SlideShare a Scribd company logo
1 of 3
Efficient and Privacy Aware Data Aggregation in Mobile Sensing 
Efficient and Privacy Aware Data Aggregation in Mobile Sensing 
The proliferation and ever-increasing capabilities of mobile devices such as smart phones give 
rise to a variety of mobile sensing applications. This paper studies how an untrusted aggregator 
in mobile sensing can periodically obtain desired statistics over the data contributed by multiple 
mobile users, without compromising the privacy of each user. Although there are some existing 
works in this area, they either require bidirectional communications between the aggregator and 
mobile users in every aggregation period, or have high-computation overhead and cannot support 
large plaintext spaces. Also, they do not consider the Min aggregate, which is quite useful in 
mobile sensing. To address these problems, we propose an efficient protocol to obtain the Sum 
aggregate, which employs an additive homomorphic encryption and a novel key management 
technique to support large plaintext space. We also extend the sum aggregation protocol to 
obtain the Min aggregate of time-series data. To deal with dynamic joins and leaves of mobile 
users, we propose a scheme that utilizes the redundancy in security to reduce the communication 
cost for each join and leave. Evaluations show that our protocols are orders of magnitude faster 
than existing solutions, and it has much lower communication overhead. 
 Sensor data aggregation assumes a trusted aggregator, and hence cannot protect user 
privacy against an untrusted aggregator in mobile sensing applications. Several recent 
works consider the aggregation of time-series data in the presence of an untrusted 
aggregator. To protect user privacy, they design encryption schemes in which the 
aggregator can only decrypt the sum of all users’ data but nothing else. 
 Use threshold Paillier cryptosystem to build such an encryption scheme. To decrypt the 
sum, their scheme needs an extra round of interaction between the aggregator and all 
users in every aggregation period, which means high communication cost and long delay. 
Moreover, it requires all users to be online until decryption is completed, which may not 
be practical in many mobile sensing scenarios due to user mobility and the heterogeneity 
of user connectivity. 
Contact: 9703109334, 9533694296 
ABSTRACT: 
EXISTING SYSTEM: 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
Efficient and Privacy Aware Data Aggregation in Mobile Sensing 
DISADVANTAGES OF EXISTING SYSTEM: 
 Cannot protect user privacy against untrusted aggregators. 
 Existing works do not consider the Min of time-series data. 
 We propose a new privacy-preserving protocol to obtain the Sum aggregate of time-series 
Contact: 9703109334, 9533694296 
PROPOSED SYSTEM: 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in 
data. 
 The protocol utilizes additive homomorphic encryption and a novel, HMAC- based key 
management technique to perform extremely efficient aggregation. 
ADVANTAGES OF PROPOSED SYSTEM: 
 Our scheme has much lower communication overhead than existing work. 
 Utilizes the redundancy in security to reduce the communication cost for each join and 
leave. 
SYSTEM ARCHITECTURE:
Efficient and Privacy Aware Data Aggregation in Mobile Sensing 
SYSTEM REQUIREMENTS: 
HARDWARE REQUIREMENTS: 
 System : Pentium IV 2.4 GHz. 
 Hard Disk : 40 GB. 
 Floppy Drive : 1.44 Mb. 
 Monitor : 15 VGA Colour. 
 Mouse : Logitech. 
 Ram : 512 Mb. 
SOFTWARE REQUIREMENTS: 
 Operating system : Windows XP/7. 
 Coding Language : JAVA/J2EE 
 IDE : Netbeans 7.4 
 Database : MYSQL 
Qinghua Li, Guohong Cao, and Thomas F. La Porta, “Efficient and Privacy-Aware Data 
Aggregation in Mobile Sensing”, VOL. 11, NO. 2, MARCH/APRIL 2014. 
Contact: 9703109334, 9533694296 
REFERENCE: 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in

