SlideShare a Scribd company logo
GLOBALSOFT TECHNOLOGIES 
IEEE PROJECTS & SOFTWARE DEVELOPMENTS 
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE 
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS 
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com 
Efficient and Privacy-Aware Data Aggregation in Mobile 
Sensing 
ABSTRACT: 
The proliferation and ever-increasing capabilities of mobile devices such as smart 
phones give rise to a variety of mobile sensing applications. This paper studies 
how an untrusted aggregator in mobile sensing can periodically obtain desired 
statistics over the data contributed by multiple mobile users, without compromising 
the privacy of each user. Although there are some existing works in this area, they 
either require bidirectional communications between the aggregator and mobile 
users in every aggregation period, or have high-computation overhead and cannot 
support large plaintext spaces. Also, they do not consider the Min aggregate, which 
is quite useful in mobile sensing. To address these problems, we propose an 
efficient protocol to obtain the Sum aggregate, which employs an additive 
homomorphic encryption and a novel key management technique to support large 
plaintext space. We also extend the sum aggregation protocol to obtain the Min 
aggregate of time-series data. To deal with dynamic joins and leaves of mobile 
users, we propose a scheme that utilizes the redundancy in security to reduce the 
communication cost for each join and leave. Evaluations show that our protocols
are orders of magnitude faster than existing solutions, and it has much lower 
communication overhead. 
EXISTING SYSTEM: 
 Sensor data aggregation assumes a trusted aggregator, and hence cannot 
protect user privacy against an untrusted aggregator in mobile sensing 
applications. Several recent works consider the aggregation of time-series 
data in the presence of an untrusted aggregator. To protect user privacy, they 
design encryption schemes in which the aggregator can only decrypt the sum 
of all users’ data but nothing else. 
 Use threshold Paillier cryptosystem to build such an encryption scheme. To 
decrypt the sum, their scheme needs an extra round of interaction between 
the aggregator and all users in every aggregation period, which means high 
communication cost and long delay. Moreover, it requires all users to be 
online until decryption is completed, which may not be practical in many 
mobile sensing scenarios due to user mobility and the heterogeneity of user 
connectivity. 
DISADVANTAGES OF EXISTING SYSTEM: 
 Cannot protect user privacy against untrusted aggregators. 
 Existing works do not consider the Min of time-series data.
PROPOSED SYSTEM: 
 We propose a new privacy-preserving protocol to obtain the Sum aggregate 
of time-series data. 
 The protocol utilizes additive homomorphic encryption and a novel, HMAC-based 
key management technique to perform extremely efficient 
aggregation. 
ADVANTAGES OF PROPOSED SYSTEM: 
 Our scheme has much lower communication overhead than existing work. 
 Utilizes the redundancy in security to reduce the communication cost for 
each join and leave. 
SYSTEM ARCHITECTURE: 
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS: 
 System : Pentium IV 2.4 GHz. 
 Hard Disk : 40 GB. 
 Floppy Drive : 1.44 Mb. 
 Monitor : 15 VGA Colour. 
 Mouse : Logitech. 
 Ram : 512 Mb. 
SOFTWARE REQUIREMENTS: 
 Operating system : Windows XP/7. 
 Coding Language : JAVA/J2EE 
 IDE : Netbeans 7.4 
 Database : MYSQL 
REFERENCE: 
Qinghua Li, Guohong Cao, and Thomas F. La Porta, “Efficient and Privacy- 
Aware Data Aggregation in Mobile Sensing”, VOL. 11, NO. 2, MARCH/APRIL 
2014.

More Related Content

DOCX
JPJ1429 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
DOCX
efficient and privacy aware data aggregation in mobile sensing
PPTX
Project Topics Information Technology
PPTX
Project Topics in Information Technology
PPTX
Research Topics in Network Security for PhD
PPTX
Mobile Networking Projects
PPTX
FYP2- Micro Search Engine for Iot
JPJ1429 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
efficient and privacy aware data aggregation in mobile sensing
Project Topics Information Technology
Project Topics in Information Technology
Research Topics in Network Security for PhD
Mobile Networking Projects
FYP2- Micro Search Engine for Iot

What's hot (18)

PPTX
Mininet Tool Research Help
PPTX
Making sense of IoT, M2M and Big Data
PPTX
Fog Computing Projects
PPTX
Network Security Project Ideas
PPTX
Network Security Thesis Topics
PDF
Hassle-free IoT projects with DeviceHive — Artyom Sorokin (Tech Stage)
PPTX
Machine-to-Machine-Communication-Projects
PPTX
Latest Networking Research Project Topics
PPTX
Thesis on Manet Projects
DOCX
Participatory privacy enabling privacy in participatory sensing
PDF
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
PPTX
Thesis Topic on Networking
PPTX
Lecture 5
DOCX
efficient io t management with resilience to unauthorized access to cloud sto...
PPTX
Ppt 3 - IOT logic design
DOCX
International Journal of Wireless Networks Systems (IJWNS)
Mininet Tool Research Help
Making sense of IoT, M2M and Big Data
Fog Computing Projects
Network Security Project Ideas
Network Security Thesis Topics
Hassle-free IoT projects with DeviceHive — Artyom Sorokin (Tech Stage)
Machine-to-Machine-Communication-Projects
Latest Networking Research Project Topics
Thesis on Manet Projects
Participatory privacy enabling privacy in participatory sensing
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
Thesis Topic on Networking
Lecture 5
efficient io t management with resilience to unauthorized access to cloud sto...
Ppt 3 - IOT logic design
International Journal of Wireless Networks Systems (IJWNS)
Ad

