Tuesday 20 October 2015

User Privacy and Data Trustworthiness in Mobile Crowd Sensing



ABSTRACT
Smart phones and other trendy mobile wearable devices are rapidly becoming the dominant sensing, computing and communication devices in peoples’ daily lives. Mobile crowd sensing is an emerging technology based on the sensing and networking capabilities of such mobile wearable devices. MCS has shown great potential in improving peoples’ quality of life, including healthcare and transportation, and thus has found a wide range of novel applications. However, user privacy and data trustworthiness are two critical challenges faced by MCS. In this article, we introduce the architecture of MCS and discuss its unique characteristics and advantages over traditional wireless sensor networks, which result in inapplicability of most existing WSN security solutions. Furthermore, we summarize recent advances in these areas and suggest some future research directions.
AIM
The aim of this paper is we introduce the architecture of MCS and discuss its unique characteristics and advantages over traditional wireless sensor networks, which result in inapplicability of most existing WSN security solutions
SCOPE
The scope of this paper is user privacy and data trustworthiness are two critical challenges faced by MCS.
EXISTING SYSTEM
MCS can provide fine grained monitoring of interested parameters without setting up the sensing infrastructure beforehand. Moreover, with the proliferation of mobile wearable devices and the ubiquity of wireless broadband connections, MCS can operate in an environment which is not feasible or economical for WSNs. Second, since mobile wearable devices have much more resources than sensor nodes in terms of computing power, memory, and energy, more requirements can be met by MCS applications. Third, sensing devices in MCS are mobile in nature. Therefore, they can collect spatio-temporal data in a much easier way than traditional WSNs. Fourth, the sensing process is more intelligent as participants can take control of the sensing process. Fifth, sometimes WSNs have high installation and maintenance cost, and possibly insufficient node coverage. However, as MCS leverages existing sensing devices and communication infrastructure, there is virtually no establishment cost.
DISADVANTAGES

  1. User privacy
  2. Data trustworthiness

PROPOSED SYSTEM
In this project, Although a lot of research and development activities on MCS have taken place, they mainly focus on new applications and the solution of data collection. There are a number of other issues that need to be addressed. Among these are user privacy and data trustworthiness. As MCS applications involve data collection across wide geographical areas, spatial-temporal information is invariably associated with the data uploaded by participants. This imposes possible threats to user privacy because the collected data may disclose their locations and trajectories. Other possible privacy invasions include recording intimate discussions and capturing private scenes. Such threats would discourage people from becoming participants in MCS. Since altruistic data collection is a critical element of MCS, this issue of privacy invasion needs to be addressed immediately before the success of MCS is explored further. Another security issue of MCS is the reliability of the uploaded data. As data are reported by participants, they could possibly be falsified. Hence, this raises the issue of data trustworthi-ness. Furthermore, this issue inherently conflicts with the privacy issue. This is because if participants’ identities are not disclosed, those participants reporting falsified or even fabricated data cannot be identified and eliminated. In other words, if full anonymity is provided to MCS participants, guaranteeing the trustworthiness of reported data is difficult. Hence, data trustworthiness in MCS becomes more crucial than in traditional wireless sensor networks (WSNs), which deploy a large number of wireless sensor devices managed by the network owner.
ADVANTAGES
·      Protecting the data trustworthiness counteracts the mechanisms for preserving privacy.
·      A good privacy-preserving reputation system for MCS should consider the link ability exposed by reputation values
SYSTEM ARCHITECTURE
        


SYSTEM CONFIGURATION

HARDWARE REQUIREMENTS:-

·                Processor          -   Pentium –III

·                Speed                -    1.1 Ghz
·                RAM                 -    256 MB(min)
·                Hard Disk         -   20 GB
·                Floppy Drive    -    1.44 MB
·                Key Board                 -    Standard Windows Keyboard
·                Mouse               -    Two or Three Button Mouse
·                Monitor             -    SVGA

SOFTWARE REQUIREMENTS:-

·                Operating System      :Android OS             
·                Front End                  : JAVA
·                Database                  : SqLite
·                Tool                           :Eclipse

REFERENCES
Suarez-Tangil, G.,Tapiador, J.E. ; Lombardi, F. ; Di Pietro, R. “ALTERDROID: Differential Fault Analysis of Obfuscated Smartphone Malware”, IEEE Transactions on Mobile Computing Volume PP ,  Issue 99  June 2015

No comments:

Post a Comment