Participatory Privacy: Enabling Privacy in Participatory
Sensing
ABSTRACT
Participatory Sensing is an emerging computing paradigm that enables the distributed collection of
data by self-selected participants. It allows the increasing number of mobile phone users to share
local knowledge acquired by their sensor-equipped devices, e.g., to monitor temperature, pollution
level or consumer pricing information. While research initiatives and prototypes proliferate, their
real-world impact is often bounded to comprehensive user participation. If users have no incentive,
or feel that their privacy might be endangered, it is likely that they will not participate.
we focus on privacy protection in Participatory Sensing and introduce a suitable privacy-
enhanced infrastructure. First, we provide a set of definitions of privacy requirements for both data
producers (i.e., users providing sensed information) and consumers (i.e., applications accessing the
data). Then, we propose an efficient solution designed for mobile phone users, which incurs very
low overhead. Finally, we discuss a number of open problems and possible research directions.
EXISTING SYSTEM
In the last decade, researchers have envisioned the outbreak of Wireless Sensor Networks
(WSNs) and predicted the widespread installation of sensors, e.g., in infrastructures, buildings,
woods, rivers, or even the atmosphere. This has triggered a lot of interest in many different WSN
topics, including identifying and addressing security issues, such as data integrity, node capture,
secure routing, etc. On the contrary, privacy has not really been a concern in WSNs, as sensors are
usually owned, operated, and queried by the same entity.
GLOBALSOFT TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
PROPOSED SYSTEM
Participatory Sensing initiatives have multiplied, ranging from research prototypes to
deployed systems. Due to space limitations we briefly review some PS application that apparently
expose participant privacy (e.g., location, habits, etc.). Each of them can be easily enhanced with
our privacy-protecting layer.
PS is an emerging paradigm that focuses on the seamless collection of information from a
large number of connected, always-on, always-carried devices, such as mobile phones. PS leverages
the wide proliferation of commodity sensor-equipped devices and the ubiquity of broadband network
infrastructure to provide sensing applications where deployment of a WSN infrastructure is not
economical or not feasible. PS provides fine-grained monitoring of environmental trends without the
need to set up a sensing infrastructure. Our mobile phones are the sensing infrastructure and the
number and variety of applications are potentially unlimited. Users can monitor gas prices , traffic
information, available parking spots, just to cite a few. We refer readers to [4] for an updated list of
papers and projects related to PS.
MODULE DESCRIPTION:
Participatory Sensing
PS is an emerging paradigm that focuses on the seamless collection of information from a
large number of connected, always-on, always-carried devices, such as mobile phones. PS leverages
the wide proliferation of commodity sensor-equipped devices and the ubiquity of broadband network
infrastructure to provide sensing applications where deployment of a WSN infrastructure is not
economical or not feasible. PS provides fine-grained monitoring of environmental trends without the
need to set up a sensing infrastructure. Our mobile phones are the sensing infrastructure and the
number and variety of applications are potentially unlimited. Users can monitor gas prices , traffic
information, available parking spots, just to cite a few. We refer readers to [4] for an updated list of
papers and projects related to PS.
PEPSI
PEPSI protects privacy using efficient cryptographic tools. Similar to other cryptographic
solutions, it introduces an additional (offline) entity, namely the Registration Authority. It sets up
system parameters and manages Mobile Nodes or Queriers registration. However, the Registration
Authority is not involved in real-time operations (e.g., query/report matching) nor is it trusted to
intervene for protecting participants’ privacy.
PEPSI allows the Service Provider to perform report/query matching while guaranteeing
the privacy of both mobile Nodes and Queriers. It aims at providing (provable) privacy by design,
and starts off with defining a clear set of privacy properties.
Report Encryption:
We assume that each report or subscription is identified by a set of labels, or keywords.
These are used as “identities” in an IBE scheme. For example, labels “Temperature” and “Central
Park, NY” can be used to derive a unique public encryption key, associated to a secret decryption
key. Thus, Mobile Nodes can encrypt sensed data using report’s labels as the (public) encryption
key. Queriers should then obtain the private decryption keys corresponding to the labels of
interest.Querier Subscription. Q subscribes to queries of type “Temp” in “Irvine, CA” using these
keywords and the decryption key acquired offline, to compute a (green) tag; the algorithm is referred
to as TAG(). The tag leaks no information about Q’s interest and is uploaded at the Service
Provider.
Data Report:
Any timeMwants to report about temperature, it derives the public decryption key (red
key) for reports of type “Temp” (via the IBE() algorithm) and encrypts the measurement; encrypted
data is pictured as a vault. Malso tags the report using the secret acquired offline and a list of
keywords characterizing the report; in the exampleMuses keywords “Temp” and “Irvine, CA”. Our
tagging mechanism leverages the properties of bilinear maps to make sure that, ifMand Q use the
same keywords, they will compute the same tag, despite each of them is using a different secret (M
is using the grey key while Q is using the yellow one). As before, the tag and the encrypted report
leak no information about the nature of the report or the nominal value of the measurement. Both
tag and encrypted data are forwarded to the Service Provider.
Report Delivery:
The Service Provider only needs to match tags sent by Mobile Nodes with the ones
uploaded by Queriers. If the tags match, the corresponding encrypted report is forwarded to the
Querier. In the example of Figure 2 the green tag matches the blue one, so the encrypted report (the
vault) is forwarded to Q. Finally, Q can decrypt the report using the decryption key and recover the
temperature measurement.
System Configuration:-
H/W System Configuration:-
Processor - Pentium –III
Speed - 1.1 Ghz
RAM - 256 MB(min)
Hard Disk - 20 GB
Floppy Drive - 1.44 MB
Key Board - Standard Windows Keyboard
Mouse - Two or Three Button Mouse
Monitor - SVGA
S/W System Configuration:-
Operating System :Windows XP
Application Server : Tomcat5.0/6.X
Front End : HTML, Java, Jsp
Scripts : JavaScript.
Server side Script : Java Server Pages.
Database : Mysql
Database Connectivity : JDBC.

