Anonymity-based Privacy-preserving Data
Reporting for Participatory Sensing
Abstract:
In this paper, we propose an efficient anonymous data reporting protocol for participatory
sensing, which provides strong privacy protection, data accuracy and generality. The
protocol consists of two stages, namely slot reservation and message submission. In the
slot reservation stage, a group of N participants cooperate to assign each member a
message slot in a vector which is essentially a message submission schedule, in such a
manner that each participant’s slot is oblivious to other members and the application
server. In the message submission stage, each participant transmits an encoded data to the
application server based on the slot information known only to herself, in such a way that
the application server cannot link a data to a specific participant. With such a data
reporting protocol, the link between the data and the participants is broken, and as a
result, participant’s privacy is protected. We conduct theoretical analysis of the
correctness and anonymity of our protocol, as well as experiments to demonstrate the
efficiency in small-scale applications with periodic data sampling.
Existing System:
 In existing methods, if the application server colludes with a global eavesdropper
who can monitor the traffic across the network, it can link each data with its
contributor.
 Privacy in participatory sensing systems has been addressed by many works,
instead of sending an accurate location to the server, spatial cloaking is employed
to calculate an anonymity set.
 As a result, the user is protected. The work in also follows this idea of
generalization, in which k pieces of data are combined together before sending to
the server, with the intension of adding enough “confusion” in the data to make it
difficult to obtain exact times and locations for the individual data.
Proposed system:
 Privacy in participatory sensing systems has been addressed by many works,
instead of sending an accurate location to the server, spatial cloaking is employed
to calculate an anonymity set.
 As a result, the user is protected. The work in also follows this idea of
generalization, in which k pieces of data are combined together before sending to
the server, with the intension of adding enough “confusion” in the data to make it
difficult to obtain exact times and locations for the individual data.
 The most efficient anonymous message protocol so far is proposed in , where a
((N, N)-SS) secret sharing protocol is employed for both slot reservation and data
submission.
 The computation is efficient, as it doesn’t use public key encryption. But the
communication cost is very heavy.
Problem statement:
Privacy protection is an important issue in participatory sensing. We propose an
anonymous data reporting protocol for participatory applications to protect user privacy.
The intuition behind the protocol is that, if the data itself does not contain identification
information, and we can break the link between the data and the participant that reports
the data, the user’s privacy can be protected. The anonymous data reporting protocol is
divided into two stages, a slot reservation stage and a data submission stage.
Implementation of modules:
System architecture:
In this Anonymity-based Privacy-preserving Data Reporting for Participatory Sensing
five modules such as given below,
1. Participant module.
2. Application Server module.
3. End Users module.
4. Privacy.
5. Trusted certificationauthority.
Participant Module:
particiaptor can submit online reports using public/private keys, that may be related to
personal ,group,community.participator can have limitation for submitting records into
the server.
Participator can perform the following works
 .participator registeration.
 participator login.
 view profile.
 slot reservation.
 Data submission.
Application Server module:
Application server is nothing but admin after admin login, he will collect the information
from the server and analyze the reports and prepare statistics, after that view the end user
requests.
Steps:
 server login.
 view participator online reports collect the statistics.
 view end user details.
Trusted Certification authority:
We assume that each participant Pi has a private/public key pair (xi, yi), and each
participant knows the public keys of all the others. Thus, all participants can identify each
other by public keys. In practice, the participants apply their key pairs from a trusted
certification authority whose job is to associate each individual with her public key. Or
alternatively, each participant can generate the key pair herself and publish the public key
at the application server, if she does not trust any authority.
Steps:
 login.
 view user requests.
 accept user slot requests and provide pair of public/private keys.
End User module:
User can view the online reports and give the feed backs according to the type of posts.
Steps:
 user registeration.
 user login.
 search
 give feed backs and suggestions.
Participatory Privacy sensing:
participating in a participatory sensing task, especially a community-scale task,
could result in private information leakage. Some tasks require users to submit
data containing sensitive information, for example, disease symptoms. Some
applications don’t directly use sensitive data, but still result in privacy leakage. For
example, in a power consumption monitoring application , from temporally fine-
grained energy consumption reports submitted by users, household activities can
be inferred easily. In addition, data in participatory sensing application are usually
geo- and timetagged. From multiple data reported by a participant, an adversary
can derive much sensitive information. Thus, users are reluctant to contribute to
the sensing campaigns, if their privacy cannot be protected.
A variety of methods have been proposed to protect the privacy of each participant
for participatory sensing applications. A naive mechanism to protect the privacy is
to use pseudonyms. However, as demonstrated in , the use of pseudonyms does
not necessarily guarantee privacy. Some privacy protection methods employ
generalization or perturbation, both of which intend to allow the application server
to determine community trends without revealing individual data, by deliberately
reducing the accuracy or precision of the sensed data.
Conclusion:
Privacy protection is an important issue in participatory sensing. We propose an
anonymous data reporting protocol for participatory applications to protect user privacy.
The intuition behind the protocol is that, if the data itself does not contain identification
information, and we can break the link between the data and the participant that reports
the data, the user’s privacy can be protected. The anonymous data reporting protocol is
divided into two stages, a slot reservation stage and a data submission stage. We propose
an anonymous slot reservation scheme based on public key encryption and message
shuffle, and a data submission scheme based on efficient XOR operation. The theoretical
analysis verifies the correctness and the anonymity of the protocol. The experiments
demonstrate that, for small-scale applications with only tens of participants where data is
collected in a periodic manner, the proposed protocol is efficient and applicable.
Anonymity based privacy-preserving data

