SlideShare a Scribd company logo
1 of 6
Anonymity-based Privacy-preserving Data
Reporting for Participatory Sensing
Abstract:
In this paper, we propose an efficient anonymous data reporting protocol for participatory
sensing, which provides strong privacy protection, data accuracy and generality. The
protocol consists of two stages, namely slot reservation and message submission. In the
slot reservation stage, a group of N participants cooperate to assign each member a
message slot in a vector which is essentially a message submission schedule, in such a
manner that each participant’s slot is oblivious to other members and the application
server. In the message submission stage, each participant transmits an encoded data to the
application server based on the slot information known only to herself, in such a way that
the application server cannot link a data to a specific participant. With such a data
reporting protocol, the link between the data and the participants is broken, and as a
result, participant’s privacy is protected. We conduct theoretical analysis of the
correctness and anonymity of our protocol, as well as experiments to demonstrate the
efficiency in small-scale applications with periodic data sampling.
Existing System:
 In existing methods, if the application server colludes with a global eavesdropper
who can monitor the traffic across the network, it can link each data with its
contributor.
 Privacy in participatory sensing systems has been addressed by many works,
instead of sending an accurate location to the server, spatial cloaking is employed
to calculate an anonymity set.
 As a result, the user is protected. The work in also follows this idea of
generalization, in which k pieces of data are combined together before sending to
the server, with the intension of adding enough “confusion” in the data to make it
difficult to obtain exact times and locations for the individual data.
Proposed system:
 Privacy in participatory sensing systems has been addressed by many works,
instead of sending an accurate location to the server, spatial cloaking is employed
to calculate an anonymity set.
 As a result, the user is protected. The work in also follows this idea of
generalization, in which k pieces of data are combined together before sending to
the server, with the intension of adding enough “confusion” in the data to make it
difficult to obtain exact times and locations for the individual data.
 The most efficient anonymous message protocol so far is proposed in , where a
((N, N)-SS) secret sharing protocol is employed for both slot reservation and data
submission.
 The computation is efficient, as it doesn’t use public key encryption. But the
communication cost is very heavy.
Problem statement:
Privacy protection is an important issue in participatory sensing. We propose an
anonymous data reporting protocol for participatory applications to protect user privacy.
The intuition behind the protocol is that, if the data itself does not contain identification
information, and we can break the link between the data and the participant that reports
the data, the user’s privacy can be protected. The anonymous data reporting protocol is
divided into two stages, a slot reservation stage and a data submission stage.
Implementation of modules:
System architecture:
In this Anonymity-based Privacy-preserving Data Reporting for Participatory Sensing
five modules such as given below,
1. Participant module.
2. Application Server module.
3. End Users module.
4. Privacy.
5. Trusted certificationauthority.
Participant Module:
particiaptor can submit online reports using public/private keys, that may be related to
personal ,group,community.participator can have limitation for submitting records into
the server.
Participator can perform the following works
 .participator registeration.
 participator login.
 view profile.
 slot reservation.
 Data submission.
Application Server module:
Application server is nothing but admin after admin login, he will collect the information
from the server and analyze the reports and prepare statistics, after that view the end user
requests.
Steps:
 server login.
 view participator online reports collect the statistics.
 view end user details.
Trusted Certification authority:
We assume that each participant Pi has a private/public key pair (xi, yi), and each
participant knows the public keys of all the others. Thus, all participants can identify each
other by public keys. In practice, the participants apply their key pairs from a trusted
certification authority whose job is to associate each individual with her public key. Or
alternatively, each participant can generate the key pair herself and publish the public key
at the application server, if she does not trust any authority.
Steps:
 login.
 view user requests.
 accept user slot requests and provide pair of public/private keys.
End User module:
User can view the online reports and give the feed backs according to the type of posts.
Steps:
 user registeration.
 user login.
 search
 give feed backs and suggestions.
Participatory Privacy sensing:
participating in a participatory sensing task, especially a community-scale task,
could result in private information leakage. Some tasks require users to submit
data containing sensitive information, for example, disease symptoms. Some
applications don’t directly use sensitive data, but still result in privacy leakage. For
example, in a power consumption monitoring application , from temporally fine-
grained energy consumption reports submitted by users, household activities can
be inferred easily. In addition, data in participatory sensing application are usually
geo- and timetagged. From multiple data reported by a participant, an adversary
can derive much sensitive information. Thus, users are reluctant to contribute to
the sensing campaigns, if their privacy cannot be protected.
A variety of methods have been proposed to protect the privacy of each participant
for participatory sensing applications. A naive mechanism to protect the privacy is
to use pseudonyms. However, as demonstrated in , the use of pseudonyms does
not necessarily guarantee privacy. Some privacy protection methods employ
generalization or perturbation, both of which intend to allow the application server
to determine community trends without revealing individual data, by deliberately
reducing the accuracy or precision of the sensed data.
Conclusion:
Privacy protection is an important issue in participatory sensing. We propose an
anonymous data reporting protocol for participatory applications to protect user privacy.
The intuition behind the protocol is that, if the data itself does not contain identification
information, and we can break the link between the data and the participant that reports
the data, the user’s privacy can be protected. The anonymous data reporting protocol is
divided into two stages, a slot reservation stage and a data submission stage. We propose
an anonymous slot reservation scheme based on public key encryption and message
shuffle, and a data submission scheme based on efficient XOR operation. The theoretical
analysis verifies the correctness and the anonymity of the protocol. The experiments
demonstrate that, for small-scale applications with only tens of participants where data is
collected in a periodic manner, the proposed protocol is efficient and applicable.
Anonymity based privacy-preserving data