More Related Content

What's hot

Pvr technologies 2014 java ieee project titles
Pvr technologies 2014 java ieee project titlesPvr technologies 2014 java ieee project titles
Pvr technologies 2014 java ieee project titlesPvrtechnologies Nellore
 
Hebeon technologies providingfinal year ieee projects title 2014
Hebeon technologies providingfinal year  ieee projects title 2014Hebeon technologies providingfinal year  ieee projects title 2014
Hebeon technologies providingfinal year ieee projects title 2014Hebe On
 
Pvr technologies 2013 java ieee project titles
Pvr technologies 2013 java ieee project titlesPvr technologies 2013 java ieee project titles
Pvr technologies 2013 java ieee project titlesPvrtechnologies Nellore
 
Hebeon Technologies Providing Final year IEEE Projects Title 2014-2015
Hebeon Technologies Providing Final year  IEEE Projects Title 2014-2015Hebeon Technologies Providing Final year  IEEE Projects Title 2014-2015
Hebeon Technologies Providing Final year IEEE Projects Title 2014-2015Hebe On
 
Latest Networking Research Project Topics
 Latest Networking Research  Project Topics Latest Networking Research  Project Topics
Latest Networking Research Project TopicsNetwork Simulation Tools
 
DOTNET TITLES 2014 FROM SHPINE TECHNOLOGIES
DOTNET TITLES 2014 FROM SHPINE TECHNOLOGIESDOTNET TITLES 2014 FROM SHPINE TECHNOLOGIES
DOTNET TITLES 2014 FROM SHPINE TECHNOLOGIESSHPINE TECHNOLOGIES
 
Global tech project list
Global tech project listGlobal tech project list
Global tech project listJayesh Buwa
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsFinalyearprojects Toall
 
cloud security using Fog Computing
cloud security using Fog Computingcloud security using Fog Computing
cloud security using Fog Computingarchana lisbon
 
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...Nexgen Technology
 
A lightweight secure scheme for detecting
A lightweight secure scheme for detectingA lightweight secure scheme for detecting
A lightweight secure scheme for detectingjpstudcorner
 
Hybrid attribute and re-encryption-based key management for secure and scala...
Hybrid attribute  and re-encryption-based key management for secure and scala...Hybrid attribute  and re-encryption-based key management for secure and scala...
Hybrid attribute and re-encryption-based key management for secure and scala...Papitha Velumani
 
Hybrid attribute and re-encryption-based key management for secure and scala...
Hybrid attribute  and re-encryption-based key management for secure and scala...Hybrid attribute  and re-encryption-based key management for secure and scala...
Hybrid attribute and re-encryption-based key management for secure and scala...Papitha Velumani
 
Privacy Techniques in Fourth Generation Heterogeneous Networks
Privacy Techniques in Fourth Generation Heterogeneous NetworksPrivacy Techniques in Fourth Generation Heterogeneous Networks
Privacy Techniques in Fourth Generation Heterogeneous Networksdimgkik
 

What's hot (18)

E2matrix
E2matrixE2matrix
E2matrix
 
Pvr technologies 2014 java ieee project titles
Pvr technologies 2014 java ieee project titlesPvr technologies 2014 java ieee project titles
Pvr technologies 2014 java ieee project titles
 
Hebeon technologies providingfinal year ieee projects title 2014
Hebeon technologies providingfinal year  ieee projects title 2014Hebeon technologies providingfinal year  ieee projects title 2014
Hebeon technologies providingfinal year ieee projects title 2014
 
Pvr technologies 2013 java ieee project titles
Pvr technologies 2013 java ieee project titlesPvr technologies 2013 java ieee project titles
Pvr technologies 2013 java ieee project titles
 
2015 ieee projects in bangalore
2015 ieee projects in bangalore2015 ieee projects in bangalore
2015 ieee projects in bangalore
 
23
2323
23
 
Hebeon Technologies Providing Final year IEEE Projects Title 2014-2015
Hebeon Technologies Providing Final year  IEEE Projects Title 2014-2015Hebeon Technologies Providing Final year  IEEE Projects Title 2014-2015
Hebeon Technologies Providing Final year IEEE Projects Title 2014-2015
 
