SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Privacy and Quality Preserving Multimedia Data
Aggregation for Participatory Sensing Systems
ABSTRACT:
With the popularity of mobile wireless devices equipped with various kinds of
sensing abilities, a new service paradigm named participatory sensing has emerged
to provide users with brand new life experience. However, the wide application of
participatory sensing has its own challenges, among which privacy and multimedia
data quality preservations are two critical problems. Unfortunately, none of the
existing work has fully solved the problem of privacy and quality preserving
participatory sensing with multimedia data. In this paper, we propose SLICER,
which is the first k-anonymous privacy preserving scheme for participatory sensing
with multimedia data. SLICER integrates a data coding technique and message
transfer strategies, to achieve strong protection of participants’ privacy, while
maintaining high data quality. Specifically, we study two kinds of data transfer
strategies, namely transfer on meet up (TMU) and minimal cost transfer (MCT).
For MCT, we propose two different but complimentary algorithms, including an
approximation algorithm and a heuristic algorithm, subject to different strengths of
the requirement. Furthermore, we have implemented SLICER and evaluated its
performance using publicly released taxi traces. Our evaluation results show that
SLICER achieves high data quality, with low computation and communication
overhead.
EXISTING SYSTEM:
In the current state-of-the-art, a number of privacy preserving techniques for
participatory sensing systems, especially the location-based services (LBSs), have
been proposed by previous researchers, mainly to address the privacy of data
source identity, user location, user trajectory, and sensing data content itself. These
techniques can be classified into the following four categories.
1. Randomization Based Techniques
2. Generalization
3. Cloaking Techniques
4. Cryptography Based Solutions
DISADVANTAGES OF EXISTING SYSTEM:
 Sensing record sent to the service provider, is usually attached with spatio-
temporal tags indicating the location and time information of the data
collected.
 Most of existing applications of participatory sensing only collect small
pieces of sensing data (e.g., temperature, velocity, and geographic location).
 Applying existing privacy preserving schemes to participatory sensing with
multimedia data is not satisfactory, since existing schemes either induce
unacceptable amount of communication cost, or degrade the utility/ quality
of the data badly, in caseof multimedia sensing.
PROPOSED SYSTEM:
 In this paper, we present SLICER, which is a coding based k-anonymous
privacy preserving scheme, working on application layer, for participatory
sensing with multimedia data. Intuitively, k-anonymity means that the
service provider cannot identify the contributor of each sensing record from
a group of at least k participants.
 We propose SLICER for participatory sensing with multimedia data, to
achieve both k-anonymous privacy preservation and high data quality, with
low communication and computation overhead.
 We design an erasure coding based sensing record coding scheme to encode
each sensing record into a number of data slices, each of which can be
delivered to the service provider through the other participants or the
record’s generator herself. When a proper data slice exchanging strategy is
applied, the contributor of each particular sensing record is hidden in a group
of at least k participants.
 We propose two kinds of strategies for slice transfer. The first and
straightforward strategy is named Transfer on Meet Up (TMU), which is to
transfer a slice upon meeting another participant. The latter delivers the slice
to the service provider. The second kind contains two complementary sub-
optimal strategies to transfer the slices to a set of participants that might be
met within a required period of time, minimizing the total cost while
guaranteeing that the sensing record can be delivered to the service provider
with guaranteed high probability, which is named Minimal Cost Transfer
(MCT). The cost difference can be resulted from the wireless
communication fee, available bandwidth, battery power, and so on.
 We have implemented SLICER and evaluated its performance using
publicly released real traces of taxis. Evaluation results show that SLICER
achieves high data quality, with low computation and communication
overhead.
ADVANTAGES OF PROPOSED SYSTEM:
 SLICER proposed in this paper is a coding-based k-anonymous privacy
preserving scheme for high quality multimedia data aggregation in
participatory sensing systems.
 SLICER integrates a data coding technique and message exchanging
strategies, to achieve strong protection of participants’ privacy, while
maintaining high data quality and inducing low communication and
computation overhead.
 High data quality, with low communication and computation overhead.
SYSTEM ARCHITECTURE
BLOCK DIAGRAM
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
 System : Pentium IV 2.4 GHz.
 Hard Disk : 40 GB.
 Floppy Drive : 1.44 Mb.
 Monitor : 15 VGA Colour.
 Mouse : Logitech.
 Ram : 512 Mb.
SOFTWARE REQUIREMENTS:
 Operating system : Windows XP/7/LINUX.
 Implementation : NS2
 NS2 Version : NS2.2.28
 Front End : OTCL (Object Oriented Tool Command
Language)
 Tool : Cygwin (To simulate in Windows OS)
REFERENCE:
Fudong Qiu, Student Member, IEEE, Fan Wu, Member, IEEE, and Guihai Chen,
Senior Member, IEEE, “Privacy and Quality Preserving Multimedia Data
Aggregation for Participatory Sensing Systems”, IEEE TRANSACTIONS ON
MOBILE COMPUTING, VOL. 14, NO. 6, JUNE 2015.

