Participatory Privacy: Enabling Privacy in Participatory
Sensing
ABSTRACT:
Participatory sensing is an emerging computing paradigm that enables the
distributed collection of data by self-selected participants. It allows the increasing
number of mobile phone users to share local knowledge acquired by their sensor-
equipped devices (e.g., to monitor temperature, pollution level, or consumer
pricing information). While research initiatives and prototypes proliferate, their
real-world impact is often bounded to comprehensive user participation. If users
have no incentive, or feel that their privacy might be endangered, it is likely that
they will not participate. In this article, we focus on privacy protection in
participatory sensing and introduce a suitable privacy-enhanced infrastructure.
First, we provide a set of definitions of privacy requirements for both data
producers (i.e., users providing sensed information) and consumers (i.e.,
applications accessing the data). Then we propose an efficient solution designed
for mobile phone users, which incurs very low overhead. Finally, we discuss a
number of open problems and possible research directions.
EXISTING SYSTEM:
In the last few years, PS initiatives have multiplied, ranging from research
prototypes to deployed systems. Due to space limitations we briefly review some
PS application that apparently expose participant privacy (location, habits, etc.).
Each of them can easily be enhanced with our privacy-protecting layer.
DISADVANTAGES OF EXISTING SYSTEM:
Privacy in participatory sensing relying on weak assumptions: they attempted to
protect anonymity of mobile nodes through the use of Mix Networks. (A Mix
Network is a statistical-based anonymizing infrastructure that provides k-
anonymity; i.e., an adversary cannot tell a user from a set of k.) However, Mix
Networks are unsuitable for many PS settings. They do not attain provable privacy
guarantees and assume the presence of a ubiquitous WiFi infrastructure used by
mobile nodes, whereas PS applications do leverage the increasing use of
broadband 3G/4G connectivity. In fact, a ubiquitous presence of open WiFi
networks is not realistic today or anticipated in the near future.
PROPOSED SYSTEM:
We now present our innovative solution for a Privacy-Enhanced Participatory
Sensing Infrastructure (PEPSI). PEPSI protects privacy using efficient
cryptographic tools. Similar to other cryptographic solutions, it introduces an
additional (offline) entity, the registration authority. It sets up system parameters
and manages mobile nodes or queriers registration. However, the registration
authority is not involved in real-time operations (e.g., query/report matching); nor
is it trusted to intervene for protecting participants’ privacy.
PEPSI allows the service provider to perform report/query matching while
guaranteeing the privacy of both mobile nodes and queriers. It aims at providing
(provable) privacy by design, and starts off with defining a clear set of privacy
properties.
ADVANTAGES OF PROPOSED SYSTEM:
• Secure encryption of reports and queries
• Efficient and oblivious matching by the service provider
ARCHITECTURE:
SYSTEM CONFIGURATION:-
HARDWARE CONFIGURATION:-
 Processor - Pentium –IV
 Speed - 1.1 Ghz
 RAM - 256 MB(min)
 Hard Disk - 20 GB
 Key Board - Standard Windows Keyboard
 Mouse - Two or Three Button Mouse
 Monitor - SVGA
SOFTWARE CONFIGURATION:-
 Operating System : Windows XP
 Programming Language : JAVA
 Java Version : JDK 1.6 & above.
REFERENCE:
Emiliano De Cristofaro, Palo Alto Research Center (PARC) Claudio Soriente,
ETH Zurich, Switzerland, “Participatory Privacy: Enabling Privacy in
Participatory Sensing”, IEEE Network January/February 2013.

More Related Content

DOCX
Participatory privacy enabling privacy in participatory sensing
PDF
EENA2019: Track3 session1 improving response times & decision making_Eric Basha
PDF
EENA2019: Track2 session1 _Improving coordinated response with cloud-based so...
DOCX
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
DOCX
JPJ1429 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
PPTX
Probabilistic Approach Networks Project Ideas
PDF
EEENA 2018 - Social Media in the Emergency Services Control Room
Participatory privacy enabling privacy in participatory sensing
EENA2019: Track3 session1 improving response times & decision making_Eric Basha
EENA2019: Track2 session1 _Improving coordinated response with cloud-based so...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
JPJ1429 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
Probabilistic Approach Networks Project Ideas
EEENA 2018 - Social Media in the Emergency Services Control Room