Latest Networking Research Project Topics
 Latest Networking Research  Project Topics Latest Networking Research  Project Topics
Latest Networking Research Project Topics
 
DOTNET TITLES 2014 FROM SHPINE TECHNOLOGIES
DOTNET TITLES 2014 FROM SHPINE TECHNOLOGIESDOTNET TITLES 2014 FROM SHPINE TECHNOLOGIES
DOTNET TITLES 2014 FROM SHPINE TECHNOLOGIES
 
Global tech project list
Global tech project listGlobal tech project list
Global tech project list
 
Ieee 2014 projects
Ieee 2014 projectsIeee 2014 projects
Ieee 2014 projects
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure clouds
 
cloud security using Fog Computing
cloud security using Fog Computingcloud security using Fog Computing
cloud security using Fog Computing
 
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
 
A lightweight secure scheme for detecting
A lightweight secure scheme for detectingA lightweight secure scheme for detecting
A lightweight secure scheme for detecting
 
Hybrid attribute and re-encryption-based key management for secure and scala...
Hybrid attribute  and re-encryption-based key management for secure and scala...Hybrid attribute  and re-encryption-based key management for secure and scala...
Hybrid attribute and re-encryption-based key management for secure and scala...
 
Hybrid attribute and re-encryption-based key management for secure and scala...
Hybrid attribute  and re-encryption-based key management for secure and scala...Hybrid attribute  and re-encryption-based key management for secure and scala...
Hybrid attribute and re-encryption-based key management for secure and scala...
 
Privacy Techniques in Fourth Generation Heterogeneous Networks
Privacy Techniques in Fourth Generation Heterogeneous NetworksPrivacy Techniques in Fourth Generation Heterogeneous Networks
Privacy Techniques in Fourth Generation Heterogeneous Networks
 

Similar to efficient and privacy aware data aggregation in mobile sensing

2014 IEEE JAVA NETWORK SECURITY PROJECT Efficient and privacy aware data aggr...
2014 IEEE JAVA NETWORK SECURITY PROJECT Efficient and privacy aware data aggr...2014 IEEE JAVA NETWORK SECURITY PROJECT Efficient and privacy aware data aggr...
2014 IEEE JAVA NETWORK SECURITY PROJECT Efficient and privacy aware data aggr...IEEEBEBTECHSTUDENTSPROJECTS
 
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...IEEEGLOBALSOFTSTUDENTPROJECTS
 
Efficient and privacy aware data aggregation in mobile sensing
Efficient and privacy aware data aggregation in mobile sensingEfficient and privacy aware data aggregation in mobile sensing
Efficient and privacy aware data aggregation in mobile sensingPapitha Velumani
 
2014 IEEE JAVA MOBILE COMPUTING PROJECT Efficient and privacy aware data aggr...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Efficient and privacy aware data aggr...2014 IEEE JAVA MOBILE COMPUTING PROJECT Efficient and privacy aware data aggr...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Efficient and privacy aware data aggr...IEEEFINALYEARSTUDENTSPROJECTS
 
2014 IEEE JAVA MOBILE COMPUTING PROJECT Efficient and privacy aware data aggr...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Efficient and privacy aware data aggr...2014 IEEE JAVA MOBILE COMPUTING PROJECT Efficient and privacy aware data aggr...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Efficient and privacy aware data aggr...IEEEFINALYEARSTUDENTPROJECT
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Efficient and privacy aware data agg...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Efficient and privacy aware data agg...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Efficient and privacy aware data agg...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Efficient and privacy aware data agg...IEEEFINALYEARSTUDENTPROJECTS
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET Journal
 