Weitere ähnliche Inhalte

Andere mochten auch

Key recovery attacks on kids, a keyed
Key recovery attacks on kids, a keyedKey recovery attacks on kids, a keyed
Key recovery attacks on kids, a keyedjpstudcorner
 
Vlsi assisted nonrigid registration using modified demons algorithm
Vlsi assisted nonrigid registration using modified demons algorithmVlsi assisted nonrigid registration using modified demons algorithm
Vlsi assisted nonrigid registration using modified demons algorithmjpstudcorner
 
Optimal configuration of network
Optimal configuration of networkOptimal configuration of network
Optimal configuration of networkjpstudcorner
 
Eye gaze tracking with a web camera
Eye gaze tracking with a web cameraEye gaze tracking with a web camera
Eye gaze tracking with a web camerajpstudcorner
 
Defeating jamming with the power of silence
Defeating jamming with the power of silenceDefeating jamming with the power of silence
Defeating jamming with the power of silencejpstudcorner
 
Privacy policy inference of user uploaded
Privacy policy inference of user uploadedPrivacy policy inference of user uploaded
Privacy policy inference of user uploadedjpstudcorner
 

Andere mochten auch (6)

Key recovery attacks on kids, a keyed
Key recovery attacks on kids, a keyedKey recovery attacks on kids, a keyed
Key recovery attacks on kids, a keyed
 
Vlsi assisted nonrigid registration using modified demons algorithm
Vlsi assisted nonrigid registration using modified demons algorithmVlsi assisted nonrigid registration using modified demons algorithm
Vlsi assisted nonrigid registration using modified demons algorithm
 
Optimal configuration of network
Optimal configuration of networkOptimal configuration of network
Optimal configuration of network
 
Eye gaze tracking with a web camera
Eye gaze tracking with a web cameraEye gaze tracking with a web camera
Eye gaze tracking with a web camera
 
Defeating jamming with the power of silence
Defeating jamming with the power of silenceDefeating jamming with the power of silence
Defeating jamming with the power of silence
 
Privacy policy inference of user uploaded
Privacy policy inference of user uploadedPrivacy policy inference of user uploaded
Privacy policy inference of user uploaded
 

Ähnlich wie Privacy and quality preserving multimedia data

IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLIMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLhiij
 
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLIMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLijccsa
 
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLIMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLijccsa
 
Improved Secure Cloud Transmission Protocol
Improved Secure Cloud Transmission ProtocolImproved Secure Cloud Transmission Protocol
Improved Secure Cloud Transmission Protocolneirew J
 
Integrity for join queries in the cloud
Integrity for join queries in the cloudIntegrity for join queries in the cloud
Integrity for join queries in the cloudPapitha Velumani
 
Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...
Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...
Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...IJCSIS Research Publications
 
Hierarchal attribute based cryptographic model to handle security services in...
Hierarchal attribute based cryptographic model to handle security services in...Hierarchal attribute based cryptographic model to handle security services in...
Hierarchal attribute based cryptographic model to handle security services in...IJECEIAES
 
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Editor IJARCET
 
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Editor IJARCET
 
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...IRJET Journal
 
M.E Computer Science Network Security Projects
M.E Computer Science Network Security ProjectsM.E Computer Science Network Security Projects
M.E Computer Science Network Security ProjectsVijay Karan
 
Iaetsd eliminating hidden data from an image
Iaetsd eliminating hidden data from an imageIaetsd eliminating hidden data from an image
Iaetsd eliminating hidden data from an imageIaetsd Iaetsd
 
Cam cloud assisted privacy preserving mobile health monitoring
Cam cloud assisted privacy preserving mobile health monitoringCam cloud assisted privacy preserving mobile health monitoring
Cam cloud assisted privacy preserving mobile health monitoringJPINFOTECH JAYAPRAKASH
 
