SlideShare a Scribd company logo
EFFICIENT AND PRIVACY-AWARE DATA 
AGGREGATION IN MOBILE SENSING 
ABSTRACT: 
The proliferation and ever-increasing capabilities of mobile 
devices such as smart phones give rise to a variety of mobile 
sensing applications. This paper studies how an untrusted 
aggregator in mobile sensing can periodically obtain desired 
statistics over the data contributed by multiple mobile users, 
without compromising the privacy of each user. Although there 
are some existing works in this area, they either require 
bidirectional communications between the aggregator and 
mobile users in every aggregation period, or have high 
computation overhead and cannot support large plaintext spaces. 
Also, they do not consider the Min aggregate which is quite 
useful in mobile sensing. To address these problems, we propose 
an efficient protocol to obtain the Sum aggregate, which 
employs an additive homomorphic encryption and a novel key
management technique to support large plaintext space. We also 
extend the sum aggregation protocol to obtain the Min aggregate 
of time-series data. To deal with dynamic joins and leaves of 
mobile users, we propose a scheme which utilizes the 
redundancy in security to reduce the communication cost for 
each join and leave. Evaluations show that our protocols are 
orders of magnitude faster than existing solutions, and it has 
much lower communication overhead. 
EXISTING SYSTEM: 
The works on sensor data aggregation assume a trusted 
aggregator, and hence cannot protect user privacy against an 
untrusted aggregator in mobile sensing applications. Several 
recent works consider the aggregation of timeseries data in the 
presence of an untrusted aggregator. To protect user privacy, 
they design encryption schemes in which the aggregator can 
only decrypt the sum of all users’ data but nothing else. Rastogi 
and Nath use threshold Paillier cryptosystem to build such an 
encryption scheme. To decrypt the sum, their scheme needs an
extra round of interaction between the aggregator and all users 
in every aggregation period, which means high communication 
cost and long delay. Moreover, it requires all users to be online 
until decryption is completed, which may not be practical in 
many mobile sensing scenarios due to user mobility and the 
heterogeneity of user connectivity. Rieffel propose a 
construction that does not require bidirectional communications 
between the aggregator and the users, but it has high 
computation and storage cost to deal with collusions in a large 
system. Shi et al. also propose a construction for sum 
aggregation which does not need the extra round of interaction. 
However, the decryption in their construction needs to traverse 
the possible plaintext space of the aggregated value, which is 
very expensive for a large system with large plaintext space. In 
mobile sensing, the plaintext space of some application can be 
large. 
DISADVANTAGES OF EXISTING SYSTEM:
 It has no privacy the untrusted aggregator can able to 
access the data. 
 It has high computation and storage cost to deal with 
collusions in a large system. 
 It takes high communication cost and long delay. 
PROPOSED SYSTEM: 
In this paper, we propose a new protocol for mobile sensing 
to obtain the sum aggregate of time-series data in the presence 
of an untrusted aggregator. Our protocol employs an additive 
homomorphic encryption and a novel key management scheme 
based on efficient HMAC to ensure that the aggregator can only 
obtain the sum of all users’ data, without knowing individual 
user’s data or intermediate result. In our protocol, each user (the 
aggregator) only needs to compute a very small number of 
HMACs to encrypt her data (decrypt the sum). Hence, the 
computation cost is very low, and the protocol can scale to large 
systems with large plaintext spaces, resource constrained
devices and high aggregation loads. Another nice property of 
our protocol is that it only requires a single round of user-to-aggregator 
communication. Based on the sum aggregation 
protocol, we propose a protocol to obtain the Min aggregate. To 
our best knowledge, this is the first privacy-preserving solution 
to obtain the Min of time-series data in mobile sensing with just 
one round of userto- aggregator communication. Our protocols 
for Sum and Min can be easily adapted to derive many other 
aggregate statistics such as Count, Average and Max. 
ADVANTAGES OF PROPOSED SYSTEM: 
 It reduce the communication cost of dealing with dynamic 
joins and leaves. 
 Users may frequently join and leave in mobile sensing. 
 It only requires a single round of user-to-aggregator 
communication.
SYSTEM CONFIGURATION:- 
HARDWARE REQUIREMENTS:- 
Processor - Pentium –IV 
Speed - 1.1 Ghz 
RAM - 512 MB(min) 
Hard Disk - 40 GB 
Key Board - Standard Windows Keyboard 
Mouse - Two or Three Button Mouse 
Monitor - LCD/LED 
SOFTWARE REQUIREMENTS: 
Operating system : Windows XP. 
Coding Language : JAVA 
Data Base : MySQL 
Tool : Netbeans
REFERENCE: 
Qinghua Li, Guohong Cao, Thomas F. La Porta, “Efficient and 
Privacy-Aware Data Aggregation in Mobile Sensing” IEEE 
TRANSACTIONS ON DEPEDABLE AND SECURE 
COMPUTING, VOL. 11, NO. 2, MARCH/APRIL 2014.