Iaetsd enhancement of performance and security in bigdata processing
Iaetsd enhancement of performance and security in bigdata processingIaetsd enhancement of performance and security in bigdata processing
Iaetsd enhancement of performance and security in bigdata processingIaetsd Iaetsd
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud assisted mobile-access of healt...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud assisted mobile-access of healt...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud assisted mobile-access of healt...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud assisted mobile-access of healt...IEEEGLOBALSOFTSTUDENTPROJECTS
 
2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...IEEEFINALYEARSTUDENTSPROJECTS
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...IEEEFINALYEARSTUDENTPROJECTS
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT Cloud assisted mobile-access of health...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Cloud assisted mobile-access of health...2014 IEEE JAVA CLOUD COMPUTING PROJECT Cloud assisted mobile-access of health...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Cloud assisted mobile-access of health...IEEEFINALSEMSTUDENTPROJECTS
 
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin AlgorithmA Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin AlgorithmEditor IJMTER
 
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVMIRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVMIRJET Journal
 
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...dbpublications
 
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud StorageAttribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud StorageIJSRD
 
Multi-Server Authentication Key Exchange Approach in BIGDATA Environment
Multi-Server Authentication Key Exchange Approach in BIGDATA EnvironmentMulti-Server Authentication Key Exchange Approach in BIGDATA Environment
Multi-Server Authentication Key Exchange Approach in BIGDATA EnvironmentIRJET Journal
 
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTINGSECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTINGIJNSA Journal
 
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTINGSECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTINGIJNSA Journal
 

Similar to efficient and privacy aware data aggregation in mobile sensing (20)

2014 IEEE JAVA NETWORK SECURITY PROJECT Efficient and privacy aware data aggr...
2014 IEEE JAVA NETWORK SECURITY PROJECT Efficient and privacy aware data aggr...2014 IEEE JAVA NETWORK SECURITY PROJECT Efficient and privacy aware data aggr...
2014 IEEE JAVA NETWORK SECURITY PROJECT Efficient and privacy aware data aggr...
 
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
 
Efficient and privacy aware data aggregation in mobile sensing
Efficient and privacy aware data aggregation in mobile sensingEfficient and privacy aware data aggregation in mobile sensing
Efficient and privacy aware data aggregation in mobile sensing
 
2014 IEEE JAVA MOBILE COMPUTING PROJECT Efficient and privacy aware data aggr...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Efficient and privacy aware data aggr...2014 IEEE JAVA MOBILE COMPUTING PROJECT Efficient and privacy aware data aggr...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Efficient and privacy aware data aggr...
 
2014 IEEE JAVA MOBILE COMPUTING PROJECT Efficient and privacy aware data aggr...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Efficient and privacy aware data aggr...2014 IEEE JAVA MOBILE COMPUTING PROJECT Efficient and privacy aware data aggr...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Efficient and privacy aware data aggr...
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Efficient and privacy aware data agg...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Efficient and privacy aware data agg...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Efficient and privacy aware data agg...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Efficient and privacy aware data agg...
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
 
Iaetsd enhancement of performance and security in bigdata processing
Iaetsd enhancement of performance and security in bigdata processingIaetsd enhancement of performance and security in bigdata processing
Iaetsd enhancement of performance and security in bigdata processing
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud assisted mobile-access of healt...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud assisted mobile-access of healt...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud assisted mobile-access of healt...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud assisted mobile-access of healt...
 
2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT Cloud assisted mobile-access of health...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Cloud assisted mobile-access of health...2014 IEEE JAVA CLOUD COMPUTING PROJECT Cloud assisted mobile-access of health...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Cloud assisted mobile-access of health...
 