What's hot (17)

DOCX
efficient and privacy aware data aggregation in mobile sensing
PPTX
Project Topics in Information Technology
PPTX
Project Topics Information Technology
DOCX
Scalable Access Control For Privacy-Aware Media Sharing
PDF
Intelligence from EDGE to core to cloud. Sergio Crippa - Hewlett Packard Ente...
DOCX
International Journal of Wireless Networks Systems (IJWNS)
PPTX
TSSG Security research unit May11_zdooly
PDF
EENA 2021 - Improving public safety with smart cities and Internet of Things ...
DOC
Efficient and privacy aware data aggregation in mobile sensing
DOCX
International Journal of Wireless Networks Systems (IJWNS)
PDF
Altus Brochure
PPTX
Big Crypto for Little Things
PDF
eVentureReview
DOCX
International Journal of Wireless Networks Systems (IJWNS)
PPTX
Agile fractal grid 7-11-14
DOCX
International Journal of Wireless Networks Systems (IJWNS)
efficient and privacy aware data aggregation in mobile sensing
Project Topics in Information Technology
Project Topics Information Technology
Scalable Access Control For Privacy-Aware Media Sharing
Intelligence from EDGE to core to cloud. Sergio Crippa - Hewlett Packard Ente...
International Journal of Wireless Networks Systems (IJWNS)
TSSG Security research unit May11_zdooly
EENA 2021 - Improving public safety with smart cities and Internet of Things ...
Efficient and privacy aware data aggregation in mobile sensing
International Journal of Wireless Networks Systems (IJWNS)
Altus Brochure
Big Crypto for Little Things
eVentureReview
International Journal of Wireless Networks Systems (IJWNS)
Agile fractal grid 7-11-14
International Journal of Wireless Networks Systems (IJWNS)
Ad

Viewers also liked (19)

PDF
Twitsper tweeting privately
PDF
final year ieee projects in pondicherry
PDF
2013 ieee java project titles for cse, it and mca
DOCX
Towards secure multi keyword top-k retrieval over encrypted cloud data
DOCX
Using fuzzy logic control to provide intelligent traffic management service f...
PDF
Facilitating document annotation using content and querying value
DOCX
A rank correlation based detection against distributed reflection do s attacks
DOC
IEEE PROJECTS FOR ECE 2013 2014
DOCX
Identity based secure distributed data storage schemes
DOCX
Back pressure-based packet-by-packet adaptive routing in communication networks
DOCX
A highly scalable key pre distribution scheme for wireless sensor networks
PDF
2013 14 ieee ece project titles - jp infotech
DOCX
Privacy preserving delegated access control in public clouds
DOCX
Distributed cooperative caching in social wireless networks
DOCX
Proteus multiflow diversity routing for wireless networks with cooperative tr...
DOCX
Efficient algorithms for neighbor discovery in wireless networks
DOCX
Network assisted mobile computing with optimal uplink query processing
DOCX
Toward fine grained, unsupervised, scalable performance diagnosis for product...
DOCX
Secure mining of association rules in horizontally distributed databases
Twitsper tweeting privately
final year ieee projects in pondicherry
2013 ieee java project titles for cse, it and mca
Towards secure multi keyword top-k retrieval over encrypted cloud data
Using fuzzy logic control to provide intelligent traffic management service f...
Facilitating document annotation using content and querying value
A rank correlation based detection against distributed reflection do s attacks
IEEE PROJECTS FOR ECE 2013 2014
Identity based secure distributed data storage schemes
Back pressure-based packet-by-packet adaptive routing in communication networks
A highly scalable key pre distribution scheme for wireless sensor networks
2013 14 ieee ece project titles - jp infotech
Privacy preserving delegated access control in public clouds
Distributed cooperative caching in social wireless networks
Proteus multiflow diversity routing for wireless networks with cooperative tr...
Efficient algorithms for neighbor discovery in wireless networks
Network assisted mobile computing with optimal uplink query processing
Toward fine grained, unsupervised, scalable performance diagnosis for product...
Secure mining of association rules in horizontally distributed databases
Ad