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...IJSRD
 
M.Phil Computer Science Network Security Projects
M.Phil Computer Science Network Security ProjectsM.Phil Computer Science Network Security Projects
M.Phil Computer Science Network Security ProjectsVijay Karan
 
M phil-computer-science-network-security-projects
M phil-computer-science-network-security-projectsM phil-computer-science-network-security-projects
M phil-computer-science-network-security-projectsVijay Karan
 
Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...
Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...
Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...AJASTJournal
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationIAEME Publication
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationIAEME Publication
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET Journal
 

Ähnlich wie Privacy and quality preserving multimedia data (20)

IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLIMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
 
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLIMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
 
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLIMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
 
Improved Secure Cloud Transmission Protocol
Improved Secure Cloud Transmission ProtocolImproved Secure Cloud Transmission Protocol
Improved Secure Cloud Transmission Protocol
 
Integrity for join queries in the cloud
Integrity for join queries in the cloudIntegrity for join queries in the cloud
Integrity for join queries in the cloud
 
Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...
Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...
Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...
 
Hierarchal attribute based cryptographic model to handle security services in...
Hierarchal attribute based cryptographic model to handle security services in...Hierarchal attribute based cryptographic model to handle security services in...
Hierarchal attribute based cryptographic model to handle security services in...
 
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240
 
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240
 
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
 
M.E Computer Science Network Security Projects
M.E Computer Science Network Security ProjectsM.E Computer Science Network Security Projects
M.E Computer Science Network Security Projects
 
Iaetsd eliminating hidden data from an image
Iaetsd eliminating hidden data from an imageIaetsd eliminating hidden data from an image
Iaetsd eliminating hidden data from an image
 
Cam cloud assisted privacy preserving mobile health monitoring
Cam cloud assisted privacy preserving mobile health monitoringCam cloud assisted privacy preserving mobile health monitoring
Cam cloud assisted privacy preserving mobile health monitoring
 
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
 
M.Phil Computer Science Network Security Projects
M.Phil Computer Science Network Security ProjectsM.Phil Computer Science Network Security Projects
M.Phil Computer Science Network Security Projects
 
M phil-computer-science-network-security-projects
M phil-computer-science-network-security-projectsM phil-computer-science-network-security-projects
M phil-computer-science-network-security-projects
 
Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...
Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...
Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
 

Mehr von jpstudcorner

Variable length signature for near-duplicate
Variable length signature for near-duplicateVariable length signature for near-duplicate
Variable length signature for near-duplicatejpstudcorner
 
Robust representation and recognition of facial
Robust representation and recognition of facialRobust representation and recognition of facial
Robust representation and recognition of facialjpstudcorner
 
Revealing the trace of high quality jpeg
Revealing the trace of high quality jpegRevealing the trace of high quality jpeg
Revealing the trace of high quality jpegjpstudcorner
 
Revealing the trace of high quality jpeg
Revealing the trace of high quality jpegRevealing the trace of high quality jpeg
Revealing the trace of high quality jpegjpstudcorner
 
Pareto depth for multiple-query image retrieval
Pareto depth for multiple-query image retrievalPareto depth for multiple-query image retrieval
Pareto depth for multiple-query image retrievaljpstudcorner
 
Multifocus image fusion based on nsct
Multifocus image fusion based on nsctMultifocus image fusion based on nsct
Multifocus image fusion based on nsctjpstudcorner
 
Image super resolution based on
Image super resolution based onImage super resolution based on
Image super resolution based onjpstudcorner
 
Fractal analysis for reduced reference
Fractal analysis for reduced referenceFractal analysis for reduced reference
Fractal analysis for reduced referencejpstudcorner
 
Face sketch synthesis via sparse representation based greedy search
Face sketch synthesis via sparse representation based greedy searchFace sketch synthesis via sparse representation based greedy search
Face sketch synthesis via sparse representation based greedy searchjpstudcorner
 
Face recognition across non uniform motion
Face recognition across non uniform motionFace recognition across non uniform motion
Face recognition across non uniform motionjpstudcorner
 
Combining left and right palmprint images for
Combining left and right palmprint images forCombining left and right palmprint images for
Combining left and right palmprint images forjpstudcorner
 
