preview

Analysis Of The Prisense Protocol

Decent Essays

IV CONCEPTS AND ISSUES

PriSense: Privacy-Preserving Data Aggregation
The Prisense Protocol [4] provides a novel solution to privacy-preserving data aggregation in people-centric urban sensing systems. PriSense is builds the concept of data slicing and mixing and can support a wide range of statistical additive and non-additive aggregation functions like as Variance, Sum, Count, Average, Median, Max/Min, Histogram, and gives accurate aggregation results. PriSense also can support strong user privacy against a tuneable threshold number of colluding users and aggregation servers. The efficiency of PriSense are confirmed by thorough analytical and simulation results. The results determine that PriSense is very suitable and practical as a …show more content…

Thus, this protocol can be applied to a wide range of mobile sensing systems with various scales, plaintext spaces, aggregation loads and resource constraints. Based on the Sum aggregation protocol, he also proposed two schemes to derive the Min aggregate of time-series data. One scheme can obtain the accurate Min while the other one can obtain an approximate Min with provable error guarantee at much lower cost.

Providing Privacy-Aware Incentives (PPAI)
Mobile sensing relies on data contributed by users through their mobile device (e.g., smart phone) to obtain useful information about people and their surroundings. However, users may not want to contribute due to lack of incentives and concerns on possible privacy leakage. To effectively promote user participation, both incentive and privacy issues should be addressed. Although incentive and privacy have been addressed separately in mobile sensing, it is still an open problem to address them simultaneously. Qinghua Li and Guohong Cao proposed Two Credit-Based Privacy-Aware Incentive Schemes [7] for mobile sensing, corresponding to scenarios with and without a TTP respectively. Mainly based on hash and HMAC functions, the TTP-based scheme has very low computation cost at each node. Based on blind signature, partially blind signature, and extended Merkle tree techniques, the TTP-free scheme has higher overhead than the TTP-based scheme but it ensures that no

Get Access