23
2323
23
 
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin AlgorithmA Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
 
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVMIRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
 
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
 
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud StorageAttribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
 
Multi-Server Authentication Key Exchange Approach in BIGDATA Environment
Multi-Server Authentication Key Exchange Approach in BIGDATA EnvironmentMulti-Server Authentication Key Exchange Approach in BIGDATA Environment
Multi-Server Authentication Key Exchange Approach in BIGDATA Environment
 
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTINGSECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
 
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTINGSECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
 

More from swathi78

secure mining of association rules in horizontally distributed databases
secure mining of association rules in horizontally distributed databasessecure mining of association rules in horizontally distributed databases
secure mining of association rules in horizontally distributed databasesswathi78
 
a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...swathi78
 
web service recommendation via exploiting location and qo s information
web service recommendation via exploiting location and qo s informationweb service recommendation via exploiting location and qo s information
web service recommendation via exploiting location and qo s informationswathi78
 
privacy-enhanced web service composition
privacy-enhanced web service compositionprivacy-enhanced web service composition
privacy-enhanced web service compositionswathi78
 
optimal distributed malware defense in mobile networks with heterogeneous dev...
optimal distributed malware defense in mobile networks with heterogeneous dev...optimal distributed malware defense in mobile networks with heterogeneous dev...
optimal distributed malware defense in mobile networks with heterogeneous dev...swathi78
 
friend book a semantic-based friend recommendation system for social networks
friend book a semantic-based friend recommendation system for social networksfriend book a semantic-based friend recommendation system for social networks
friend book a semantic-based friend recommendation system for social networksswathi78
 
efficient authentication for mobile and pervasive computing
efficient authentication for mobile and pervasive computingefficient authentication for mobile and pervasive computing
efficient authentication for mobile and pervasive computingswathi78
 
cooperative caching for efficient data access in disruption tolerant networks
cooperative caching for efficient data access in disruption tolerant networkscooperative caching for efficient data access in disruption tolerant networks
cooperative caching for efficient data access in disruption tolerant networksswathi78
 
an incentive framework for cellular traffic offloading
an incentive framework for cellular traffic offloadingan incentive framework for cellular traffic offloading
an incentive framework for cellular traffic offloadingswathi78
 
secure outsourced attribute-based signatures
secure outsourced attribute-based signaturessecure outsourced attribute-based signatures
secure outsourced attribute-based signaturesswathi78
 
traffic pattern-based content leakage detection for trusted content delivery ...
traffic pattern-based content leakage detection for trusted content delivery ...traffic pattern-based content leakage detection for trusted content delivery ...
traffic pattern-based content leakage detection for trusted content delivery ...swathi78
 
the design and evaluation of an information sharing system for human networks
the design and evaluation of an information sharing system for human networksthe design and evaluation of an information sharing system for human networks
the design and evaluation of an information sharing system for human networksswathi78
 
the client assignment problem for continuous distributed interactive applicat...
the client assignment problem for continuous distributed interactive applicat...the client assignment problem for continuous distributed interactive applicat...
the client assignment problem for continuous distributed interactive applicat...swathi78
 
sos a distributed mobile q&a system based on social networks
sos a distributed mobile q&a system based on social networkssos a distributed mobile q&a system based on social networks
sos a distributed mobile q&a system based on social networksswathi78
 
securing broker-less publish subscribe systems using identity-based encryption
securing broker-less publish subscribe systems using identity-based encryptionsecuring broker-less publish subscribe systems using identity-based encryption
securing broker-less publish subscribe systems using identity-based encryptionswathi78
 
rre a game-theoretic intrusion response and recovery engine
rre a game-theoretic intrusion response and recovery enginerre a game-theoretic intrusion response and recovery engine
rre a game-theoretic intrusion response and recovery engineswathi78
 
on false data-injection attacks against power system state estimation modelin...
on false data-injection attacks against power system state estimation modelin...on false data-injection attacks against power system state estimation modelin...
on false data-injection attacks against power system state estimation modelin...swathi78
 
loca ward a security and privacy aware location-based rewarding system
loca ward a security and privacy aware location-based rewarding systemloca ward a security and privacy aware location-based rewarding system
loca ward a security and privacy aware location-based rewarding systemswathi78
 
exploiting service similarity for privacy in location-based search queries
exploiting service similarity for privacy in location-based search queriesexploiting service similarity for privacy in location-based search queries
exploiting service similarity for privacy in location-based search queriesswathi78
 
enabling trustworthy service evaluation in service-oriented mobile social net...
enabling trustworthy service evaluation in service-oriented mobile social net...enabling trustworthy service evaluation in service-oriented mobile social net...
enabling trustworthy service evaluation in service-oriented mobile social net...swathi78
 

