control systems for mobile devices
LeMeniz Infotech
ย 
User privacy and data trustworthiness in mobile crowd sensing
User privacy and data trustworthiness in mobile crowd sensingUser privacy and data trustworthiness in mobile crowd sensing
User privacy and data trustworthiness in mobile crowd sensing
LeMeniz Infotech
ย 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward security
LeMeniz Infotech
ย 
PoV on Latest technology Trends impact on Insurance Industry
PoV on Latest technology Trends impact on Insurance Industry PoV on Latest technology Trends impact on Insurance Industry
PoV on Latest technology Trends impact on Insurance Industry
Jishnu Mithre
ย 
PoV on Latest technology Trends impact on Insurance Industry
PoV on Latest technology Trends impact on Insurance Industry PoV on Latest technology Trends impact on Insurance Industry
PoV on Latest technology Trends impact on Insurance Industry
Jishnu Mithre
ย 
The Weakest Point of Security in IoT
The Weakest Point of Security in IoTThe Weakest Point of Security in IoT
The Weakest Point of Security in IoT
nsangary
ย 
Wireless Security on Context (disponible en espaรฑol)
Wireless Security on Context (disponible en espaรฑol)Wireless Security on Context (disponible en espaรฑol)
Wireless Security on Context (disponible en espaรฑol)
Cisco Service Provider Mobility
ย 
Topic 7
Topic 7Topic 7
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
IRJET Journal
ย 
Securing Data with Block chain and AI ppt
Securing Data with Block chain and AI pptSecuring Data with Block chain and AI ppt
Securing Data with Block chain and AI ppt
sumayyakousar194
ย 
Stamp enabling privacy preserving location proofs for mobile users
Stamp enabling privacy preserving location proofs for mobile usersStamp enabling privacy preserving location proofs for mobile users
Stamp enabling privacy preserving location proofs for mobile users
LeMeniz Infotech
ย 
IoT - RTD WHITE PAPER SquaredOnline
IoT - RTD WHITE PAPER SquaredOnlineIoT - RTD WHITE PAPER SquaredOnline
IoT - RTD WHITE PAPER SquaredOnline
FranceschiniLaura
ย 
271 Information Governance for Mobile Devices .docx
271 Information Governance for Mobile Devices    .docx271 Information Governance for Mobile Devices    .docx
271 Information Governance for Mobile Devices .docx
lorainedeserre
ย 
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET-  	  Local Security Enhancement and Intrusion Prevention in Android Dev...IRJET-  	  Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET Journal
ย 

Similar to Providing privacy aware incentives in mobile sensing systems (20)

I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdf
ย 
Spe security and privacy enhancement framework for mobile devices
Spe security and privacy enhancement framework for mobile devicesSpe security and privacy enhancement framework for mobile devices
Spe security and privacy enhancement framework for mobile devices
ย 
A privacy preserving framework for managing mobile ad requests and billing in...
A privacy preserving framework for managing mobile ad requests and billing in...A privacy preserving framework for managing mobile ad requests and billing in...
A privacy preserving framework for managing mobile ad requests and billing in...
ย 
Privacy preserving relative location based services for mobile users
Privacy preserving relative location based services for mobile usersPrivacy preserving relative location based services for mobile users
Privacy preserving relative location based services for mobile users
ย 
Iaetsd future polling system using cloud computing in support with smart clie...
Iaetsd future polling system using cloud computing in support with smart clie...Iaetsd future polling system using cloud computing in support with smart clie...
Iaetsd future polling system using cloud computing in support with smart clie...
ย 
Secure and distributed data discovery and dissemination in wireless sensor ne...
Secure and distributed data discovery and dissemination in wireless sensor ne...Secure and distributed data discovery and dissemination in wireless sensor ne...
Secure and distributed data discovery and dissemination in wireless sensor ne...
ย 
Context based access control systems for mobile devices
Context based access control systems for mobile devicesContext based access control systems for mobile devices
Context based access control systems for mobile devices
ย 
User privacy and data trustworthiness in mobile crowd sensing
User privacy and data trustworthiness in mobile crowd sensingUser privacy and data trustworthiness in mobile crowd sensing
User privacy and data trustworthiness in mobile crowd sensing
ย 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward security
ย 
PoV on Latest technology Trends impact on Insurance Industry
PoV on Latest technology Trends impact on Insurance Industry PoV on Latest technology Trends impact on Insurance Industry
PoV on Latest technology Trends impact on Insurance Industry
ย 
PoV on Latest technology Trends impact on Insurance Industry
PoV on Latest technology Trends impact on Insurance Industry PoV on Latest technology Trends impact on Insurance Industry
PoV on Latest technology Trends impact on Insurance Industry
ย 
The Weakest Point of Security in IoT
The Weakest Point of Security in IoTThe Weakest Point of Security in IoT
The Weakest Point of Security in IoT
ย 
Wireless Security on Context (disponible en espaรฑol)
Wireless Security on Context (disponible en espaรฑol)Wireless Security on Context (disponible en espaรฑol)
Wireless Security on Context (disponible en espaรฑol)
ย 
Topic 7
Topic 7Topic 7
Topic 7
ย 
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
ย 
Securing Data with Block chain and AI ppt
Securing Data with Block chain and AI pptSecuring Data with Block chain and AI ppt
Securing Data with Block chain and AI ppt
ย 
Stamp enabling privacy preserving location proofs for mobile users
Stamp enabling privacy preserving location proofs for mobile usersStamp enabling privacy preserving location proofs for mobile users
Stamp enabling privacy preserving location proofs for mobile users
ย 
IoT - RTD WHITE PAPER SquaredOnline
IoT - RTD WHITE PAPER SquaredOnlineIoT - RTD WHITE PAPER SquaredOnline
IoT - RTD WHITE PAPER SquaredOnline
ย 
271 Information Governance for Mobile Devices .docx
271 Information Governance for Mobile Devices    .docx271 Information Governance for Mobile Devices    .docx
271 Information Governance for Mobile Devices .docx
ย 
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET-  	  Local Security Enhancement and Intrusion Prevention in Android Dev...IRJET-  	  Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...
ย 