Similar to Participatory privacy enabling privacy in participatory sensing (20)

DOCX
JAVA 2013 IEEE NETWORKING PROJECT Participatory privacy enabling privacy in p...
PDF
Secure Distributed Collection of Data Using Participator Sensing Paradigm
DOCX
Anonymity based privacy-preserving data
PPTX
Privacy-preserving Information Sharing: Tools and Applications
PDF
PROVIDING PRIVACY-AWARE INCENTIVES IN MOBILE SENSING SYSTEMS
DOCX
Privacy and quality preserving multimedia data
PDF
Privacy preserving
PDF
Privacy Preserving Aggregate Statistics for Mobile Crowdsensing
PDF
I want you to Read intensively papers and give me a summary for ever.pdf
DOCX
Sensitive label privacy protection on social
PDF
User Controlled Privacy in Participatory Sensing
PPT
4 Environmental Sustainability Ws Nithya Ramanathan
DOCX
2014 IEEE JAVA NETWORK SECURITY PROJECT Profilr toward preserving privacy and...
DOCX
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Profilr toward preserving privacy an...
PDF
Mobile Computing IEEE 2014 Projects
PPTX
Mobile Computing
PPTX
Anonymous Individual Integration for IoT
PDF
Designing experiences for the personal data box
PDF
User privacy and data trustworthiness in mobile crowd sensing
PDF
My Privacy My decision: Control of Photo Sharing on Online Social Networks
JAVA 2013 IEEE NETWORKING PROJECT Participatory privacy enabling privacy in p...
Secure Distributed Collection of Data Using Participator Sensing Paradigm
Anonymity based privacy-preserving data
Privacy-preserving Information Sharing: Tools and Applications
PROVIDING PRIVACY-AWARE INCENTIVES IN MOBILE SENSING SYSTEMS
Privacy and quality preserving multimedia data
Privacy preserving
Privacy Preserving Aggregate Statistics for Mobile Crowdsensing
I want you to Read intensively papers and give me a summary for ever.pdf
Sensitive label privacy protection on social
User Controlled Privacy in Participatory Sensing
4 Environmental Sustainability Ws Nithya Ramanathan
2014 IEEE JAVA NETWORK SECURITY PROJECT Profilr toward preserving privacy and...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Profilr toward preserving privacy an...
Mobile Computing IEEE 2014 Projects
Mobile Computing
Anonymous Individual Integration for IoT
Designing experiences for the personal data box
User privacy and data trustworthiness in mobile crowd sensing
My Privacy My decision: Control of Photo Sharing on Online Social Networks

Recently uploaded (20)

PPTX
What’s under the hood: Parsing standardized learning content for AI
DOCX
Cambridge-Practice-Tests-for-IELTS-12.docx
PDF
HVAC Specification 2024 according to central public works department
PDF
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 2).pdf
PDF
Race Reva University – Shaping Future Leaders in Artificial Intelligence
PDF
FORM 1 BIOLOGY MIND MAPS and their schemes
PDF
LIFE & LIVING TRILOGY - PART - (2) THE PURPOSE OF LIFE.pdf
PPTX
B.Sc. DS Unit 2 Software Engineering.pptx
PPTX
Share_Module_2_Power_conflict_and_negotiation.pptx
PDF
Hazard Identification & Risk Assessment .pdf
PDF
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
PDF
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
PPTX
Introduction to pro and eukaryotes and differences.pptx
PDF
Journal of Dental Science - UDMY (2022).pdf
PPTX
DRUGS USED FOR HORMONAL DISORDER, SUPPLIMENTATION, CONTRACEPTION, & MEDICAL T...
PDF
LIFE & LIVING TRILOGY- PART (1) WHO ARE WE.pdf
PDF
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
PPTX
Computer Architecture Input Output Memory.pptx
PDF
My India Quiz Book_20210205121199924.pdf
What’s under the hood: Parsing standardized learning content for AI
Cambridge-Practice-Tests-for-IELTS-12.docx
HVAC Specification 2024 according to central public works department
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 2).pdf
Race Reva University – Shaping Future Leaders in Artificial Intelligence
FORM 1 BIOLOGY MIND MAPS and their schemes
LIFE & LIVING TRILOGY - PART - (2) THE PURPOSE OF LIFE.pdf
B.Sc. DS Unit 2 Software Engineering.pptx
Share_Module_2_Power_conflict_and_negotiation.pptx
Hazard Identification & Risk Assessment .pdf
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
Introduction to pro and eukaryotes and differences.pptx
Journal of Dental Science - UDMY (2022).pdf
DRUGS USED FOR HORMONAL DISORDER, SUPPLIMENTATION, CONTRACEPTION, & MEDICAL T...
LIFE & LIVING TRILOGY- PART (1) WHO ARE WE.pdf
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
Computer Architecture Input Output Memory.pptx
My India Quiz Book_20210205121199924.pdf