Viewers also liked (9)

DOC
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Scalable analytics for iaa s cloud av...
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Transformation based monetary cost op...
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Dynamic heterogeneity aware resource ...
DOCX
IEEE 2014 JAVA NETWORKING PROJECTS Qos aware geographic opportunistic routing...
DOCX
IEEE 2014 JAVA NETWORKING PROJECTS Fair scheduling in cellular systems in the...
DOCX
IEEE 2014 JAVA NETWORKING PROJECTS Cost effective resource allocation of over...
DOCX
IEEE 2014 JAVA NETWORKING PROJECTS Automatic test packet generation
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud based mobile multimedia recomme...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Scalable analytics for iaa s cloud av...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Transformation based monetary cost op...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Dynamic heterogeneity aware resource ...
IEEE 2014 JAVA NETWORKING PROJECTS Qos aware geographic opportunistic routing...
IEEE 2014 JAVA NETWORKING PROJECTS Fair scheduling in cellular systems in the...
IEEE 2014 JAVA NETWORKING PROJECTS Cost effective resource allocation of over...
IEEE 2014 JAVA NETWORKING PROJECTS Automatic test packet generation
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud based mobile multimedia recomme...
Ad

Similar to IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data aggregation in mobile sensing (20)

DOCX
2014 IEEE JAVA MOBILE COMPUTING PROJECT Efficient and privacy aware data aggr...
DOCX
2014 IEEE JAVA MOBILE COMPUTING PROJECT Efficient and privacy aware data aggr...
DOCX
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Efficient and privacy aware data agg...
DOC
Efficient and privacy aware data aggregation in mobile sensing
PDF
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
PDF
Iaetsd enhancement of performance and security in bigdata processing
PDF
Ijeee 16-19-digital media hidden data extracting
PDF
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
PDF
Multi-Server Authentication Key Exchange Approach in BIGDATA Environment
PPTX
A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing.pptx
PDF
A new approach of scalable traffic capture model with Pi cluster
DOCX
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...
DOCX
2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...
DOCX
2014 IEEE JAVA CLOUD COMPUTING PROJECT Cloud assisted mobile-access of health...
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud assisted mobile-access of healt...
PDF
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
DOCX
cv2
PDF
Research
PDF
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
PDF
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
2014 IEEE JAVA MOBILE COMPUTING PROJECT Efficient and privacy aware data aggr...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Efficient and privacy aware data aggr...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Efficient and privacy aware data agg...
Efficient and privacy aware data aggregation in mobile sensing
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
Iaetsd enhancement of performance and security in bigdata processing
Ijeee 16-19-digital media hidden data extracting
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
Multi-Server Authentication Key Exchange Approach in BIGDATA Environment
A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing.pptx
A new approach of scalable traffic capture model with Pi cluster
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Cloud assisted mobile-access of health...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud assisted mobile-access of healt...
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
cv2
Research
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING

More from IEEEGLOBALSOFTSTUDENTPROJECTS (20)

DOCX
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Peer assisted vo d systems an ef...
DOCX
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...
DOCX
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On social delay tolerant network...
DOCX
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Cross layer approach for minimiz...
DOCX
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Constructing load balanced data ...
DOCX
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS An ontology based hybrid approac...
DOCX
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS A security and privacy aware loc...
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Scalable distributed service integrit...
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Performance and cost evaluation of an...
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Optimal power allocation and load dis...
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Dynamic cloud pricing for revenue max...
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Distributed, concurrent, and independ...
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Automatic scaling of internet applica...
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Adaptive algorithm for minimizing clo...
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A stochastic model to investigate dat...
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A hybrid cloud approach for secure au...
DOCX
IEEE 2014 JAVA NETWORKING PROJECTS Snapshot and continuous data collection in...
DOCX
IEEE 2014 JAVA NETWORKING PROJECTS Secure continuous aggregation in wireless ...
DOCX
IEEE 2014 JAVA NETWORKING PROJECTS Secure and efficient data transmission for...
DOCX
IEEE 2014 JAVA NETWORKING PROJECTS Receiver based flow control for networks i...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Peer assisted vo d systems an ef...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On social delay tolerant network...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Cross layer approach for minimiz...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Constructing load balanced data ...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS An ontology based hybrid approac...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS A security and privacy aware loc...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Scalable distributed service integrit...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Performance and cost evaluation of an...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Optimal power allocation and load dis...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Dynamic cloud pricing for revenue max...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Distributed, concurrent, and independ...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Automatic scaling of internet applica...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Adaptive algorithm for minimizing clo...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A stochastic model to investigate dat...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A hybrid cloud approach for secure au...
IEEE 2014 JAVA NETWORKING PROJECTS Snapshot and continuous data collection in...
IEEE 2014 JAVA NETWORKING PROJECTS Secure continuous aggregation in wireless ...
IEEE 2014 JAVA NETWORKING PROJECTS Secure and efficient data transmission for...
IEEE 2014 JAVA NETWORKING PROJECTS Receiver based flow control for networks i...