More from swathi78 (20)

secure mining of association rules in horizontally distributed databases
secure mining of association rules in horizontally distributed databasessecure mining of association rules in horizontally distributed databases
secure mining of association rules in horizontally distributed databases
 
a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...
 
web service recommendation via exploiting location and qo s information
web service recommendation via exploiting location and qo s informationweb service recommendation via exploiting location and qo s information
web service recommendation via exploiting location and qo s information
 
privacy-enhanced web service composition
privacy-enhanced web service compositionprivacy-enhanced web service composition
privacy-enhanced web service composition
 
optimal distributed malware defense in mobile networks with heterogeneous dev...
optimal distributed malware defense in mobile networks with heterogeneous dev...optimal distributed malware defense in mobile networks with heterogeneous dev...
optimal distributed malware defense in mobile networks with heterogeneous dev...
 
friend book a semantic-based friend recommendation system for social networks
friend book a semantic-based friend recommendation system for social networksfriend book a semantic-based friend recommendation system for social networks
friend book a semantic-based friend recommendation system for social networks
 
efficient authentication for mobile and pervasive computing
efficient authentication for mobile and pervasive computingefficient authentication for mobile and pervasive computing
efficient authentication for mobile and pervasive computing
 
cooperative caching for efficient data access in disruption tolerant networks
cooperative caching for efficient data access in disruption tolerant networkscooperative caching for efficient data access in disruption tolerant networks
cooperative caching for efficient data access in disruption tolerant networks
 
an incentive framework for cellular traffic offloading
an incentive framework for cellular traffic offloadingan incentive framework for cellular traffic offloading
an incentive framework for cellular traffic offloading
 
secure outsourced attribute-based signatures
secure outsourced attribute-based signaturessecure outsourced attribute-based signatures
secure outsourced attribute-based signatures
 
traffic pattern-based content leakage detection for trusted content delivery ...
traffic pattern-based content leakage detection for trusted content delivery ...traffic pattern-based content leakage detection for trusted content delivery ...
traffic pattern-based content leakage detection for trusted content delivery ...
 
the design and evaluation of an information sharing system for human networks
the design and evaluation of an information sharing system for human networksthe design and evaluation of an information sharing system for human networks
the design and evaluation of an information sharing system for human networks
 
the client assignment problem for continuous distributed interactive applicat...
the client assignment problem for continuous distributed interactive applicat...the client assignment problem for continuous distributed interactive applicat...
the client assignment problem for continuous distributed interactive applicat...
 
sos a distributed mobile q&a system based on social networks
sos a distributed mobile q&a system based on social networkssos a distributed mobile q&a system based on social networks
sos a distributed mobile q&a system based on social networks
 
securing broker-less publish subscribe systems using identity-based encryption
securing broker-less publish subscribe systems using identity-based encryptionsecuring broker-less publish subscribe systems using identity-based encryption
securing broker-less publish subscribe systems using identity-based encryption
 
rre a game-theoretic intrusion response and recovery engine
rre a game-theoretic intrusion response and recovery enginerre a game-theoretic intrusion response and recovery engine
rre a game-theoretic intrusion response and recovery engine
 
on false data-injection attacks against power system state estimation modelin...
on false data-injection attacks against power system state estimation modelin...on false data-injection attacks against power system state estimation modelin...
on false data-injection attacks against power system state estimation modelin...
 
loca ward a security and privacy aware location-based rewarding system
loca ward a security and privacy aware location-based rewarding systemloca ward a security and privacy aware location-based rewarding system
loca ward a security and privacy aware location-based rewarding system
 
exploiting service similarity for privacy in location-based search queries
exploiting service similarity for privacy in location-based search queriesexploiting service similarity for privacy in location-based search queries
exploiting service similarity for privacy in location-based search queries
 
enabling trustworthy service evaluation in service-oriented mobile social net...
enabling trustworthy service evaluation in service-oriented mobile social net...enabling trustworthy service evaluation in service-oriented mobile social net...
enabling trustworthy service evaluation in service-oriented mobile social net...
 