A probabilistic approach for color correction
A probabilistic approach for color correctionA probabilistic approach for color correction
A probabilistic approach for color correctionjpstudcorner
 
A no reference texture regularity metric
A no reference texture regularity metricA no reference texture regularity metric
A no reference texture regularity metricjpstudcorner
 
A feature enriched completely blind image
A feature enriched completely blind imageA feature enriched completely blind image
A feature enriched completely blind imagejpstudcorner
 
Sel csp a framework to facilitate
Sel csp a framework to facilitateSel csp a framework to facilitate
Sel csp a framework to facilitatejpstudcorner
 
Query aware determinization of uncertain
Query aware determinization of uncertainQuery aware determinization of uncertain
Query aware determinization of uncertainjpstudcorner
 
Psmpa patient self controllable
Psmpa patient self controllablePsmpa patient self controllable
Psmpa patient self controllablejpstudcorner
 
Privacy preserving and truthful detection
Privacy preserving and truthful detectionPrivacy preserving and truthful detection
Privacy preserving and truthful detectionjpstudcorner
 
Page a partition aware engine
Page a partition aware enginePage a partition aware engine
Page a partition aware enginejpstudcorner
 
Optimal configuration of network
Optimal configuration of networkOptimal configuration of network
Optimal configuration of networkjpstudcorner
 

Mehr von jpstudcorner (20)

Variable length signature for near-duplicate
Variable length signature for near-duplicateVariable length signature for near-duplicate
Variable length signature for near-duplicate
 
Robust representation and recognition of facial
Robust representation and recognition of facialRobust representation and recognition of facial
Robust representation and recognition of facial
 
Revealing the trace of high quality jpeg
Revealing the trace of high quality jpegRevealing the trace of high quality jpeg
Revealing the trace of high quality jpeg
 
Revealing the trace of high quality jpeg
Revealing the trace of high quality jpegRevealing the trace of high quality jpeg
Revealing the trace of high quality jpeg
 
Pareto depth for multiple-query image retrieval
Pareto depth for multiple-query image retrievalPareto depth for multiple-query image retrieval
Pareto depth for multiple-query image retrieval
 
Multifocus image fusion based on nsct
Multifocus image fusion based on nsctMultifocus image fusion based on nsct
Multifocus image fusion based on nsct
 
Image super resolution based on
Image super resolution based onImage super resolution based on
Image super resolution based on
 
Fractal analysis for reduced reference
Fractal analysis for reduced referenceFractal analysis for reduced reference
Fractal analysis for reduced reference
 
Face sketch synthesis via sparse representation based greedy search
Face sketch synthesis via sparse representation based greedy searchFace sketch synthesis via sparse representation based greedy search
Face sketch synthesis via sparse representation based greedy search
 
Face recognition across non uniform motion
Face recognition across non uniform motionFace recognition across non uniform motion
Face recognition across non uniform motion
 
Combining left and right palmprint images for
Combining left and right palmprint images forCombining left and right palmprint images for
Combining left and right palmprint images for
 
A probabilistic approach for color correction
A probabilistic approach for color correctionA probabilistic approach for color correction
A probabilistic approach for color correction
 
A no reference texture regularity metric
A no reference texture regularity metricA no reference texture regularity metric
A no reference texture regularity metric
 
A feature enriched completely blind image
A feature enriched completely blind imageA feature enriched completely blind image
A feature enriched completely blind image
 
Sel csp a framework to facilitate
Sel csp a framework to facilitateSel csp a framework to facilitate
Sel csp a framework to facilitate
 
Query aware determinization of uncertain
Query aware determinization of uncertainQuery aware determinization of uncertain
Query aware determinization of uncertain
 
Psmpa patient self controllable
Psmpa patient self controllablePsmpa patient self controllable
Psmpa patient self controllable
 
Privacy preserving and truthful detection
Privacy preserving and truthful detectionPrivacy preserving and truthful detection
Privacy preserving and truthful detection
 
Page a partition aware engine
Page a partition aware enginePage a partition aware engine
Page a partition aware engine
 
Optimal configuration of network
Optimal configuration of networkOptimal configuration of network
Optimal configuration of network
 

Kürzlich hochgeladen

247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 

Kürzlich hochgeladen (20)