More from LeMeniz Infotech

A fast acquisition all-digital delay-locked loop using a starting-bit predict...
A fast acquisition all-digital delay-locked loop using a starting-bit predict...A fast acquisition all-digital delay-locked loop using a starting-bit predict...
A fast acquisition all-digital delay-locked loop using a starting-bit predict...
LeMeniz Infotech
ย 
A fast fault tolerant architecture for sauvola local image thresholding algor...
A fast fault tolerant architecture for sauvola local image thresholding algor...A fast fault tolerant architecture for sauvola local image thresholding algor...
A fast fault tolerant architecture for sauvola local image thresholding algor...
LeMeniz Infotech
ย 
A dynamically reconfigurable multi asip architecture for multistandard and mu...
A dynamically reconfigurable multi asip architecture for multistandard and mu...A dynamically reconfigurable multi asip architecture for multistandard and mu...
A dynamically reconfigurable multi asip architecture for multistandard and mu...
LeMeniz Infotech
ย 
Interleaved digital power factor correction based on the sliding mode approach
Interleaved digital power factor correction based on the sliding mode approachInterleaved digital power factor correction based on the sliding mode approach
Interleaved digital power factor correction based on the sliding mode approach
LeMeniz Infotech
ย 
A bidirectional single stage three phase rectifier with high-frequency isolat...
A bidirectional single stage three phase rectifier with high-frequency isolat...A bidirectional single stage three phase rectifier with high-frequency isolat...
A bidirectional single stage three phase rectifier with high-frequency isolat...
LeMeniz Infotech
ย 
A bidirectional three level llc resonant converter with pwam control
A bidirectional three level llc resonant converter with pwam controlA bidirectional three level llc resonant converter with pwam control
A bidirectional three level llc resonant converter with pwam control
LeMeniz Infotech
ย 
Efficient single phase transformerless inverter for grid tied pvg system with...
Efficient single phase transformerless inverter for grid tied pvg system with...Efficient single phase transformerless inverter for grid tied pvg system with...
Efficient single phase transformerless inverter for grid tied pvg system with...
LeMeniz Infotech
ย 
Highly reliable transformerless photovoltaic inverters with leakage current a...
Highly reliable transformerless photovoltaic inverters with leakage current a...Highly reliable transformerless photovoltaic inverters with leakage current a...
Highly reliable transformerless photovoltaic inverters with leakage current a...
LeMeniz Infotech
ย 
Grid current-feedback active damping for lcl resonance in grid-connected volt...
Grid current-feedback active damping for lcl resonance in grid-connected volt...Grid current-feedback active damping for lcl resonance in grid-connected volt...
Grid current-feedback active damping for lcl resonance in grid-connected volt...
LeMeniz Infotech
ย 
Delay dependent stability of single-loop controlled grid-connected inverters ...
Delay dependent stability of single-loop controlled grid-connected inverters ...Delay dependent stability of single-loop controlled grid-connected inverters ...
Delay dependent stability of single-loop controlled grid-connected inverters ...
LeMeniz Infotech
ย 
Connection of converters to a low and medium power dc network using an induct...
Connection of converters to a low and medium power dc network using an induct...Connection of converters to a low and medium power dc network using an induct...
Connection of converters to a low and medium power dc network using an induct...
LeMeniz Infotech
ย 
Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesSbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphones
LeMeniz Infotech
ย 
Read2 me a cloud based reading aid for the visually impaired
Read2 me a cloud based reading aid for the visually impairedRead2 me a cloud based reading aid for the visually impaired
Read2 me a cloud based reading aid for the visually impaired
LeMeniz Infotech
ย 
Privacy preserving location sharing services for social networks
Privacy preserving location sharing services for social networksPrivacy preserving location sharing services for social networks
Privacy preserving location sharing services for social networks
LeMeniz Infotech
ย 
Pass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwordsPass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwords
LeMeniz Infotech
ย 
Eplq efficient privacy preserving location-based query over outsourced encryp...
Eplq efficient privacy preserving location-based query over outsourced encryp...Eplq efficient privacy preserving location-based query over outsourced encryp...
Eplq efficient privacy preserving location-based query over outsourced encryp...
LeMeniz Infotech
ย 
Analyzing ad library updates in android apps
Analyzing ad library updates in android appsAnalyzing ad library updates in android apps
Analyzing ad library updates in android apps
LeMeniz Infotech
ย 
An exploration of geographic authentication scheme
An exploration of geographic authentication schemeAn exploration of geographic authentication scheme
An exploration of geographic authentication scheme
LeMeniz Infotech
ย 
Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017
Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017
Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017
LeMeniz Infotech
ย 
A location and diversity-aware news feed system for mobile users
A location  and diversity-aware news feed system for mobile usersA location  and diversity-aware news feed system for mobile users
A location and diversity-aware news feed system for mobile users
LeMeniz Infotech
ย 