More Related Content

DOCX
Participatory privacy enabling privacy in participatory sensing
PDF
INFRASTRUTTURE E MODELLI PER UN’INTEGRAZIONE TECNOLOGICA E DI BUSINESS - Piet...
DOC
Efficient and privacy aware data aggregation in mobile sensing
PDF
EENA2019: Track3 session1 improving response times & decision making_Eric Basha
PDF
Toward a statistical framework for source anonymity in sensor networks
PPTX
Using Sensors to Bridge the Gap between Real Places and their Web-based Repre...
PDF
Contextualised Cognitive Perspective for Linked Sensor Data
PDF
EENA2019: Track2 session1 _Improving coordinated response with cloud-based so...
Participatory privacy enabling privacy in participatory sensing
INFRASTRUTTURE E MODELLI PER UN’INTEGRAZIONE TECNOLOGICA E DI BUSINESS - Piet...
Efficient and privacy aware data aggregation in mobile sensing
EENA2019: Track3 session1 improving response times & decision making_Eric Basha
Toward a statistical framework for source anonymity in sensor networks
Using Sensors to Bridge the Gap between Real Places and their Web-based Repre...
Contextualised Cognitive Perspective for Linked Sensor Data
EENA2019: Track2 session1 _Improving coordinated response with cloud-based so...

Viewers also liked (6)

PPTX
Degrees of Freedom for Interference Networks aided by Relays Bounds and achie...
PDF
Automatically Characterizing Places with Opportunistic CrowdSensing using Sma...
PDF
Opportunistic Networking: Extending Internet Communications Through Spontaneo...
PPT
Introduction to sensors
PDF
Internet of Things (IoT) - We Are at the Tip of An Iceberg
PPT
Sensors
Degrees of Freedom for Interference Networks aided by Relays Bounds and achie...
Automatically Characterizing Places with Opportunistic CrowdSensing using Sma...
Opportunistic Networking: Extending Internet Communications Through Spontaneo...
Introduction to sensors
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Sensors
Ad

Similar to Participatory privacy enabling privacy in participatory sensing (20)