247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 

Privacy and quality preserving multimedia data

  • 1. Privacy and Quality Preserving Multimedia Data Aggregation for Participatory Sensing Systems ABSTRACT: With the popularity of mobile wireless devices equipped with various kinds of sensing abilities, a new service paradigm named participatory sensing has emerged to provide users with brand new life experience. However, the wide application of participatory sensing has its own challenges, among which privacy and multimedia data quality preservations are two critical problems. Unfortunately, none of the existing work has fully solved the problem of privacy and quality preserving participatory sensing with multimedia data. In this paper, we propose SLICER, which is the first k-anonymous privacy preserving scheme for participatory sensing with multimedia data. SLICER integrates a data coding technique and message transfer strategies, to achieve strong protection of participants’ privacy, while maintaining high data quality. Specifically, we study two kinds of data transfer strategies, namely transfer on meet up (TMU) and minimal cost transfer (MCT). For MCT, we propose two different but complimentary algorithms, including an approximation algorithm and a heuristic algorithm, subject to different strengths of the requirement. Furthermore, we have implemented SLICER and evaluated its
  • 2. performance using publicly released taxi traces. Our evaluation results show that SLICER achieves high data quality, with low computation and communication overhead. EXISTING SYSTEM: In the current state-of-the-art, a number of privacy preserving techniques for participatory sensing systems, especially the location-based services (LBSs), have been proposed by previous researchers, mainly to address the privacy of data source identity, user location, user trajectory, and sensing data content itself. These techniques can be classified into the following four categories. 1. Randomization Based Techniques 2. Generalization 3. Cloaking Techniques 4. Cryptography Based Solutions DISADVANTAGES OF EXISTING SYSTEM:  Sensing record sent to the service provider, is usually attached with spatio- temporal tags indicating the location and time information of the data collected.  Most of existing applications of participatory sensing only collect small pieces of sensing data (e.g., temperature, velocity, and geographic location).
  • 3.  Applying existing privacy preserving schemes to participatory sensing with multimedia data is not satisfactory, since existing schemes either induce unacceptable amount of communication cost, or degrade the utility/ quality of the data badly, in caseof multimedia sensing. PROPOSED SYSTEM:  In this paper, we present SLICER, which is a coding based k-anonymous privacy preserving scheme, working on application layer, for participatory sensing with multimedia data. Intuitively, k-anonymity means that the service provider cannot identify the contributor of each sensing record from a group of at least k participants.  We propose SLICER for participatory sensing with multimedia data, to achieve both k-anonymous privacy preservation and high data quality, with low communication and computation overhead.  We design an erasure coding based sensing record coding scheme to encode each sensing record into a number of data slices, each of which can be delivered to the service provider through the other participants or the record’s generator herself. When a proper data slice exchanging strategy is applied, the contributor of each particular sensing record is hidden in a group of at least k participants.
  • 4.  We propose two kinds of strategies for slice transfer. The first and straightforward strategy is named Transfer on Meet Up (TMU), which is to transfer a slice upon meeting another participant. The latter delivers the slice to the service provider. The second kind contains two complementary sub- optimal strategies to transfer the slices to a set of participants that might be met within a required period of time, minimizing the total cost while guaranteeing that the sensing record can be delivered to the service provider with guaranteed high probability, which is named Minimal Cost Transfer (MCT). The cost difference can be resulted from the wireless communication fee, available bandwidth, battery power, and so on.  We have implemented SLICER and evaluated its performance using publicly released real traces of taxis. Evaluation results show that SLICER achieves high data quality, with low computation and communication overhead. ADVANTAGES OF PROPOSED SYSTEM:  SLICER proposed in this paper is a coding-based k-anonymous privacy preserving scheme for high quality multimedia data aggregation in participatory sensing systems.  SLICER integrates a data coding technique and message exchanging strategies, to achieve strong protection of participants’ privacy, while
  • 5. maintaining high data quality and inducing low communication and computation overhead.  High data quality, with low communication and computation overhead.
  • 7. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7/LINUX.  Implementation : NS2  NS2 Version : NS2.2.28  Front End : OTCL (Object Oriented Tool Command Language)  Tool : Cygwin (To simulate in Windows OS)
  • 8. REFERENCE: Fudong Qiu, Student Member, IEEE, Fan Wu, Member, IEEE, and Guihai Chen, Senior Member, IEEE, “Privacy and Quality Preserving Multimedia Data Aggregation for Participatory Sensing Systems”, IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 14, NO. 6, JUNE 2015.