Participatory privacy enabling privacy in participatory sensing

  • 1. Participatory Privacy: Enabling Privacy in Participatory Sensing ABSTRACT: Participatory sensing is an emerging computing paradigm that enables the distributed collection of data by self-selected participants. It allows the increasing number of mobile phone users to share local knowledge acquired by their sensor- equipped devices (e.g., to monitor temperature, pollution level, or consumer pricing information). While research initiatives and prototypes proliferate, their real-world impact is often bounded to comprehensive user participation. If users have no incentive, or feel that their privacy might be endangered, it is likely that they will not participate. In this article, we focus on privacy protection in participatory sensing and introduce a suitable privacy-enhanced infrastructure. First, we provide a set of definitions of privacy requirements for both data producers (i.e., users providing sensed information) and consumers (i.e., applications accessing the data). Then we propose an efficient solution designed for mobile phone users, which incurs very low overhead. Finally, we discuss a number of open problems and possible research directions.
  • 2. EXISTING SYSTEM: In the last few years, PS initiatives have multiplied, ranging from research prototypes to deployed systems. Due to space limitations we briefly review some PS application that apparently expose participant privacy (location, habits, etc.). Each of them can easily be enhanced with our privacy-protecting layer. DISADVANTAGES OF EXISTING SYSTEM: Privacy in participatory sensing relying on weak assumptions: they attempted to protect anonymity of mobile nodes through the use of Mix Networks. (A Mix Network is a statistical-based anonymizing infrastructure that provides k- anonymity; i.e., an adversary cannot tell a user from a set of k.) However, Mix Networks are unsuitable for many PS settings. They do not attain provable privacy guarantees and assume the presence of a ubiquitous WiFi infrastructure used by mobile nodes, whereas PS applications do leverage the increasing use of broadband 3G/4G connectivity. In fact, a ubiquitous presence of open WiFi networks is not realistic today or anticipated in the near future. PROPOSED SYSTEM: We now present our innovative solution for a Privacy-Enhanced Participatory Sensing Infrastructure (PEPSI). PEPSI protects privacy using efficient
  • 3. cryptographic tools. Similar to other cryptographic solutions, it introduces an additional (offline) entity, the registration authority. It sets up system parameters and manages mobile nodes or queriers registration. However, the registration authority is not involved in real-time operations (e.g., query/report matching); nor is it trusted to intervene for protecting participants’ privacy. PEPSI allows the service provider to perform report/query matching while guaranteeing the privacy of both mobile nodes and queriers. It aims at providing (provable) privacy by design, and starts off with defining a clear set of privacy properties. ADVANTAGES OF PROPOSED SYSTEM: • Secure encryption of reports and queries • Efficient and oblivious matching by the service provider
  • 4. ARCHITECTURE: SYSTEM CONFIGURATION:- HARDWARE CONFIGURATION:-  Processor - Pentium –IV  Speed - 1.1 Ghz  RAM - 256 MB(min)  Hard Disk - 20 GB  Key Board - Standard Windows Keyboard
  • 5.  Mouse - Two or Three Button Mouse  Monitor - SVGA SOFTWARE CONFIGURATION:-  Operating System : Windows XP  Programming Language : JAVA  Java Version : JDK 1.6 & above. REFERENCE: Emiliano De Cristofaro, Palo Alto Research Center (PARC) Claudio Soriente, ETH Zurich, Switzerland, “Participatory Privacy: Enabling Privacy in Participatory Sensing”, IEEE Network January/February 2013.