More from LeMeniz Infotech (20)

A fast acquisition all-digital delay-locked loop using a starting-bit predict...
A fast acquisition all-digital delay-locked loop using a starting-bit predict...A fast acquisition all-digital delay-locked loop using a starting-bit predict...
A fast acquisition all-digital delay-locked loop using a starting-bit predict...
ย 
A fast fault tolerant architecture for sauvola local image thresholding algor...
A fast fault tolerant architecture for sauvola local image thresholding algor...A fast fault tolerant architecture for sauvola local image thresholding algor...
A fast fault tolerant architecture for sauvola local image thresholding algor...
ย 
A dynamically reconfigurable multi asip architecture for multistandard and mu...
A dynamically reconfigurable multi asip architecture for multistandard and mu...A dynamically reconfigurable multi asip architecture for multistandard and mu...
A dynamically reconfigurable multi asip architecture for multistandard and mu...
ย 
Interleaved digital power factor correction based on the sliding mode approach
Interleaved digital power factor correction based on the sliding mode approachInterleaved digital power factor correction based on the sliding mode approach
Interleaved digital power factor correction based on the sliding mode approach
ย 
A bidirectional single stage three phase rectifier with high-frequency isolat...
A bidirectional single stage three phase rectifier with high-frequency isolat...A bidirectional single stage three phase rectifier with high-frequency isolat...
A bidirectional single stage three phase rectifier with high-frequency isolat...
ย 
A bidirectional three level llc resonant converter with pwam control
A bidirectional three level llc resonant converter with pwam controlA bidirectional three level llc resonant converter with pwam control
A bidirectional three level llc resonant converter with pwam control
ย 
Efficient single phase transformerless inverter for grid tied pvg system with...
Efficient single phase transformerless inverter for grid tied pvg system with...Efficient single phase transformerless inverter for grid tied pvg system with...
Efficient single phase transformerless inverter for grid tied pvg system with...
ย 
Highly reliable transformerless photovoltaic inverters with leakage current a...
Highly reliable transformerless photovoltaic inverters with leakage current a...Highly reliable transformerless photovoltaic inverters with leakage current a...
Highly reliable transformerless photovoltaic inverters with leakage current a...
ย 
Grid current-feedback active damping for lcl resonance in grid-connected volt...
Grid current-feedback active damping for lcl resonance in grid-connected volt...Grid current-feedback active damping for lcl resonance in grid-connected volt...
Grid current-feedback active damping for lcl resonance in grid-connected volt...
ย 
Delay dependent stability of single-loop controlled grid-connected inverters ...
Delay dependent stability of single-loop controlled grid-connected inverters ...Delay dependent stability of single-loop controlled grid-connected inverters ...
Delay dependent stability of single-loop controlled grid-connected inverters ...
ย 
Connection of converters to a low and medium power dc network using an induct...
Connection of converters to a low and medium power dc network using an induct...Connection of converters to a low and medium power dc network using an induct...
Connection of converters to a low and medium power dc network using an induct...
ย 
Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesSbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphones
ย 
Read2 me a cloud based reading aid for the visually impaired
Read2 me a cloud based reading aid for the visually impairedRead2 me a cloud based reading aid for the visually impaired
Read2 me a cloud based reading aid for the visually impaired
ย 
Privacy preserving location sharing services for social networks
Privacy preserving location sharing services for social networksPrivacy preserving location sharing services for social networks
Privacy preserving location sharing services for social networks
ย 
Pass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwordsPass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwords
ย 
Eplq efficient privacy preserving location-based query over outsourced encryp...
Eplq efficient privacy preserving location-based query over outsourced encryp...Eplq efficient privacy preserving location-based query over outsourced encryp...
Eplq efficient privacy preserving location-based query over outsourced encryp...
ย 
Analyzing ad library updates in android apps
Analyzing ad library updates in android appsAnalyzing ad library updates in android apps
Analyzing ad library updates in android apps
ย 
An exploration of geographic authentication scheme
An exploration of geographic authentication schemeAn exploration of geographic authentication scheme
An exploration of geographic authentication scheme
ย 
Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017
Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017
Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017
ย 
A location and diversity-aware news feed system for mobile users
A location  and diversity-aware news feed system for mobile usersA location  and diversity-aware news feed system for mobile users
A location and diversity-aware news feed system for mobile users
ย 