More Related Content

DOCX
Securing broker less publish subscribe systems using identity-based encryption
DOCX
Securing broker less publish subscribe systems using identity-based encryption
PPTX
Securing broker less publish subscribe systems using identity-based encryption
PDF
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
PPTX
PPTX
DOCX
DOC
Privacy preserving optimal meeting location determination on mobile devices
Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryption
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
Privacy preserving optimal meeting location determination on mobile devices

What's hot (20)

PDF
Location based authentication new words approch secuirity
PPT
PDF
Scalable and secure sharing of personal health
PPTX
Privacy preserving optimal meeting location determination on mobile devices
PPTX
A novel approach for trust management for peer peer
DOCX
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
DOCX
exploiting service similarity for privacy in location-based search queries
DOCX
SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...
DOC
Scalable and secure sharing of personal health records in cloud computing usi...
DOC
Shared authority based privacy preserving authentication protocol in cloud co...
DOCX
JPD1435 Preserving Location Privacy in Geosocial Applications
PPTX
Shared aythority ppt design [autosaved]
PPTX
Scalable and secure sharing of personal health records in cloud computing usi...
PDF
Shared authority based privacy preserving authentication protocol in cloud co...
DOCX
AAA server
DOCX
6.designing secure and efficient biometric based secure access mechanism for ...
DOCX
Preserving location privacy in geo social applications
DOCX
Scalable and secure sharing of personal health records in cloud computing usi...
DOCX
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
DOCX
Scalable and secure sharing of personal health records in cloud computing usi...
Location based authentication new words approch secuirity
Scalable and secure sharing of personal health
Privacy preserving optimal meeting location determination on mobile devices
A novel approach for trust management for peer peer
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
exploiting service similarity for privacy in location-based search queries
SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...
Scalable and secure sharing of personal health records in cloud computing usi...
Shared authority based privacy preserving authentication protocol in cloud co...
JPD1435 Preserving Location Privacy in Geosocial Applications
Shared aythority ppt design [autosaved]
Scalable and secure sharing of personal health records in cloud computing usi...
Shared authority based privacy preserving authentication protocol in cloud co...
AAA server
6.designing secure and efficient biometric based secure access mechanism for ...
Preserving location privacy in geo social applications
Scalable and secure sharing of personal health records in cloud computing usi...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
Scalable and secure sharing of personal health records in cloud computing usi...
Ad

Similar to Anonymity based privacy-preserving data (20)

