Abstract - JP InfoTech

advertisement

User Privacy and Data Trustworthiness in Mobile Crowd

Sensing

ABSTRACT:

Smartphones and other trendy mobile wearable devices are rapidly becoming the dominant sensing, computing and communication devices in peoples’ daily lives.

Mobile crowd sensing is an emerging technology based on the sensing and networking capabilities of such mobile wearable devices. MCS has shown great potential in improving peoples’ quality of life, including healthcare and transportation, and thus has found a wide range of novel applications. However, user privacy and data trustworthiness are two critical challenges faced by MCS. In this article, we introduce the architecture of MCS and discuss its unique characteristics and advantages over traditional wireless sensor networks, which result in inapplicability of most existing WSN security solutions. Furthermore, we summarize recent advances in these areas and suggest some future research directions.

EXISTING SYSTEM:

When searching for a place and nearest location, a user sends queries in the form of keyword.

 Nowadays Smartphones are used for query searching in the internet servers.

Also users use Smartphones for posting or uploading some important reports into the server.

Once the reports are uploaded, all other users get those results with the sensible information like location and time of the participant who uploads

the reports. Participant may also upload some photos in social websites which may contain some information about his/her location.

 This leads to the leakage of participant’s information to the queerer, one who performs search.

DISADVANTAGES OF EXISTING SYSTEM:

The leakage of sensible information to the querier, leads to misusing to participants.

Without proper registration of any users can upload and view reports.

PROPOSED SYSTEM:

 In this paper, we present a novel approach to user privacy and data trustworthiness when they use mobile sensors to sense and share information to the server.

 In MCS, privacy concerns arise due to the disclosure of private information such as participants’ identities, IP addresses, locations, trajectories, and lifestyle-related information.

MCS applications even aggravate the privacy problem because they make large volumes of information easily available through remote access. Thus, adversaries need not be physically present to maintain surveillance. They can gather information in a low-risk and anonymous manner.

Remote access also allows a single adversary to monitor multiple users simultaneously. We consider users’ location information as an example.

Since MCS allows any voluntary participant to contribute data, the

application server is exposed to erroneous or even malicious data. For example, participants may inadvertently put their wearable devices in an undesirable position while collecting sensor readings (e.g., Galaxy Gear kept in a pocket while sampling street-level noise). Moreover, malicious participants may deliberately contribute bad data. Both behaviors result in erroneous contributions, which need to be identified and eliminated to ensure the reliability of the computed summaries.

ADVANTAGES OF PROPOSED SYSTEM:

 USER PRIVACY - Protecting query privacy with respect to the registration authority.

Protecting node privacy with respect to the network operator.

 With the current technology, users’ locations and identities are not allowed to be hidden from the network operator. Based on the commodity mobile phones, our system obviates the need for special hardware or extra vehicle devices.

DATA TRUSTWORTHINESS - Data trustworthiness and user privacy preservation are two conflicting objectives in an MCS application. Strong mechanisms for protecting privacy might influence data trustworthiness. On the other hand, protecting the data trustworthiness counteracts the mechanisms for preserving privacy.

SYSTEM ARCHITECTURE:

MODULES:

1. Participant or mobile node:

i. Properly register with registration authority.

ii. Uploads sensor reports like location of places

2. Service provider:

i. Holds reports from mobile node.

ii. Provides anonymity for mobile node location details.

iii. Provides reports for querier

3. Querier:

i. Searches for query

ii. Get reports according to proper query.

MODULE DESCRIPTION:

1.1.

Participant or Mobile Node:

Participants or mobile nodes register properly with the application servers managed by MCS operator. Once the registration is confirmed by authority, he/she can upload reports with the help of mobile sensors in their smart phones.

1.2.

Service providers:

The service providers on the other hand handle the mobile phone sensing information to the system. After getting all the user registration of participant and querier the confirmation for the mobile nodes are given, only when they have given valid details. Then the collected reports from mobile nodes are verified.

When the querier queries, the reports for their query is transmitted to the querier with the encrypted details of participant.

1.3.

Querier:

Querier are mobile users, who queries for their needs. They too have a valid registration with the registration authority. They get the reports according to their queries with encrypted details of participants. Also the location is shown in Google maps.

SYSTEM REQUIREMENTS:

HARDWARE REQUIREMENTS:

System

 Hard Disk

 Floppy Drive

Monitor

Mouse

Ram

 MOBILE

:

:

:

:

:

:

:

Pentium IV 2.4 GHz.

40 GB.

1.44 Mb.

15 VGA Colour.

Logitech.

512 Mb.

ANDROID

SOFTWARE REQUIREMENTS:

Operating system : Windows 7.

 Coding Language : Java 1.7

 Tool Kit

IDE

:

:

Android 2.3 ABOVE

Eclipse

REFERENCE:

DAOJING HE, SAMMY CHAN, AND MOHSEN GUIZANI, “USER PRIVACY

AND DATA TRUSTWORTHINESS IN MOBILE CROWD SENSING”, IEEE

Wireless Communications, February 2015.

Download