More Related Content

DOCX
Toward a statistical framework for source anonymity in sensor networks
DOCX
Toward a statistical framework for source anonymity in sensor networks
PDF
M.Phil Computer Science Cloud Computing Projects
DOCX
Ns2 project titles
DOCX
Participatory privacy enabling privacy in participatory sensing
DOCX
Participatory privacy enabling privacy in participatory sensing
PDF
Manet titles
DOCX
top-k query result completeness verification in tiered sensor networks
Toward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networks
M.Phil Computer Science Cloud Computing Projects
Ns2 project titles
Participatory privacy enabling privacy in participatory sensing
Participatory privacy enabling privacy in participatory sensing
Manet titles
top-k query result completeness verification in tiered sensor networks

What's hot (9)

PPTX
Probabilistic Approach Networks Project Ideas
PDF
Jörg Blumtritt - Data Storytelling
PDF
4 Sw 2009 Ieee Abstracts Dot Net, Ncct Chennai
PPTX
Software Defined Networking
PDF
Parallel and distributed system projects for java and dot net
DOCX
Opportunistic mane ts mobility can make up for low transmission power
DOCX
Opportunistic manets mobility can make up for low transmission power
PDF
PHANTEQ
Probabilistic Approach Networks Project Ideas
Jörg Blumtritt - Data Storytelling
4 Sw 2009 Ieee Abstracts Dot Net, Ncct Chennai
Software Defined Networking
Parallel and distributed system projects for java and dot net
Opportunistic mane ts mobility can make up for low transmission power
Opportunistic manets mobility can make up for low transmission power
PHANTEQ
Ad

Similar to Efficient and privacy aware data aggregation in mobile sensing (20)

DOCX
JPJ1429 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
DOCX
efficient and privacy aware data aggregation in mobile sensing
DOCX
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
DOCX
2014 IEEE JAVA NETWORK SECURITY PROJECT Efficient and privacy aware data aggr...
DOCX
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
DOCX
2014 IEEE JAVA MOBILE COMPUTING PROJECT Efficient and privacy aware data aggr...
DOCX
2014 IEEE JAVA MOBILE COMPUTING PROJECT Efficient and privacy aware data aggr...
DOCX
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Efficient and privacy aware data agg...
PDF
M.Phil Computer Science Network Security Projects
PDF
M phil-computer-science-network-security-projects
PDF
M.E Computer Science Network Security Projects
PDF
chapter 4.pdf
DOCX
chapter 4.docx
PDF
Mobile computing projects list for java and dot net
PDF
A Survey on Privacy-Preserving Data Aggregation Without Secure Channel
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...
PDF
Secure computing for java and dot net
PDF
Design of optimal system level for embedded wireless sensor unit
PDF
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
PDF
Multi-Server Authentication Key Exchange Approach in BIGDATA Environment
JPJ1429 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
efficient and privacy aware data aggregation in mobile sensing
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
2014 IEEE JAVA NETWORK SECURITY PROJECT Efficient and privacy aware data aggr...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Efficient and privacy aware data aggr...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Efficient and privacy aware data aggr...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Efficient and privacy aware data agg...
M.Phil Computer Science Network Security Projects
M phil-computer-science-network-security-projects
M.E Computer Science Network Security Projects
chapter 4.pdf
chapter 4.docx
Mobile computing projects list for java and dot net
A Survey on Privacy-Preserving Data Aggregation Without Secure Channel
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...
Secure computing for java and dot net
Design of optimal system level for embedded wireless sensor unit
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
Multi-Server Authentication Key Exchange Approach in BIGDATA Environment
Ad