PDF
chapter 4.pdf
DOCX
chapter 4.docx
PDF
Towards Adaptive Sensor-cloud for Internet of Things
PDF
State of the Art in Cloud Security
PDF
I want you to Read intensively papers and give me a summary for ever.pdf
PDF
Secure Distributed Collection of Data Using Participator Sensing Paradigm
PDF
Analysing the Potential of BLE to Support Dynamic Broadcasting Scenarios
PDF
ANALYSING THE POTENTIAL OF BLE TO SUPPORT DYNAMIC BROADCASTING SCENARIOS
PDF
ANALYSING THE POTENTIAL OF BLE TO SUPPORT DYNAMIC BROADCASTING SCENARIOS
PDF
ANALYSING THE POTENTIAL OF BLE TO SUPPORT DYNAMIC BROADCASTING SCENARIOS
PDF
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
PDF
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
PDF
A Mobile Messaging Apps: Service Usage Classification to Internet Traffic and...
PDF
Privacy Preserving Aggregate Statistics for Mobile Crowdsensing
DOCX
Anonymity based privacy-preserving data
PDF
A Survey on Privacy-Preserving Data Aggregation Without Secure Channel
PDF
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
PDF
Ijeee 16-19-digital media hidden data extracting
DOCX
Privacy and quality preserving multimedia data
PDF
EPLQ:Efficient privacy preserving spatial range query for smart phones
chapter 4.pdf
chapter 4.docx
Towards Adaptive Sensor-cloud for Internet of Things
State of the Art in Cloud Security
I want you to Read intensively papers and give me a summary for ever.pdf
Secure Distributed Collection of Data Using Participator Sensing Paradigm
Analysing the Potential of BLE to Support Dynamic Broadcasting Scenarios
ANALYSING THE POTENTIAL OF BLE TO SUPPORT DYNAMIC BROADCASTING SCENARIOS
ANALYSING THE POTENTIAL OF BLE TO SUPPORT DYNAMIC BROADCASTING SCENARIOS
ANALYSING THE POTENTIAL OF BLE TO SUPPORT DYNAMIC BROADCASTING SCENARIOS
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
A Mobile Messaging Apps: Service Usage Classification to Internet Traffic and...
Privacy Preserving Aggregate Statistics for Mobile Crowdsensing
Anonymity based privacy-preserving data
A Survey on Privacy-Preserving Data Aggregation Without Secure Channel
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
Ijeee 16-19-digital media hidden data extracting
Privacy and quality preserving multimedia data
EPLQ:Efficient privacy preserving spatial range query for smart phones
Ad

More from IEEEFINALYEARPROJECTS (20)

DOCX
Scalable face image retrieval using attribute enhanced sparse codewords
DOCX
Scalable face image retrieval using attribute enhanced sparse codewords
DOCX
Reversible watermarking based on invariant image classification and dynamic h...
DOCX
Reversible data hiding with optimal value transfer
DOCX
Query adaptive image search with hash codes
DOCX
Noise reduction based on partial reference, dual-tree complex wavelet transfo...
DOCX
Local directional number pattern for face analysis face and expression recogn...
DOCX
An access point based fec mechanism for video transmission over wireless la ns
DOCX
Towards differential query services in cost efficient clouds
DOCX
Spoc a secure and privacy preserving opportunistic computing framework for mo...
DOCX
Secure and efficient data transmission for cluster based wireless sensor netw...
DOCX
Privacy preserving back propagation neural network learning over arbitrarily ...
DOCX
Non cooperative location privacy
DOCX
Harnessing the cloud for securely outsourcing large
DOCX
Geo community-based broadcasting for data dissemination in mobile social netw...
DOCX
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
DOCX
Dynamic resource allocation using virtual machines for cloud computing enviro...
DOCX
A secure protocol for spontaneous wireless ad hoc networks creation
DOCX
Utility privacy tradeoff in databases an information-theoretic approach
DOCX
Two tales of privacy in online social networks
Scalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewords
Reversible watermarking based on invariant image classification and dynamic h...
Reversible data hiding with optimal value transfer
Query adaptive image search with hash codes
Noise reduction based on partial reference, dual-tree complex wavelet transfo...
Local directional number pattern for face analysis face and expression recogn...
An access point based fec mechanism for video transmission over wireless la ns
Towards differential query services in cost efficient clouds
Spoc a secure and privacy preserving opportunistic computing framework for mo...
Secure and efficient data transmission for cluster based wireless sensor netw...
Privacy preserving back propagation neural network learning over arbitrarily ...
Non cooperative location privacy
Harnessing the cloud for securely outsourcing large
Geo community-based broadcasting for data dissemination in mobile social netw...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Dynamic resource allocation using virtual machines for cloud computing enviro...
A secure protocol for spontaneous wireless ad hoc networks creation
Utility privacy tradeoff in databases an information-theoretic approach
Two tales of privacy in online social networks