Recently uploaded (20)

PPT
Project quality management in manufacturing
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PPTX
CH1 Production IntroductoryConcepts.pptx
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PDF
PPT on Performance Review to get promotions
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
Geodesy 1.pptx...............................................
PPTX
Sustainable Sites - Green Building Construction
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
bas. eng. economics group 4 presentation 1.pptx
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
composite construction of structures.pdf
PPTX
additive manufacturing of ss316l using mig welding
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Project quality management in manufacturing
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
CH1 Production IntroductoryConcepts.pptx
Model Code of Practice - Construction Work - 21102022 .pdf
PPT on Performance Review to get promotions
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Geodesy 1.pptx...............................................
Sustainable Sites - Green Building Construction
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
bas. eng. economics group 4 presentation 1.pptx
Embodied AI: Ushering in the Next Era of Intelligent Systems
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
UNIT-1 - COAL BASED THERMAL POWER PLANTS
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
composite construction of structures.pdf
additive manufacturing of ss316l using mig welding
Automation-in-Manufacturing-Chapter-Introduction.pdf
OOP with Java - Java Introduction (Basics)
CYBER-CRIMES AND SECURITY A guide to understanding
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...

IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data aggregation in mobile sensing

  • 1. GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com Efficient and Privacy-Aware Data Aggregation in Mobile Sensing ABSTRACT: The proliferation and ever-increasing capabilities of mobile devices such as smart phones give rise to a variety of mobile sensing applications. This paper studies how an untrusted aggregator in mobile sensing can periodically obtain desired statistics over the data contributed by multiple mobile users, without compromising the privacy of each user. Although there are some existing works in this area, they either require bidirectional communications between the aggregator and mobile users in every aggregation period, or have high-computation overhead and cannot support large plaintext spaces. Also, they do not consider the Min aggregate, which is quite useful in mobile sensing. To address these problems, we propose an efficient protocol to obtain the Sum aggregate, which employs an additive homomorphic encryption and a novel key management technique to support large plaintext space. We also extend the sum aggregation protocol to obtain the Min aggregate of time-series data. To deal with dynamic joins and leaves of mobile users, we propose a scheme that utilizes the redundancy in security to reduce the communication cost for each join and leave. Evaluations show that our protocols
  • 2. are orders of magnitude faster than existing solutions, and it has much lower communication overhead. EXISTING SYSTEM:  Sensor data aggregation assumes a trusted aggregator, and hence cannot protect user privacy against an untrusted aggregator in mobile sensing applications. Several recent works consider the aggregation of time-series data in the presence of an untrusted aggregator. To protect user privacy, they design encryption schemes in which the aggregator can only decrypt the sum of all users’ data but nothing else.  Use threshold Paillier cryptosystem to build such an encryption scheme. To decrypt the sum, their scheme needs an extra round of interaction between the aggregator and all users in every aggregation period, which means high communication cost and long delay. Moreover, it requires all users to be online until decryption is completed, which may not be practical in many mobile sensing scenarios due to user mobility and the heterogeneity of user connectivity. DISADVANTAGES OF EXISTING SYSTEM:  Cannot protect user privacy against untrusted aggregators.  Existing works do not consider the Min of time-series data.
  • 3. PROPOSED SYSTEM:  We propose a new privacy-preserving protocol to obtain the Sum aggregate of time-series data.  The protocol utilizes additive homomorphic encryption and a novel, HMAC-based key management technique to perform extremely efficient aggregation. ADVANTAGES OF PROPOSED SYSTEM:  Our scheme has much lower communication overhead than existing work.  Utilizes the redundancy in security to reduce the communication cost for each join and leave. SYSTEM ARCHITECTURE: SYSTEM REQUIREMENTS:
  • 4. HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7.  Coding Language : JAVA/J2EE  IDE : Netbeans 7.4  Database : MYSQL REFERENCE: Qinghua Li, Guohong Cao, and Thomas F. La Porta, “Efficient and Privacy- Aware Data Aggregation in Mobile Sensing”, VOL. 11, NO. 2, MARCH/APRIL 2014.