More Related Content

What's hot

Location based authentication new words approch secuirity
Location based authentication new words approch secuirityLocation based authentication new words approch secuirity
Location based authentication new words approch secuiritySarath K
 
Scalable and secure sharing of personal health
Scalable and secure sharing of personal healthScalable and secure sharing of personal health
Scalable and secure sharing of personal healthShakas Technologies
 
Privacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesPrivacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesIGEEKS TECHNOLOGIES
 
A novel approach for trust management for peer peer
A novel approach for trust management for peer peerA novel approach for trust management for peer peer
A novel approach for trust management for peer peerSnehith
 
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...Nexgen Technology
 
exploiting service similarity for privacy in location-based search queries
exploiting service similarity for privacy in location-based search queriesexploiting service similarity for privacy in location-based search queries
exploiting service similarity for privacy in location-based search queriesswathi78
 
SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...
SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...
SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...I3E Technologies
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...JPINFOTECH JAYAPRAKASH
 
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Adz91 Digital Ads Pvt Ltd
 
JPD1435 Preserving Location Privacy in Geosocial Applications
JPD1435   Preserving Location Privacy in Geosocial ApplicationsJPD1435   Preserving Location Privacy in Geosocial Applications
JPD1435 Preserving Location Privacy in Geosocial Applicationschennaijp
 
Shared aythority ppt design [autosaved]
Shared  aythority  ppt design [autosaved]Shared  aythority  ppt design [autosaved]
Shared aythority ppt design [autosaved]Raj Kumar
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Naveena N
 
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...ieeepondy
 
6.designing secure and efficient biometric based secure access mechanism for ...
6.designing secure and efficient biometric based secure access mechanism for ...6.designing secure and efficient biometric based secure access mechanism for ...
6.designing secure and efficient biometric based secure access mechanism for ...Venkat Projects
 
Preserving location privacy in geo social applications
Preserving location privacy in geo social applications Preserving location privacy in geo social applications
Preserving location privacy in geo social applications Adz91 Digital Ads Pvt Ltd
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...IEEEFINALYEARPROJECTS
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...IEEEGLOBALSOFTTECHNOLOGIES
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...JPINFOTECH JAYAPRAKASH
 

What's hot (20)

Location based authentication new words approch secuirity
Location based authentication new words approch secuirityLocation based authentication new words approch secuirity
Location based authentication new words approch secuirity
 