Recently uploaded (20)

PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PDF
Auditboard EB SOX Playbook 2023 edition.
PPTX
agenticai-neweraofintelligence-250529192801-1b5e6870.pptx
PDF
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
PDF
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
PPTX
MuleSoft-Compete-Deck for midddleware integrations
PDF
Comparative analysis of machine learning models for fake news detection in so...
PDF
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
PDF
Enhancing plagiarism detection using data pre-processing and machine learning...
PDF
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
PDF
Data Virtualization in Action: Scaling APIs and Apps with FME
PDF
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
PPTX
Microsoft User Copilot Training Slide Deck
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PDF
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
PPTX
Module 1 Introduction to Web Programming .pptx
PPTX
future_of_ai_comprehensive_20250822032121.pptx
PDF
LMS bot: enhanced learning management systems for improved student learning e...
PPTX
Configure Apache Mutual Authentication
PPTX
Training Program for knowledge in solar cell and solar industry
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
Auditboard EB SOX Playbook 2023 edition.
agenticai-neweraofintelligence-250529192801-1b5e6870.pptx
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
MuleSoft-Compete-Deck for midddleware integrations
Comparative analysis of machine learning models for fake news detection in so...
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
Enhancing plagiarism detection using data pre-processing and machine learning...
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
Data Virtualization in Action: Scaling APIs and Apps with FME
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
Microsoft User Copilot Training Slide Deck
sbt 2.0: go big (Scala Days 2025 edition)
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
Module 1 Introduction to Web Programming .pptx
future_of_ai_comprehensive_20250822032121.pptx
LMS bot: enhanced learning management systems for improved student learning e...
Configure Apache Mutual Authentication
Training Program for knowledge in solar cell and solar industry

