Homomorphic Encryption&A Novel Key Management Technique to Support Data Aggregation in Mobile Sensing
Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 4)Publication Date: 2015-04-05
Authors : Farhat Afshan; Shameem Akther;
Page : 3273-3277
Keywords : Mobile sensing; Privacy; data aggregation;
- A Reform in the Department of Nursing Sciences, Ebonyi State University, Abakaliki, Nigeria Using Transformational Leadership Style
- Alternative Strategies for Improving Internally Generated Revenue (IGR) of State Universities in Nigeria: Implications for Ebonyi State University (EBSU) Abakaliki
- Determinants of practice of blood donation among undergraduate students of Ebonyi State University Abakaliki, Southeast Nigeria
- Awareness and Utilization of Agora e-Resources Database by Agricultural Undergraduate Students of Ebonyi State University Abakaliki, Nigeria
- Epidemiology of Haemolysins among Blood Donors in Abakaliki, Ebonyi State, Nigeria
Abstract
The proliferation and ever-increasing capabilities of mobile devices such as smart phones give rise to a variety of mobile sensing applications. This paper studies how an untrusted aggregator in mobile sensing can periodically obtain desired statistics over the data contributed by multiple mobile users, without compromising the privacy of each user. Although there are some existing works in this area, they either require bidirectional communications between the aggregator and mobile users in every aggregation period, or have high-computation overhead and cannot support large plaintext spaces. Also, they do not consider the Min aggregate, which is quite useful in mobile sensing. To address these problems, we propose an efficient protocol to obtain the Sum aggregate, which employs an additive homomorphic encryption and a novel key management technique to support large plaintext space. We also extend the sum aggregation protocol to obtain the Min aggregate of time-series data. To deal with dynamic joins and leaves of mobile users, we propose a scheme that utilizes the redundancy in security to reduce the communication cost for each join and leave. Evaluations show that our protocols are orders of magnitude faster than existing solutions, and it has much lower communication overhead.
Other Latest Articles
- A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET
- An Image Database Security Using Multilayer Multi Share Visual Cryptography
- Study on Geomagnetic-Matching Technology Based on ICP Algorithm
- BIST Based Secure Data Aggregation in Wireless Sensor Network
- Study and Analysis of Cost Reduction Techniques in Press Part Production: A Case Study of Stamping Unit
Last modified: 2021-06-30 21:44:39