A A A
A A AA A A
A A A
 
Scalable and secure sharing of personal health
Scalable and secure sharing of personal healthScalable and secure sharing of personal health
Scalable and secure sharing of personal health
 
Privacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesPrivacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devices
 
A novel approach for trust management for peer peer
A novel approach for trust management for peer peerA novel approach for trust management for peer peer
A novel approach for trust management for peer peer
 
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
 
exploiting service similarity for privacy in location-based search queries
exploiting service similarity for privacy in location-based search queriesexploiting service similarity for privacy in location-based search queries
exploiting service similarity for privacy in location-based search queries
 
SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...
SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...
SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
 
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...
 
JPD1435 Preserving Location Privacy in Geosocial Applications
JPD1435   Preserving Location Privacy in Geosocial ApplicationsJPD1435   Preserving Location Privacy in Geosocial Applications
JPD1435 Preserving Location Privacy in Geosocial Applications
 
Shared aythority ppt design [autosaved]
Shared  aythority  ppt design [autosaved]Shared  aythority  ppt design [autosaved]
Shared aythority ppt design [autosaved]
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
 
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...
 
AAA server
AAA serverAAA server
AAA server
 
6.designing secure and efficient biometric based secure access mechanism for ...
6.designing secure and efficient biometric based secure access mechanism for ...6.designing secure and efficient biometric based secure access mechanism for ...
6.designing secure and efficient biometric based secure access mechanism for ...
 
Preserving location privacy in geo social applications
Preserving location privacy in geo social applications Preserving location privacy in geo social applications
Preserving location privacy in geo social applications
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
 

Similar to Anonymity based privacy-preserving data

iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocolIaetsd Iaetsd
 
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMSA SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMSIJCI JOURNAL
 
A Privacy-Aware Tracking and Tracing System
A Privacy-Aware Tracking and Tracing SystemA Privacy-Aware Tracking and Tracing System
A Privacy-Aware Tracking and Tracing SystemIJCNCJournal
 
A Privacy-Aware Tracking and Tracing System
A Privacy-Aware Tracking and Tracing SystemA Privacy-Aware Tracking and Tracing System
A Privacy-Aware Tracking and Tracing SystemIJCNCJournal
 
privacy preserving abstract
 privacy preserving abstract privacy preserving abstract
privacy preserving abstractmuhammed jassim k
 
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...IRJET Journal
 
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...IJCERT JOURNAL
 
Secure system based on recombined fingerprints for sharing multimedia files i...
Secure system based on recombined fingerprints for sharing multimedia files i...Secure system based on recombined fingerprints for sharing multimedia files i...
Secure system based on recombined fingerprints for sharing multimedia files i...eSAT Journals
 
A Survey on Privacy in Social Networking Websites
A Survey on Privacy in Social Networking WebsitesA Survey on Privacy in Social Networking Websites
A Survey on Privacy in Social Networking WebsitesIRJET Journal
 
710201940
710201940710201940
710201940IJRAT
 
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...IRJET Journal
 
Trust management in p2 p systems
Trust management in p2 p systemsTrust management in p2 p systems
Trust management in p2 p systemseSAT Journals
 
JPJ1424 Privacy-Preserving and Content-Protecting Location Based Queries
JPJ1424  Privacy-Preserving and Content-Protecting Location Based QueriesJPJ1424  Privacy-Preserving and Content-Protecting Location Based Queries
JPJ1424 Privacy-Preserving and Content-Protecting Location Based Querieschennaijp
 
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVMIRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVMIRJET Journal
 
Measuring privacy in online social
Measuring privacy in online socialMeasuring privacy in online social
Measuring privacy in online socialijsptm
 
Security Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party AuditorSecurity Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party Auditorijsrd.com
 
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud StorageAttribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud StorageIJSRD
 