Participatory privacy enabling privacy in participatory sensing

  • 1. Participatory Privacy: Enabling Privacy in Participatory Sensing ABSTRACT Participatory Sensing is an emerging computing paradigm that enables the distributed collection of data by self-selected participants. It allows the increasing number of mobile phone users to share local knowledge acquired by their sensor-equipped devices, e.g., to monitor temperature, pollution level or consumer pricing information. While research initiatives and prototypes proliferate, their real-world impact is often bounded to comprehensive user participation. If users have no incentive, or feel that their privacy might be endangered, it is likely that they will not participate. we focus on privacy protection in Participatory Sensing and introduce a suitable privacy- enhanced infrastructure. First, we provide a set of definitions of privacy requirements for both data producers (i.e., users providing sensed information) and consumers (i.e., applications accessing the data). Then, we propose an efficient solution designed for mobile phone users, which incurs very low overhead. Finally, we discuss a number of open problems and possible research directions. EXISTING SYSTEM In the last decade, researchers have envisioned the outbreak of Wireless Sensor Networks (WSNs) and predicted the widespread installation of sensors, e.g., in infrastructures, buildings, woods, rivers, or even the atmosphere. This has triggered a lot of interest in many different WSN topics, including identifying and addressing security issues, such as data integrity, node capture, secure routing, etc. On the contrary, privacy has not really been a concern in WSNs, as sensors are usually owned, operated, and queried by the same entity. GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:[email protected]
  • 2. PROPOSED SYSTEM Participatory Sensing initiatives have multiplied, ranging from research prototypes to deployed systems. Due to space limitations we briefly review some PS application that apparently expose participant privacy (e.g., location, habits, etc.). Each of them can be easily enhanced with our privacy-protecting layer. PS is an emerging paradigm that focuses on the seamless collection of information from a large number of connected, always-on, always-carried devices, such as mobile phones. PS leverages the wide proliferation of commodity sensor-equipped devices and the ubiquity of broadband network infrastructure to provide sensing applications where deployment of a WSN infrastructure is not economical or not feasible. PS provides fine-grained monitoring of environmental trends without the need to set up a sensing infrastructure. Our mobile phones are the sensing infrastructure and the number and variety of applications are potentially unlimited. Users can monitor gas prices , traffic information, available parking spots, just to cite a few. We refer readers to [4] for an updated list of papers and projects related to PS. MODULE DESCRIPTION: Participatory Sensing PS is an emerging paradigm that focuses on the seamless collection of information from a large number of connected, always-on, always-carried devices, such as mobile phones. PS leverages the wide proliferation of commodity sensor-equipped devices and the ubiquity of broadband network infrastructure to provide sensing applications where deployment of a WSN infrastructure is not economical or not feasible. PS provides fine-grained monitoring of environmental trends without the need to set up a sensing infrastructure. Our mobile phones are the sensing infrastructure and the number and variety of applications are potentially unlimited. Users can monitor gas prices , traffic information, available parking spots, just to cite a few. We refer readers to [4] for an updated list of papers and projects related to PS.
  • 3. PEPSI PEPSI protects privacy using efficient cryptographic tools. Similar to other cryptographic solutions, it introduces an additional (offline) entity, namely the Registration Authority. It sets up system parameters and manages Mobile Nodes or Queriers registration. However, the Registration Authority is not involved in real-time operations (e.g., query/report matching) nor is it trusted to intervene for protecting participants’ privacy. PEPSI allows the Service Provider to perform report/query matching while guaranteeing the privacy of both mobile Nodes and Queriers. It aims at providing (provable) privacy by design, and starts off with defining a clear set of privacy properties. Report Encryption: We assume that each report or subscription is identified by a set of labels, or keywords. These are used as “identities” in an IBE scheme. For example, labels “Temperature” and “Central Park, NY” can be used to derive a unique public encryption key, associated to a secret decryption key. Thus, Mobile Nodes can encrypt sensed data using report’s labels as the (public) encryption key. Queriers should then obtain the private decryption keys corresponding to the labels of interest.Querier Subscription. Q subscribes to queries of type “Temp” in “Irvine, CA” using these keywords and the decryption key acquired offline, to compute a (green) tag; the algorithm is referred to as TAG(). The tag leaks no information about Q’s interest and is uploaded at the Service Provider. Data Report: Any timeMwants to report about temperature, it derives the public decryption key (red key) for reports of type “Temp” (via the IBE() algorithm) and encrypts the measurement; encrypted data is pictured as a vault. Malso tags the report using the secret acquired offline and a list of keywords characterizing the report; in the exampleMuses keywords “Temp” and “Irvine, CA”. Our tagging mechanism leverages the properties of bilinear maps to make sure that, ifMand Q use the same keywords, they will compute the same tag, despite each of them is using a different secret (M is using the grey key while Q is using the yellow one). As before, the tag and the encrypted report
  • 4. leak no information about the nature of the report or the nominal value of the measurement. Both tag and encrypted data are forwarded to the Service Provider. Report Delivery: The Service Provider only needs to match tags sent by Mobile Nodes with the ones uploaded by Queriers. If the tags match, the corresponding encrypted report is forwarded to the Querier. In the example of Figure 2 the green tag matches the blue one, so the encrypted report (the vault) is forwarded to Q. Finally, Q can decrypt the report using the decryption key and recover the temperature measurement. System Configuration:- H/W System Configuration:- Processor - Pentium –III Speed - 1.1 Ghz RAM - 256 MB(min) Hard Disk - 20 GB Floppy Drive - 1.44 MB Key Board - Standard Windows Keyboard Mouse - Two or Three Button Mouse Monitor - SVGA
  • 5. S/W System Configuration:- Operating System :Windows XP Application Server : Tomcat5.0/6.X Front End : HTML, Java, Jsp Scripts : JavaScript. Server side Script : Java Server Pages. Database : Mysql Database Connectivity : JDBC.