PDF
Secure Distributed Collection of Data Using Participator Sensing Paradigm
DOCX
Participatory privacy enabling privacy in participatory sensing
DOCX
JAVA 2013 IEEE NETWORKING PROJECT Participatory privacy enabling privacy in p...
DOCX
Participatory privacy enabling privacy in participatory sensing
PDF
Privacy preserving Data Sharing - PyData Berlin 2018
PDF
I want you to Read intensively papers and give me a summary for ever.pdf
PDF
Gs3612141219
PDF
Privacy Preserving Aggregate Statistics for Mobile Crowdsensing
PDF
A privacy preserving-location_monitoring_system_for_wireless_sensor_networks
PDF
PROVIDING PRIVACY-AWARE INCENTIVES IN MOBILE SENSING SYSTEMS
PDF
International Refereed Journal of Engineering and Science (IRJES)
PDF
An Aggregate Location Monitoring System Of Privacy Preserving In Authenticati...
PDF
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
DOCX
Privacy and quality preserving multimedia data
DOCX
Protecting sensitive labels in social network data anonymization
DOCX
JAVA 2013 IEEE DATAMINING PROJECT Protecting sensitive labels in social netwo...
PDF
Data Anonymization for Privacy Preservation in Big Data
DOCX
Protecting sensitive labels in social network data anonymization
PDF
Bi24385389
PDF
IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...
Secure Distributed Collection of Data Using Participator Sensing Paradigm
Participatory privacy enabling privacy in participatory sensing
JAVA 2013 IEEE NETWORKING PROJECT Participatory privacy enabling privacy in p...
Participatory privacy enabling privacy in participatory sensing
Privacy preserving Data Sharing - PyData Berlin 2018
I want you to Read intensively papers and give me a summary for ever.pdf
Gs3612141219
Privacy Preserving Aggregate Statistics for Mobile Crowdsensing
A privacy preserving-location_monitoring_system_for_wireless_sensor_networks
PROVIDING PRIVACY-AWARE INCENTIVES IN MOBILE SENSING SYSTEMS
International Refereed Journal of Engineering and Science (IRJES)
An Aggregate Location Monitoring System Of Privacy Preserving In Authenticati...
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
Privacy and quality preserving multimedia data
Protecting sensitive labels in social network data anonymization
JAVA 2013 IEEE DATAMINING PROJECT Protecting sensitive labels in social netwo...
Data Anonymization for Privacy Preservation in Big Data
Protecting sensitive labels in social network data anonymization
Bi24385389
IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...
Ad

Recently uploaded (20)

PDF
Hazard Identification & Risk Assessment .pdf
PDF
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 2).pdf
PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PDF
LIFE & LIVING TRILOGY- PART (1) WHO ARE WE.pdf
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
PDF
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
PDF
HVAC Specification 2024 according to central public works department
PDF
MICROENCAPSULATION_NDDS_BPHARMACY__SEM VII_PCI .pdf
PDF
advance database management system book.pdf
PPTX
Computer Architecture Input Output Memory.pptx
PPTX
Introduction to pro and eukaryotes and differences.pptx
PPTX
Core Concepts of Personalized Learning and Virtual Learning Environments
PDF
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PDF
My India Quiz Book_20210205121199924.pdf
PDF
Uderstanding digital marketing and marketing stratergie for engaging the digi...
PDF
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 1).pdf
PDF
LEARNERS WITH ADDITIONAL NEEDS ProfEd Topic
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PDF
Journal of Dental Science - UDMY (2021).pdf
Hazard Identification & Risk Assessment .pdf
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 2).pdf
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
LIFE & LIVING TRILOGY- PART (1) WHO ARE WE.pdf
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
HVAC Specification 2024 according to central public works department
MICROENCAPSULATION_NDDS_BPHARMACY__SEM VII_PCI .pdf
advance database management system book.pdf
Computer Architecture Input Output Memory.pptx
Introduction to pro and eukaryotes and differences.pptx
Core Concepts of Personalized Learning and Virtual Learning Environments
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
My India Quiz Book_20210205121199924.pdf
Uderstanding digital marketing and marketing stratergie for engaging the digi...
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 1).pdf
LEARNERS WITH ADDITIONAL NEEDS ProfEd Topic
Paper A Mock Exam 9_ Attempt review.pdf.
Journal of Dental Science - UDMY (2021).pdf