More from Papitha Velumani (20)

PDF
2015 - 2016 IEEE Project Titles and abstracts in Java
PDF
2015 - 2016 IEEE Project Titles and abstracts in Android
PDF
2015 - 2016 IEEE Project Titles and abstracts in Dotnet
DOC
Trajectory improves data delivery in urban vehicular networks
DOC
Tracon interference aware scheduling for data-intensive applications in virtu...
DOC
Supporting privacy protection in personalized web search
DOC
Stochastic bandwidth estimation in networks with random service
DOC
Sos a distributed mobile q&a system based on social networks
DOC
Security evaluation of pattern classifiers under attack
DOC
Real time misbehavior detection in ieee 802.11-based wireless networks an ana...
DOC
Probabilistic consolidation of virtual machines in self organizing cloud data...
DOC
Privacy preserving multi-keyword ranked search over encrypted cloud data
DOC
Privacy preserving and content-protecting location based queries
DOC
Pack prediction based cloud bandwidth and cost reduction system
DOC
Occt a one class clustering tree for implementing one-to-man data linkage
DOC
Leveraging social networks for p2p content based file sharing in disconnected...
DOC
LDBP: localized boundary detection and parametrization for 3 d sensor networks
DOC
Integrity for join queries in the cloud
DOC
Improving fairness, efficiency, and stability in http based adaptive video st...
DOC
Hybrid attribute and re-encryption-based key management for secure and scala...
2015 - 2016 IEEE Project Titles and abstracts in Java
2015 - 2016 IEEE Project Titles and abstracts in Android
2015 - 2016 IEEE Project Titles and abstracts in Dotnet
Trajectory improves data delivery in urban vehicular networks
Tracon interference aware scheduling for data-intensive applications in virtu...
Supporting privacy protection in personalized web search
Stochastic bandwidth estimation in networks with random service
Sos a distributed mobile q&a system based on social networks
Security evaluation of pattern classifiers under attack
Real time misbehavior detection in ieee 802.11-based wireless networks an ana...
Probabilistic consolidation of virtual machines in self organizing cloud data...
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving and content-protecting location based queries
Pack prediction based cloud bandwidth and cost reduction system
Occt a one class clustering tree for implementing one-to-man data linkage
Leveraging social networks for p2p content based file sharing in disconnected...
LDBP: localized boundary detection and parametrization for 3 d sensor networks
Integrity for join queries in the cloud
Improving fairness, efficiency, and stability in http based adaptive video st...
Hybrid attribute and re-encryption-based key management for secure and scala...

Recently uploaded (20)

PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
Insiders guide to clinical Medicine.pdf
PDF
Pre independence Education in Inndia.pdf
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
Basic Mud Logging Guide for educational purpose
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
TR - Agricultural Crops Production NC III.pdf
PPTX
Lesson notes of climatology university.
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
GDM (1) (1).pptx small presentation for students
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
Computing-Curriculum for Schools in Ghana
PDF
Complications of Minimal Access Surgery at WLH
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPH.pptx obstetrics and gynecology in nursing
Insiders guide to clinical Medicine.pdf
Pre independence Education in Inndia.pdf
Abdominal Access Techniques with Prof. Dr. R K Mishra
Basic Mud Logging Guide for educational purpose
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
TR - Agricultural Crops Production NC III.pdf
Lesson notes of climatology university.
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
GDM (1) (1).pptx small presentation for students
Module 4: Burden of Disease Tutorial Slides S2 2025
Microbial disease of the cardiovascular and lymphatic systems
Computing-Curriculum for Schools in Ghana
Complications of Minimal Access Surgery at WLH
Renaissance Architecture: A Journey from Faith to Humanism
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
VCE English Exam - Section C Student Revision Booklet
O7-L3 Supply Chain Operations - ICLT Program
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Pharmacology of Heart Failure /Pharmacotherapy of CHF

