Date of Publication :9th February 2017
Abstract: Cell phones particularly advanced mobile phones are getting increasingly significance in everyday life. A greater amount of these cell phones are currently encouraged with the number of users that are utilizing sensors. With the assistance of extensive no. of individual members, total which is registered from information is truly valuable and predicts the measurements of the result. Total ensures more protection of the information from singular members. This paper gives an answer for protecting the individual member's security by utilizing total capacity like Sum, Min. Count of Sum accumulation is managed without discharging the member's data. Min accumulation is computed utilizing Sum collection. Min total is only least estimation of information. In this paper, a multi-bounce arrange is considered where there is a principle aggregator at the largest amount and portable hubs are considered at the most reduced level and in the middle of hub sink is utilized at the center level. This framework manages dynamic leaves and participates in versatile detecting utilizing the timestamp of the members.
Reference :
-
- QinghuaLi,GuohongCao,Thomas F. La Porta,Efficient and Privacy-Aware Data Aggregation in Mobile Sensing, IEEE transaction on Dependable and Secure Computing, Vol. 11,No. 2,March/April 2014
- V. Rastogi and S. Nath, Differentially Private Aggregation of Distributed Time-Series with Transformation and Encryption, Proc. ACM SIGMOD Intl Conf. Management of Data, 2010.
- E. Shi, T.-H.H. Chan, E. Rieffel, R. Chow, and D. Song, Privacy Preserving Aggregation of Time-Series Data, Proc. Network and Distributed System Security Symp. (NDSS 11), 2011.
- J. Shi, R. Zhang, Y. Liu, and Y. Zhang, Prisense: Privacy Preserving Data Aggregation in People-Centric Urban Sensing Systems, Proc. IEEE INFOCOM, pp. 758- 766, 2010.
- Z. Yang, S. Zhong, and R.N. Wright, PrivacyPreserving Classification of Customer Data without Loss of Accuracy, Proc. Fifth SIAM Intl Conf.Data Mining (SDM 05), pp. 21-23, 2005.
- M. Jawurek and F. Kerschbaum, Fault-Tolerant Privacy- Preserving Statistics, Proc. 12th Privacy Enhancing Technologies Symp.(PETS 12), 2012.
- M. Shao, Y. Yang, S. Zhu, and G. Cao, Towards Statistically Strong Source Anonymity for Sensor Networks, Proc. IEEE INFOCOM, 2008.
- C. Castelluccia, Efficient Aggregation of Encrypted Data in Wireless Sensor Networks, Proc. Second Ann. Intl Conf. Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous 05), pp. 109-117, 2005.
- M. Bellare, New Proofs for NMAC and HMAC: Security without Collision-Resistance, Proc. 26th Ann. Intl Conf. Advances in Cryptology (CRYPTO 06), pp. 602-619, 2006.
- Q. Li and G. Cao, Providing Privacy-Aware Incentives for Mobile Sensing, Proc. IEEE PerCom, 2013.