Anonymity based privacy-preserving data

  • 1. Anonymity-based Privacy-preserving Data Reporting for Participatory Sensing Abstract: In this paper, we propose an efficient anonymous data reporting protocol for participatory sensing, which provides strong privacy protection, data accuracy and generality. The protocol consists of two stages, namely slot reservation and message submission. In the slot reservation stage, a group of N participants cooperate to assign each member a message slot in a vector which is essentially a message submission schedule, in such a manner that each participant’s slot is oblivious to other members and the application server. In the message submission stage, each participant transmits an encoded data to the application server based on the slot information known only to herself, in such a way that the application server cannot link a data to a specific participant. With such a data reporting protocol, the link between the data and the participants is broken, and as a result, participant’s privacy is protected. We conduct theoretical analysis of the correctness and anonymity of our protocol, as well as experiments to demonstrate the efficiency in small-scale applications with periodic data sampling. Existing System:  In existing methods, if the application server colludes with a global eavesdropper who can monitor the traffic across the network, it can link each data with its contributor.  Privacy in participatory sensing systems has been addressed by many works, instead of sending an accurate location to the server, spatial cloaking is employed to calculate an anonymity set.  As a result, the user is protected. The work in also follows this idea of generalization, in which k pieces of data are combined together before sending to
  • 2. the server, with the intension of adding enough “confusion” in the data to make it difficult to obtain exact times and locations for the individual data. Proposed system:  Privacy in participatory sensing systems has been addressed by many works, instead of sending an accurate location to the server, spatial cloaking is employed to calculate an anonymity set.  As a result, the user is protected. The work in also follows this idea of generalization, in which k pieces of data are combined together before sending to the server, with the intension of adding enough “confusion” in the data to make it difficult to obtain exact times and locations for the individual data.  The most efficient anonymous message protocol so far is proposed in , where a ((N, N)-SS) secret sharing protocol is employed for both slot reservation and data submission.  The computation is efficient, as it doesn’t use public key encryption. But the communication cost is very heavy. Problem statement: Privacy protection is an important issue in participatory sensing. We propose an anonymous data reporting protocol for participatory applications to protect user privacy. The intuition behind the protocol is that, if the data itself does not contain identification information, and we can break the link between the data and the participant that reports the data, the user’s privacy can be protected. The anonymous data reporting protocol is divided into two stages, a slot reservation stage and a data submission stage.
  • 3. Implementation of modules: System architecture: In this Anonymity-based Privacy-preserving Data Reporting for Participatory Sensing five modules such as given below, 1. Participant module. 2. Application Server module. 3. End Users module. 4. Privacy. 5. Trusted certificationauthority. Participant Module: particiaptor can submit online reports using public/private keys, that may be related to personal ,group,community.participator can have limitation for submitting records into the server. Participator can perform the following works  .participator registeration.
  • 4.  participator login.  view profile.  slot reservation.  Data submission. Application Server module: Application server is nothing but admin after admin login, he will collect the information from the server and analyze the reports and prepare statistics, after that view the end user requests. Steps:  server login.  view participator online reports collect the statistics.  view end user details. Trusted Certification authority: We assume that each participant Pi has a private/public key pair (xi, yi), and each participant knows the public keys of all the others. Thus, all participants can identify each other by public keys. In practice, the participants apply their key pairs from a trusted certification authority whose job is to associate each individual with her public key. Or alternatively, each participant can generate the key pair herself and publish the public key at the application server, if she does not trust any authority. Steps:  login.  view user requests.  accept user slot requests and provide pair of public/private keys. End User module: User can view the online reports and give the feed backs according to the type of posts. Steps:  user registeration.  user login.  search
  • 5.  give feed backs and suggestions. Participatory Privacy sensing: participating in a participatory sensing task, especially a community-scale task, could result in private information leakage. Some tasks require users to submit data containing sensitive information, for example, disease symptoms. Some applications don’t directly use sensitive data, but still result in privacy leakage. For example, in a power consumption monitoring application , from temporally fine- grained energy consumption reports submitted by users, household activities can be inferred easily. In addition, data in participatory sensing application are usually geo- and timetagged. From multiple data reported by a participant, an adversary can derive much sensitive information. Thus, users are reluctant to contribute to the sensing campaigns, if their privacy cannot be protected. A variety of methods have been proposed to protect the privacy of each participant for participatory sensing applications. A naive mechanism to protect the privacy is to use pseudonyms. However, as demonstrated in , the use of pseudonyms does not necessarily guarantee privacy. Some privacy protection methods employ generalization or perturbation, both of which intend to allow the application server to determine community trends without revealing individual data, by deliberately reducing the accuracy or precision of the sensed data. Conclusion: Privacy protection is an important issue in participatory sensing. We propose an anonymous data reporting protocol for participatory applications to protect user privacy. The intuition behind the protocol is that, if the data itself does not contain identification information, and we can break the link between the data and the participant that reports the data, the user’s privacy can be protected. The anonymous data reporting protocol is divided into two stages, a slot reservation stage and a data submission stage. We propose an anonymous slot reservation scheme based on public key encryption and message shuffle, and a data submission scheme based on efficient XOR operation. The theoretical analysis verifies the correctness and the anonymity of the protocol. The experiments demonstrate that, for small-scale applications with only tens of participants where data is collected in a periodic manner, the proposed protocol is efficient and applicable.