A Framework for Secure Computations with Two Non-Colluding Servers and Multip...
A Framework for Secure Computations with Two Non-Colluding Servers and Multip...A Framework for Secure Computations with Two Non-Colluding Servers and Multip...
A Framework for Secure Computations with Two Non-Colluding Servers and Multip...1crore projects
 
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network SecurityWhitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network SecurityHappiest Minds Technologies
 

Similar to Anonymity based privacy-preserving data (20)

iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
 
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMSA SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
 
A Privacy-Aware Tracking and Tracing System
A Privacy-Aware Tracking and Tracing SystemA Privacy-Aware Tracking and Tracing System
A Privacy-Aware Tracking and Tracing System
 
A Privacy-Aware Tracking and Tracing System
A Privacy-Aware Tracking and Tracing SystemA Privacy-Aware Tracking and Tracing System
A Privacy-Aware Tracking and Tracing System
 
privacy preserving abstract
 privacy preserving abstract privacy preserving abstract
privacy preserving abstract
 
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
 
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
 
Secure system based on recombined fingerprints for sharing multimedia files i...
Secure system based on recombined fingerprints for sharing multimedia files i...Secure system based on recombined fingerprints for sharing multimedia files i...
Secure system based on recombined fingerprints for sharing multimedia files i...
 
H0362052056
H0362052056H0362052056
H0362052056
 
A Survey on Privacy in Social Networking Websites
A Survey on Privacy in Social Networking WebsitesA Survey on Privacy in Social Networking Websites
A Survey on Privacy in Social Networking Websites
 
710201940
710201940710201940
710201940
 
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
 
Trust management in p2 p systems
Trust management in p2 p systemsTrust management in p2 p systems
Trust management in p2 p systems
 
JPJ1424 Privacy-Preserving and Content-Protecting Location Based Queries
JPJ1424  Privacy-Preserving and Content-Protecting Location Based QueriesJPJ1424  Privacy-Preserving and Content-Protecting Location Based Queries
JPJ1424 Privacy-Preserving and Content-Protecting Location Based Queries
 
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVMIRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
 
Measuring privacy in online social
Measuring privacy in online socialMeasuring privacy in online social
Measuring privacy in online social
 
Security Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party AuditorSecurity Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party Auditor
 
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud StorageAttribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
 
A Framework for Secure Computations with Two Non-Colluding Servers and Multip...
A Framework for Secure Computations with Two Non-Colluding Servers and Multip...A Framework for Secure Computations with Two Non-Colluding Servers and Multip...
A Framework for Secure Computations with Two Non-Colluding Servers and Multip...
 
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network SecurityWhitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
 

Recently uploaded

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 

Recently uploaded (20)

