Privacy-Aware Data Aggregation Mechanism for Mobile Sensors
Keywords:
WSN, Data Aggregation, Mobile sensing, Embedded SensorAbstract
Mobile devices such as smart phones are gaining an ever-increasing popularity. The information generated by these sensors give opportunities to create subtle inferences concerning not solely individuals however additionally their surroundings. This paper studies however an untrusted human in mobile sensing will sporadically get desired statistics over the information contributed by multiple mobile users, while not compromising the privacy of every user. The present protocols like Min mixture and add mixture to get the add mixture, that employs an additive homomorphic secret writing and a completely unique key management technique to support massive plain-text house. They either require bidirectional communications between the aggregator and mobile users in every aggregation period, or have high-computation overhead. The paper proposes a replacement hid information aggregation theme that is homomorphic public secret writing system primarily based. The planned theme has three contributions. First, it's designed for a multi-application surroundings. the bottom station extracts application-specific information from aggregate cipher texts. Next, it mitigates the impact of compromising attacks in single application environments. Finally, it degrades the injury from unauthorized aggregations. Data as a Service model is planned during which, a shopper stores a info on an untrusted service supplier. Therefore, the client has got to secure their info through Privacy Homomorphic (PH) schemes as a result of hydrogen ion concentration schemes keep utile properties than standard ciphers. Based on PH schemes, the provider can conduct aggregation queries and retrieve results. The proposed protocols are faster than existing solutions, and it has much lower communication overhead.
References
S.B.Eisenman, E.Miluzzo, N.D.Lane, R.A.Peterson, G. S.Ahn, and A.T.Campbell, “The Bike net Mobile Sensing System for Cyclist Experience Mapping,” Proc. ACM Fifth Int’l Conf. Embedded Networked Sensor Systems (SenSys ’07), pp. 87-10,2007.
P.A.Fouque, G.Poupard, and J.Stern, “Sharing Decryption in the Context of Voting or Lotteries,” Proc. Fourth Int’l Conf. Financial Cryptography, pp. 90-104, 2000.
K.R.Fox, “The Influence of Physical Activity on Mental Well-being”, Public Health Nutrition, vol. 2, no. 3a, pp. 411–418, 1999.
J.Hicks, N.Ramanathan, D.Kim, M.Monibi, J.Selsky, M.Hansen, and D.Estrin, “And Wellness: An Open Mobile System for Activity and Experience Sampling,” Proc. Wireless Health, pp. 34-43, 2010.
N.D.Lane, M.Mohammod, M.Lin, X.Yang, H.Lu, S.Ali, A.Doryab, E.Berke, T.Choudhury, and A.Campbell, “BeWell: A Smart phone Application to Monitor, Model and Promote Well-being,” Proc. Fifth Int’l ICST Conf. Pervasive Computing Technologies for Healthcare, 2011.
Nicholas D.Lane, Emiliano Miluzzo, Hong Lu, Daniel Peebles Tanzeem Choudhury, and Andrew T. Campbell, “A Survey of Mobile Phone Sensing”, Comm. Mag., vol. 48, pp. 140–150, September 2010.
M. Jawurek and F. Kerschbaum, “Fault-Tolerant Privacy-Preserving Statistics,” Proc. 12th Privacy Enhancing Technologies Symp. (PETS ’12), 2012.
R.Norris, D.Carroll, and R.Cochrane, “The Effects of Physical Activity and Exercise Training on Psychological Stress and Well-being in an Adolescent Population”, Journal of Psychosomatic Research, vol. 36, no. 1, pp. 55–65, 1992.
Q. Li and G. Cao, “Providing Privacy-Aware Incentives for Mobile Sensing,” Proc. IEEE PerCom, 2013.
V.Rastogi and S.Nath, “Differentially Private Aggregation of Distributed Time-Series with Transformation and Encryption,” Proc. ACM SIGMOD Int’l Conf. Management of Data, 2010.
E.G.Rieffel, J.Biehl, W.Van Melle, and A.J.Lee, “Secured Histories: Computing Group Statistics on Encrypted Data While Preserving Individual Privacy,” 2010.
E.Shi, T.H.H.Chan, E.Rieffel, R.Chow, and D.Song, “Privacy-Preserving Aggregation of Time-Series Data,” Proc. Network and Distributed System Security Symp. (NDSS ’11), 2011.
T.-H.H. Chan, E. Shi, and D. Song, “Privacy-Preserving Stream Aggregation with Fault Tolerance,” Proc. Sixth Int’l Conf. Financial Cryptography and Data Security (FC ’12), 2012.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
