Consumed Energy (100 records) Your university logo here

Slides:



Advertisements
Similar presentations
ACHIEVING NETWORK LEVEL PRIVACY IN WIRELESS SENSOR NETWORKS.
Advertisements

Cipher Techniques to Protect Anonymized Mobility Traces from Privacy Attacks Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip and Nageswara S. V. Rao.
Network Security.
Presenter: Nguyen Ba Anh HCMC University of Technology Information System Security Course.
IT PLANNING Enterprise Architecture (EA) & Updates to the Plan.
Multi-criteria infrastructure for location-based applications Shortly known as: Localization Platform Ronen Abraham Ido Cohen Yuval Efrati Tomer Sole'
1 The Problem of Power Consumption in Servers L. Minas and B. Ellison Intel-Lab In Dr. Dobb’s Journal, May 2009 Prepared and presented by Yan Cai Fall.
Mobile Data Sharing over Cloud Group No. 8 - Akshay Kantak - Swapnil Chavan - Harish Singh.
A Survey of Mobile Phone Sensing Michael Ruffing CS 495.
CS 153 Design of Operating Systems Spring 2015 Lecture 24: Android OS.
The Study of Security and Privacy in Mobile Applications Name: Liang Wei
A Seminar on Securities In Cloud Computing Presented by Sanjib Kumar Raul Mtech(ICT) Roll-10IT61B09 IIT Kharagpur Under the supervision of Prof. Indranil.
IOT5_ GISFI # 05, June 20 – 22, 2011, Hyderabad, India 1 Privacy Requirements of User Data in Smart Grids Jaydip Sen Tata Consultancy Services Ltd.
MOBILE CLOUD COMPUTING
A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation.
Opportunistic Sensing: Security Challenges for the New Paradigm Michael Betancourt UCF - EEL 6788 Dr. Turgut Apu Kapadia MIT Lincoln Laboratory David Kotz.
Home Automation Console Publish/Subscribe Server for interoperability and reduction of complexity at end devices.
By: Surapheal Belay ITEC ABSTRACT According to NIST SP : “ Mail servers are often the most targeted and attacked servers on an organization’s.
ErdOS: An energy-aware social operating system Further Reading: (*) Narseo Vallina-Rodriguez, Pan Hui, Jon Crowcroft, Andrew Rice. “Exhausting Battery.
Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks.
Department of Computer Science & Engineering Background Subtraction Algorithm for the Intelligent Scarecrow System Francisco Blanquicet, Mentor: Dr. Dmitry.
Permission-based Malware Detection in Android Devices REU fellow: Nadeen Saleh 1, Faculty mentor: Dr. Wenjia Li 2 Affiliation: 1. Florida Atlantic University,
Protecting Sensitive Labels in Social Network Data Anonymization.
Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data.
ErdOS Narseo Vallina-Rodríguez + Jon Crowcroft NETOS Talket - 25th May 2010.
Security Protection on Trust Delegated Medical Data in Public Mobile Networks Dasun Weerasinghe, Muttukrishnan Rajarajan and Veselin Rakocevic Mobile Networks.
HIMALAYA Test Review 16/12/2013 D4.8 Demonstration software subsystem unitary test report.
P2: Privacy-Preserving Communication and Precise Reward Architecture for V2G Networks in Smart Grid P2: Privacy-Preserving Communication and Precise Reward.
Participatory Privacy: Enabling Privacy in Participatory Sensing
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
1 Privacy Aware Incentive Mechanism to Collect Mobile Data While Preventing Duplication Junggab Son*, Donghyun Kim*, Rasheed Hussain**, Sung-Sik Kwon*,
m-Privacy for Collaborative Data Publishing
Copyright © 2010 Houman Homayoun Houman Homayoun National Science Foundation Computing Innovation Fellow Department of Computer Science University of California.
Power Guru: Implementing Smart Power Management on the Android Platform Written by Raef Mchaymech.
BLFS: Supporting Fast Editing/Writing for Large- Sized Multimedia Files Seung Wan Jung 1, Seok Young Ko 2, Young Jin Nam 3, Dae-Wha Seo 1, 1 Kyungpook.
Company LOGO Network Architecture By Dr. Shadi Masadeh 1.
Latest List of Computer Science Projects for Engineering.
Efficient Opportunistic Sensing using Mobile Collaborative Platform MOSDEN.
Electronic Banking & Security Electronic Banking & Security.
Retele de senzori Curs 1 - 1st edition UNIVERSITATEA „ TRANSILVANIA ” DIN BRAŞOV FACULTATEA DE INGINERIE ELECTRICĂ ŞI ŞTIINŢA CALCULATOARELOR.
Grant no REliable, Resilient and secUre IoT for sMart city applications 1.
Authors: Christos Stergiou Andreas P. Plageras Kostas E. Psannis
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
What Mobile Ads know about mobile users
Project 11: Security and Privacy of the Communication Channels among IoT Devices REU Student: Dean Wasil Graduate mentor: Omar Nakhila Faculty Mentors:
BENJAMIN BILLET and VALERIE ISSARNY
Fastdroid Produced by : Firas Abdalhaq Mohammad Amour Supervised by : Dr. Raed Alqadi.
Exam Review.
Algorithms for Big Data Delivery over the Internet of Things
Internet of Things (IoT)
Materials & Methods Introduction Abstract Results Conclusion
Blockchain Technology and IoT Security Andy Wang March 21, 2018
“Location Privacy Protection for Smartphone Users”
Remember to leave ~1 inch of margin on ALL SIDES
Issues/problems encountered and solutions (if any):
Network Architecture By Dr. Shadi Masadeh 1.
Title of Poster Title of Poster Title of Poster
Title of Poster Title of Poster Title of Poster
Materials & Methods Introduction Abstract Results Conclusion
Issues or problems encountered and solutions:
Materials & Methods Introduction Abstract Results Conclusion
Title of Poster Title of Poster Title of Poster
Week1 software - Lecture outline & Assignments
Designing an Operating Systems
Embedded OS for IoT Tu Le Nov 19, 2018.
Remedy Integration Strategy Leverage the power of the industry’s leading service management solution via open APIs February 2018.
Materials & Methods Introduction Abstract Results Conclusion
Torwards an Oceanic Data Utility
Materials & Methods Introduction Abstract Results Conclusion
Presentation transcript:

Consumed Energy (100 records) Your university logo here Characterization of Energy Consumption of Privacy Mechanism for Participatory Sensing Omar J. Avilés-Rivera, Yarelis Ares-Mendoza, Mentor: Idalides Vergara-Laurens Abstract Participatory Sensing systems rely on the willingness of people to gather and report data using their mobile devices. Privacy is one of the major concerns in PS as well as energy consumption. Every privacy mechanism has some limitations in terms of the provided privacy or energy consumption. A Hybrid Privacy Mechanism has been designed for addressing the performance limitation of available privacy mechanisms. This project focus on the characterization of energy consumption of such mechanism and comparison with other mechanisms available in the literature. Motivation Participants location need to be protected, in order to make mobile device users became part of the system. There is a need for an energy efficient and privacy preserving mechanism. Depending on how they are transmitting the data (Wi-Fi or 3G), it is the amount of consumed energy. Quality of Estimation1 System Architecture Privacy Mechanisms Results Comparison between Wi-Fi and 3G Storage for Point of Interest Conclusion Our experiments show that the Hybrid algorithm achieves a reduction on energy consumption compared to encryption based techniques. When transmitting the data and if the system allows to do it, is recommended to use Wi-Fi because it is more energy efficient. In addition, is better to keep the Points of Interest in disk, instead of memory, because the amount of energy consumed is almost similar and in case that the battery is fully discharged, the data is not lost. Acknowledgements The authors thank Dr. Miguel Labrador, the University of South Florida, the National Science Foundation under grant No. 1062160, Luis Ruiz-Linares, Nelson Rivera-Garcia and Yanira Rivera-Negron. *Equipment: Samsung SPH-D720 Nexus S with an Android OS Version 4.0.3, Hewlett Packard E3631A 0-6V,5A/0-(+-) 25V, 1A Triple Output DC Power Supply. Cache Points Run App Configuration Data Report (Double Encrypted) or (Anonymized location, sensed data) Encrypted (sensed data) Data Broker Application Server Server Participant Location (X,Y) Anonymized (A,B) Anonymization K – anonymity Algorithm TCP UDP Server Participant Location (X,Y) Anonymized (A,B) Obfuscation Points of Interest Algorithm UDP Consumed Energy (100 records) Technique Memory Disk Points of Interest 0.28 1.21 Hybrid - 30% 15.02 16.90 Hybrid - 50% 25.09 25.48 Hybrid - 70% 33.30 35.28 Encryption - 100% 45.39 Server Participant Location, sensed data Encryption Encryption Algorithm Encrypted Data Asymmetric Symmetric SSL Hybrid Algorithm (Localization, sensed data) Selection Algorithm Points of Interest (Anonymized location, Encrypted Encryption Data Broker 1Vergara-Laurens, IdalidesJ. and Mendez-Chaves, Diego and Labrador, MiguelA. On the Interactions between Privacy-Preserving, Incentive, and Inference Mechanisms in Participatory Sensing Systems. Network and System Security. Vol 7873. 2013. 614-620 Your university logo here