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 

Anonymity based privacy-preserving data

  • 1. Anonymity-based Privacy-preserving Data Reporting for Participatory Sensing Abstract: In this paper, we propose an efficient anonymous data reporting protocol for participatory sensing, which provides strong privacy protection, data accuracy and generality. The protocol consists of two stages, namely slot reservation and message submission. In the slot reservation stage, a group of N participants cooperate to assign each member a message slot in a vector which is essentially a message submission schedule, in such a manner that each participant’s slot is oblivious to other members and the application server. In the message submission stage, each participant transmits an encoded data to the application server based on the slot information known only to herself, in such a way that the application server cannot link a data to a specific participant. With such a data reporting protocol, the link between the data and the participants is broken, and as a result, participant’s privacy is protected. We conduct theoretical analysis of the correctness and anonymity of our protocol, as well as experiments to demonstrate the efficiency in small-scale applications with periodic data sampling. Existing System:  In existing methods, if the application server colludes with a global eavesdropper who can monitor the traffic across the network, it can link each data with its contributor.  Privacy in participatory sensing systems has been addressed by many works, instead of sending an accurate location to the server, spatial cloaking is employed to calculate an anonymity set.  As a result, the user is protected. The work in also follows this idea of generalization, in which k pieces of data are combined together before sending to
  • 2. the server, with the intension of adding enough “confusion” in the data to make it difficult to obtain exact times and locations for the individual data. Proposed system:  Privacy in participatory sensing systems has been addressed by many works, instead of sending an accurate location to the server, spatial cloaking is employed to calculate an anonymity set.  As a result, the user is protected. The work in also follows this idea of generalization, in which k pieces of data are combined together before sending to the server, with the intension of adding enough “confusion” in the data to make it difficult to obtain exact times and locations for the individual data.  The most efficient anonymous message protocol so far is proposed in , where a ((N, N)-SS) secret sharing protocol is employed for both slot reservation and data submission.  The computation is efficient, as it doesn’t use public key encryption. But the communication cost is very heavy. Problem statement: Privacy protection is an important issue in participatory sensing. We propose an anonymous data reporting protocol for participatory applications to protect user privacy. The intuition behind the protocol is that, if the data itself does not contain identification information, and we can break the link between the data and the participant that reports the data, the user’s privacy can be protected. The anonymous data reporting protocol is divided into two stages, a slot reservation stage and a data submission stage.
  • 3. Implementation of modules: System architecture: In this Anonymity-based Privacy-preserving Data Reporting for Participatory Sensing five modules such as given below, 1. Participant module. 2. Application Server module. 3. End Users module. 4. Privacy. 5. Trusted certificationauthority. Participant Module: particiaptor can submit online reports using public/private keys, that may be related to personal ,group,community.participator can have limitation for submitting records into the server. Participator can perform the following works  .participator registeration.
  • 4.  participator login.  view profile.  slot reservation.  Data submission. Application Server module: Application server is nothing but admin after admin login, he will collect the information from the server and analyze the reports and prepare statistics, after that view the end user requests. Steps:  server login.  view participator online reports collect the statistics.  view end user details. Trusted Certification authority: We assume that each participant Pi has a private/public key pair (xi, yi), and each participant knows the public keys of all the others. Thus, all participants can identify each other by public keys. In practice, the participants apply their key pairs from a trusted certification authority whose job is to associate each individual with her public key. Or alternatively, each participant can generate the key pair herself and publish the public key at the application server, if she does not trust any authority. Steps:  login.  view user requests.  accept user slot requests and provide pair of public/private keys. End User module: User can view the online reports and give the feed backs according to the type of posts. Steps:  user registeration.  user login.  search
  • 5.  give feed backs and suggestions. Participatory Privacy sensing: participating in a participatory sensing task, especially a community-scale task, could result in private information leakage. Some tasks require users to submit data containing sensitive information, for example, disease symptoms. Some applications don’t directly use sensitive data, but still result in privacy leakage. For example, in a power consumption monitoring application , from temporally fine- grained energy consumption reports submitted by users, household activities can be inferred easily. In addition, data in participatory sensing application are usually geo- and timetagged. From multiple data reported by a participant, an adversary can derive much sensitive information. Thus, users are reluctant to contribute to the sensing campaigns, if their privacy cannot be protected. A variety of methods have been proposed to protect the privacy of each participant for participatory sensing applications. A naive mechanism to protect the privacy is to use pseudonyms. However, as demonstrated in , the use of pseudonyms does not necessarily guarantee privacy. Some privacy protection methods employ generalization or perturbation, both of which intend to allow the application server to determine community trends without revealing individual data, by deliberately reducing the accuracy or precision of the sensed data. Conclusion: Privacy protection is an important issue in participatory sensing. We propose an anonymous data reporting protocol for participatory applications to protect user privacy. The intuition behind the protocol is that, if the data itself does not contain identification information, and we can break the link between the data and the participant that reports the data, the user’s privacy can be protected. The anonymous data reporting protocol is divided into two stages, a slot reservation stage and a data submission stage. We propose an anonymous slot reservation scheme based on public key encryption and message shuffle, and a data submission scheme based on efficient XOR operation. The theoretical analysis verifies the correctness and the anonymity of the protocol. The experiments demonstrate that, for small-scale applications with only tens of participants where data is collected in a periodic manner, the proposed protocol is efficient and applicable.