Recently uploaded

NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
Payaamvohra1
ย 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
indexPub
ย 
skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)
Mohammad Al-Dhahabi
ย 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
Steve Thomason
ย 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
EduSkills OECD
ย 
220711130100 udita Chakraborty Aims and objectives of national policy on inf...
220711130100 udita Chakraborty  Aims and objectives of national policy on inf...220711130100 udita Chakraborty  Aims and objectives of national policy on inf...
220711130100 udita Chakraborty Aims and objectives of national policy on inf...
Kalna College
ย 
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
Kalna College
ย 
CHUYรŠN ฤแป€ ร”N TแบฌP Vร€ PHรT TRIแป‚N Cร‚U HแปŽI TRONG ฤแป€ MINH HแปŒA THI TแปT NGHIแป†P THPT ...
CHUYรŠN ฤแป€ ร”N TแบฌP Vร€ PHรT TRIแป‚N Cร‚U HแปŽI TRONG ฤแป€ MINH HแปŒA THI TแปT NGHIแป†P THPT ...CHUYรŠN ฤแป€ ร”N TแบฌP Vร€ PHรT TRIแป‚N Cร‚U HแปŽI TRONG ฤแป€ MINH HแปŒA THI TแปT NGHIแป†P THPT ...
CHUYรŠN ฤแป€ ร”N TแบฌP Vร€ PHรT TRIแป‚N Cร‚U HแปŽI TRONG ฤแป€ MINH HแปŒA THI TแปT NGHIแป†P THPT ...
Nguyen Thanh Tu Collection
ย 
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
220711130083 SUBHASHREE RAKSHIT  Internet resources for social science220711130083 SUBHASHREE RAKSHIT  Internet resources for social science
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
Kalna College
ย 
How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17
Celine George
ย 
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptxCapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapitolTechU
ย 
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptxContiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Kalna College
ย 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
zuzanka
ย 
Bร€I TแบฌP Bแป” TRแปข TIแบพNG ANH LแปšP 8 - Cแบข Nฤ‚M - FRIENDS PLUS - Nฤ‚M HแปŒC 2023-2024 (B...
Bร€I TแบฌP Bแป” TRแปข TIแบพNG ANH LแปšP 8 - Cแบข Nฤ‚M - FRIENDS PLUS - Nฤ‚M HแปŒC 2023-2024 (B...Bร€I TแบฌP Bแป” TRแปข TIแบพNG ANH LแปšP 8 - Cแบข Nฤ‚M - FRIENDS PLUS - Nฤ‚M HแปŒC 2023-2024 (B...
Bร€I TแบฌP Bแป” TRแปข TIแบพNG ANH LแปšP 8 - Cแบข Nฤ‚M - FRIENDS PLUS - Nฤ‚M HแปŒC 2023-2024 (B...
Nguyen Thanh Tu Collection
ย 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
TechSoup
ย 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
PsychoTech Services
ย 
Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10
nitinpv4ai
ย 
Ch-4 Forest Society and colonialism 2.pdf
Ch-4 Forest Society and colonialism 2.pdfCh-4 Forest Society and colonialism 2.pdf
Ch-4 Forest Society and colonialism 2.pdf
lakshayrojroj
ย 
BPSC-105 important questions for june term end exam
BPSC-105 important questions for june term end examBPSC-105 important questions for june term end exam
BPSC-105 important questions for june term end exam
sonukumargpnirsadhan
ย 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
MJDuyan
ย 

