encrypted adversaries

advertisement
User Privacy and Data Trustworthiness in Mobile Crowd
Sensing
ABSTRACT:
Smartphones and other trendy mobile wearable devices are rapidly becoming the
dominant sensing, computing and communication devices in peoples’ daily lives.
Mobile crowd sensing is an emerging technology based on the sensing and
networking capabilities of such mobile wearable devices. MCS has shown great
potential in improving peoples’ quality of life, including healthcare and
transportation, and thus has found a wide range of novel applications. However,
user privacy and data trustworthiness are two critical challenges faced by MCS. In
this article, we introduce the architecture of MCS and discuss its unique
characteristics and advantages over traditional wireless sensor networks, which
result in inapplicability of most existing WSN security solutions. Furthermore, we
summarize recent advances in these areas and suggest some future research
directions.
EXISTING SYSTEM:
 When searching for a place and nearest location, a user sends queries in the
form of keyword.
 Nowadays Smartphones are used for query searching in the internet servers.
Also users use Smartphones for posting or uploading some important reports
into the server.
 Once the reports are uploaded, all other users get those results with the
sensible information like location and time of the participant who uploads
the reports. Participant may also upload some photos in social websites
which may contain some information about his/her location.
 This leads to the leakage of participant’s information to the queerer, one who
performs search.
DISADVANTAGES OF EXISTING SYSTEM:
 The leakage of sensible information to the querier, leads to misusing to
participants.
 Without proper registration of any users can upload and view reports.
PROPOSED SYSTEM:
 In this paper, we present a novel approach to user privacy and data
trustworthiness when they use mobile sensors to sense and share information
to the server.
 In MCS, privacy concerns arise due to the disclosure of private information
such as participants’ identities, IP addresses, locations, trajectories, and
lifestyle-related information.
 MCS applications even aggravate the privacy problem because they make
large volumes of information easily available through remote access. Thus,
adversaries need not be physically present to maintain surveillance. They
can gather information in a low-risk and anonymous manner.
 Remote access also allows a single adversary to monitor multiple users
simultaneously. We consider users’ location information as an example.
Since MCS allows any voluntary participant to contribute data, the
application server is exposed to erroneous or even malicious data. For
example, participants may inadvertently put their wearable devices in an
undesirable position while collecting sensor readings (e.g., Galaxy Gear kept
in a pocket while sampling street-level noise). Moreover, malicious
participants may deliberately contribute bad data. Both behaviors result in
erroneous contributions, which need to be identified and eliminated to
ensure the reliability of the computed summaries.
ADVANTAGES OF PROPOSED SYSTEM:
 USER PRIVACY - Protecting query privacy with respect to the registration
authority. Protecting node privacy with respect to the network operator.
 With the current technology, users’ locations and identities are not allowed
to be hidden from the network operator. Based on the commodity mobile
phones, our system obviates the need for special hardware or extra vehicle
devices.
 DATA TRUSTWORTHINESS - Data trustworthiness and user privacy
preservation are two conflicting objectives in an MCS application. Strong
mechanisms for protecting privacy might influence data trustworthiness. On
the other hand, protecting the data trustworthiness counteracts the
mechanisms for preserving privacy.
SYSTEM ARCHITECTURE:
MODULES:
1. Participant or mobile node:
i. Properly register with registration authority.
ii. Uploads sensor reports like location of places
2. Service provider:
i. Holds reports from mobile node.
ii. Provides anonymity for mobile node location details.
iii. Provides reports for querier
3. Querier:
i. Searches for query
ii. Get reports according to proper query.
MODULE DESCRIPTION:
1.1.
Participant or Mobile Node:
Participants or mobile nodes register properly with the application servers
managed by MCS operator. Once the registration is confirmed by authority, he/she
can upload reports with the help of mobile sensors in their smart phones.
1.2.
Service providers:
The service providers on the other hand handle the mobile phone sensing
information to the system. After getting all the user registration of participant and
querier the confirmation for the mobile nodes are given, only when they have
given valid details. Then the collected reports from mobile nodes are verified.
When the querier queries, the reports for their query is transmitted to the querier
with the encrypted details of participant.
1.3.
Querier:
Querier are mobile users, who queries for their needs. They too have a valid
registration with the registration authority. They get the reports according to their
queries with encrypted details of participants. Also the location is shown in Google
maps.
SYSTEM SPECIFICATION
Hardware Requirements:
•
System
: Pentium IV 3.5 GHz.
•
Hard Disk
: 40 GB.
•
Monitor
: 14’ Colour Monitor.
•
Mouse
: Optical Mouse.
•
Ram
: 1 GB.
Software Requirements:
•
Operating system
: Windows XP or Windows 7, Windows 8.
•
Coding Language
: Android,J2EE(Jsp,Servlet,Java Bean)
•
Data Base
: My Sql / MS Access.
•
Documentation
: MS Office
•
IDE
•
Development Kit
: Eclipse Juno
: JDK 1.6
Download