Recently uploaded

APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 

Recently uploaded (20)

APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 

efficient and privacy aware data aggregation in mobile sensing

  • 1. Efficient and Privacy Aware Data Aggregation in Mobile Sensing Efficient and Privacy Aware Data Aggregation in Mobile Sensing The proliferation and ever-increasing capabilities of mobile devices such as smart phones give rise to a variety of mobile sensing applications. This paper studies how an untrusted aggregator in mobile sensing can periodically obtain desired statistics over the data contributed by multiple mobile users, without compromising the privacy of each user. Although there are some existing works in this area, they either require bidirectional communications between the aggregator and mobile users in every aggregation period, or have high-computation overhead and cannot support large plaintext spaces. Also, they do not consider the Min aggregate, which is quite useful in mobile sensing. To address these problems, we propose an efficient protocol to obtain the Sum aggregate, which employs an additive homomorphic encryption and a novel key management technique to support large plaintext space. We also extend the sum aggregation protocol to obtain the Min aggregate of time-series data. To deal with dynamic joins and leaves of mobile users, we propose a scheme that utilizes the redundancy in security to reduce the communication cost for each join and leave. Evaluations show that our protocols are orders of magnitude faster than existing solutions, and it has much lower communication overhead.  Sensor data aggregation assumes a trusted aggregator, and hence cannot protect user privacy against an untrusted aggregator in mobile sensing applications. Several recent works consider the aggregation of time-series data in the presence of an untrusted aggregator. To protect user privacy, they design encryption schemes in which the aggregator can only decrypt the sum of all users’ data but nothing else.  Use threshold Paillier cryptosystem to build such an encryption scheme. To decrypt the sum, their scheme needs an extra round of interaction between the aggregator and all users in every aggregation period, which means high communication cost and long delay. Moreover, it requires all users to be online until decryption is completed, which may not be practical in many mobile sensing scenarios due to user mobility and the heterogeneity of user connectivity. Contact: 9703109334, 9533694296 ABSTRACT: EXISTING SYSTEM: Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
  • 2. Efficient and Privacy Aware Data Aggregation in Mobile Sensing DISADVANTAGES OF EXISTING SYSTEM:  Cannot protect user privacy against untrusted aggregators.  Existing works do not consider the Min of time-series data.  We propose a new privacy-preserving protocol to obtain the Sum aggregate of time-series Contact: 9703109334, 9533694296 PROPOSED SYSTEM: Email id: academicliveprojects@gmail.com, www.logicsystems.org.in data.  The protocol utilizes additive homomorphic encryption and a novel, HMAC- based key management technique to perform extremely efficient aggregation. ADVANTAGES OF PROPOSED SYSTEM:  Our scheme has much lower communication overhead than existing work.  Utilizes the redundancy in security to reduce the communication cost for each join and leave. SYSTEM ARCHITECTURE:
  • 3. Efficient and Privacy Aware Data Aggregation in Mobile Sensing SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7.  Coding Language : JAVA/J2EE  IDE : Netbeans 7.4  Database : MYSQL Qinghua Li, Guohong Cao, and Thomas F. La Porta, “Efficient and Privacy-Aware Data Aggregation in Mobile Sensing”, VOL. 11, NO. 2, MARCH/APRIL 2014. Contact: 9703109334, 9533694296 REFERENCE: Email id: academicliveprojects@gmail.com, www.logicsystems.org.in