Recently uploaded (20)

NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
ย 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
ย 
skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)
ย 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
ย 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
ย 
220711130100 udita Chakraborty Aims and objectives of national policy on inf...
220711130100 udita Chakraborty  Aims and objectives of national policy on inf...220711130100 udita Chakraborty  Aims and objectives of national policy on inf...
220711130100 udita Chakraborty Aims and objectives of national policy on inf...
ย 
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
ย 
CHUYรŠN ฤแป€ ร”N TแบฌP Vร€ PHรT TRIแป‚N Cร‚U HแปŽI TRONG ฤแป€ MINH HแปŒA THI TแปT NGHIแป†P THPT ...
CHUYรŠN ฤแป€ ร”N TแบฌP Vร€ PHรT TRIแป‚N Cร‚U HแปŽI TRONG ฤแป€ MINH HแปŒA THI TแปT NGHIแป†P THPT ...CHUYรŠN ฤแป€ ร”N TแบฌP Vร€ PHรT TRIแป‚N Cร‚U HแปŽI TRONG ฤแป€ MINH HแปŒA THI TแปT NGHIแป†P THPT ...
CHUYรŠN ฤแป€ ร”N TแบฌP Vร€ PHรT TRIแป‚N Cร‚U HแปŽI TRONG ฤแป€ MINH HแปŒA THI TแปT NGHIแป†P THPT ...
ย 
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
220711130083 SUBHASHREE RAKSHIT  Internet resources for social science220711130083 SUBHASHREE RAKSHIT  Internet resources for social science
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
ย 
How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17
ย 
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptxCapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
ย 
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptxContiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptx
ย 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
ย 
Bร€I TแบฌP Bแป” TRแปข TIแบพNG ANH LแปšP 8 - Cแบข Nฤ‚M - FRIENDS PLUS - Nฤ‚M HแปŒC 2023-2024 (B...
Bร€I TแบฌP Bแป” TRแปข TIแบพNG ANH LแปšP 8 - Cแบข Nฤ‚M - FRIENDS PLUS - Nฤ‚M HแปŒC 2023-2024 (B...Bร€I TแบฌP Bแป” TRแปข TIแบพNG ANH LแปšP 8 - Cแบข Nฤ‚M - FRIENDS PLUS - Nฤ‚M HแปŒC 2023-2024 (B...
Bร€I TแบฌP Bแป” TRแปข TIแบพNG ANH LแปšP 8 - Cแบข Nฤ‚M - FRIENDS PLUS - Nฤ‚M HแปŒC 2023-2024 (B...
ย 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
ย 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
ย 
Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10
ย 
Ch-4 Forest Society and colonialism 2.pdf
Ch-4 Forest Society and colonialism 2.pdfCh-4 Forest Society and colonialism 2.pdf
Ch-4 Forest Society and colonialism 2.pdf
ย 
BPSC-105 important questions for june term end exam
BPSC-105 important questions for june term end examBPSC-105 important questions for june term end exam
BPSC-105 important questions for june term end exam
ย 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
ย 