Efficient and privacy aware data aggregation in mobile sensing

  • 1. EFFICIENT AND PRIVACY-AWARE DATA AGGREGATION IN MOBILE SENSING ABSTRACT: The proliferation and ever-increasing capabilities of mobile devices such as smart phones give rise to a variety of mobile sensing applications. This paper studies how an untrusted aggregator in mobile sensing can periodically obtain desired statistics over the data contributed by multiple mobile users, without compromising the privacy of each user. Although there are some existing works in this area, they either require bidirectional communications between the aggregator and mobile users in every aggregation period, or have high computation overhead and cannot support large plaintext spaces. Also, they do not consider the Min aggregate which is quite useful in mobile sensing. To address these problems, we propose an efficient protocol to obtain the Sum aggregate, which employs an additive homomorphic encryption and a novel key
  • 2. management technique to support large plaintext space. We also extend the sum aggregation protocol to obtain the Min aggregate of time-series data. To deal with dynamic joins and leaves of mobile users, we propose a scheme which utilizes the redundancy in security to reduce the communication cost for each join and leave. Evaluations show that our protocols are orders of magnitude faster than existing solutions, and it has much lower communication overhead. EXISTING SYSTEM: The works on sensor data aggregation assume a trusted aggregator, and hence cannot protect user privacy against an untrusted aggregator in mobile sensing applications. Several recent works consider the aggregation of timeseries data in the presence of an untrusted aggregator. To protect user privacy, they design encryption schemes in which the aggregator can only decrypt the sum of all users’ data but nothing else. Rastogi and Nath use threshold Paillier cryptosystem to build such an encryption scheme. To decrypt the sum, their scheme needs an
  • 3. extra round of interaction between the aggregator and all users in every aggregation period, which means high communication cost and long delay. Moreover, it requires all users to be online until decryption is completed, which may not be practical in many mobile sensing scenarios due to user mobility and the heterogeneity of user connectivity. Rieffel propose a construction that does not require bidirectional communications between the aggregator and the users, but it has high computation and storage cost to deal with collusions in a large system. Shi et al. also propose a construction for sum aggregation which does not need the extra round of interaction. However, the decryption in their construction needs to traverse the possible plaintext space of the aggregated value, which is very expensive for a large system with large plaintext space. In mobile sensing, the plaintext space of some application can be large. DISADVANTAGES OF EXISTING SYSTEM:
  • 4.  It has no privacy the untrusted aggregator can able to access the data.  It has high computation and storage cost to deal with collusions in a large system.  It takes high communication cost and long delay. PROPOSED SYSTEM: In this paper, we propose a new protocol for mobile sensing to obtain the sum aggregate of time-series data in the presence of an untrusted aggregator. Our protocol employs an additive homomorphic encryption and a novel key management scheme based on efficient HMAC to ensure that the aggregator can only obtain the sum of all users’ data, without knowing individual user’s data or intermediate result. In our protocol, each user (the aggregator) only needs to compute a very small number of HMACs to encrypt her data (decrypt the sum). Hence, the computation cost is very low, and the protocol can scale to large systems with large plaintext spaces, resource constrained
  • 5. devices and high aggregation loads. Another nice property of our protocol is that it only requires a single round of user-to-aggregator communication. Based on the sum aggregation protocol, we propose a protocol to obtain the Min aggregate. To our best knowledge, this is the first privacy-preserving solution to obtain the Min of time-series data in mobile sensing with just one round of userto- aggregator communication. Our protocols for Sum and Min can be easily adapted to derive many other aggregate statistics such as Count, Average and Max. ADVANTAGES OF PROPOSED SYSTEM:  It reduce the communication cost of dealing with dynamic joins and leaves.  Users may frequently join and leave in mobile sensing.  It only requires a single round of user-to-aggregator communication.
  • 6. SYSTEM CONFIGURATION:- HARDWARE REQUIREMENTS:- Processor - Pentium –IV Speed - 1.1 Ghz RAM - 512 MB(min) Hard Disk - 40 GB Key Board - Standard Windows Keyboard Mouse - Two or Three Button Mouse Monitor - LCD/LED SOFTWARE REQUIREMENTS: Operating system : Windows XP. Coding Language : JAVA Data Base : MySQL Tool : Netbeans
  • 7. REFERENCE: Qinghua Li, Guohong Cao, Thomas F. La Porta, “Efficient and Privacy-Aware Data Aggregation in Mobile Sensing” IEEE TRANSACTIONS ON DEPEDABLE AND SECURE COMPUTING, VOL. 11, NO. 2, MARCH/APRIL 2014.