Providing privacy aware incentives in mobile sensing systems

  • 1. Do Your Projects With Domain Expertsโ€ฆ Copyright ยฉ 2015 LeMeniz Infotech. All rights reserved Page number 1 LeMeniz Infotech 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com Providing Privacy-Aware Incentives in Mobile Sensing Systems Abstract Mobile sensing relies on data contributed by users through their mobile device (e.g., smart phone) to obtain useful information about people and their surroundings. However, users may not want to contribute due to lack of incentives and concerns on possible privacy leakage. To effectively promote user participation, both incentive and privacy issues should be addressed. Although incentive and privacy have been addressed separately in mobile sensing, it is still an open problem to address them simultaneously. We propose two credit-based privacy-aware incentive schemes for mobile sensing systems, where the focus is on privacy protection instead of on the design of incentive mechanisms. Our schemes enable mobile users to earn credits by contributing data without leaking which data they have contributed, and ensure that malicious users cannot abuse the system to earn unlimited credits. Specifically, the first scheme considers scenarios where an online trusted third party (TTP) is available, and relies on the TTP to protect user privacy and prevent abuse attacks. The second scheme considers scenarios where no online TTP is available. It applies blind signature, partially blind signature, and a novel extended Merkle tree technique to protect user privacy and prevent abuse attacks. Security analysis and cost evaluations show that our schemes are secure and efficient. INTRODUCTION The ever-increasing popularity of mobile devices such as smart phones and tablets and the rich set of embedded sensors that usually come with them (e.g., GPS, accelerometer and microphone) have created a huge opportunity of sensing.
  • 2. Do Your Projects With Domain Expertsโ€ฆ Copyright ยฉ 2015 LeMeniz Infotech. All rights reserved Page number 2 LeMeniz Infotech 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com Mobile sensing tries to harness this opportunity by collecting sensing data through mobile devices and utilizing the data to obtain rich information about people and their surroundings. It has many applications in healthcare, traffic monitoring, and environmental monitoring However, the large-scale deployment of mobile sensing applications is hindered by two obstacles. First, there is a lack of incentives for mobile device users to participate in mobile sensing. To participate, a user has to trigger her sensors to measure data (e.g., to obtain GPS locations), which may consume much power of her smart phone. Also, the user needs to upload data to a server which may consume much of her 3G data quota (e.g., when the data is photos) Existing system To participate, a user has to trigger her sensors to measure data (e.g., to obtain GPS locations), which may consume much power of her smart phone. Also, the user needs to upload data to a server which may consume much of her 3G data quota (e.g., when the data is photos). Moreover, the user may have to move to a specific location to sense the required data. Considering these efforts and resources required from the user, an incentive scheme is strongly desired for mobile sensing applications to proliferate. Second, private information may be derived from a userโ€™s contributed data. Such privacy concern also prevents users from participating. For instance, to monitor the propagation of a new flu, a server will collect information on who have been infected by this flu. However, a patient may not want to provide such information since it is very sensitive. To effectively motivate users to participate, both obstacles should be overcome.
  • 3. Do Your Projects With Domain Expertsโ€ฆ Copyright ยฉ 2015 LeMeniz Infotech. All rights reserved Page number 3 LeMeniz Infotech 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com Disadvantages ๏‚ท Lack of incentives. ๏‚ท It consumes much power. Proposed System To promote user participation, we proposed two credit based privacy-aware incentive schemes for mobile sensing, corresponding to scenarios with and without a TTP respectively. Mainly based on hash and HMAC functions, the TTP-based scheme has very low computation cost at each node. Based on blind signature, partially blind signature, and extended Merkle tree techniques, the TTP-free scheme has higher overhead than the TTP-based scheme but it ensures that no third party can break user privacy. Both schemes can efficiently support dynamic joins and leaves. Implementations show that both schemes have short running time and lower power consumption. Advantages ๏‚ท Computation cost is very low for each node. ๏‚ท No third party access. ๏‚ท Short running time and low power consumption. Hardware Requirement ๏‚ท System : Pentium IV 2.4 GHz. ๏‚ท Hard Disk : 40 GB. ๏‚ท Floppy Drive : 44 Mb. ๏‚ท Monitor : 15 VGA Colour.
  • 4. Do Your Projects With Domain Expertsโ€ฆ Copyright ยฉ 2015 LeMeniz Infotech. All rights reserved Page number 4 LeMeniz Infotech 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com ๏‚ท Mouse : Logitech ๏‚ท Ram : 512 Mb. ๏‚ท MOBILE : ANDROID Software Requirement ๏‚ท Operating system : Windows 7. ๏‚ท Coding Language : Java 1.7 ๏‚ท Tool Kit : Android 2.3 ABOVE ๏‚ท IDE : Eclipse