Incentives for privacy-concerned mobile sensing systems

https://doi.org/10.53730/ijhs.v6nS5.9825

Authors

  • B. Naga Lakshmi Assistant Professor, Department of Information Technology, Lords Institute of Engineering & Technology, Jawaharlal Nehru Technological University, Hyderabad (JNTUH)
  • Adeel Maaz B.Tech Student, Department of Information Technology, Lords Institute of Engineering &Technology, Jawaharlal Nehru Technological University, Hyderabad (JNTUH)
  • Mohammed Irfan Khan B.Tech Student, Department of Information Technology, Lords Institute of Engineering &Technology, Jawaharlal Nehru Technological University, Hyderabad (JNTUH)
  • Mohammed Mustafa B.Tech Student, Department of Information Technology, Lords Institute of Engineering &Technology, Jawaharlal Nehru Technological University, Hyderabad (JNTUH)
  • Syed Ali Mohammed Numan Aziz B.Tech Student, Department of Information Technology, Lords Institute of Engineering &Technology, Jawaharlal Nehru Technological University, Hyderabad (JNTUH)

Keywords:

Protection of personal information, monetary incentive, portability, detection

Abstract

To gather meaningful data about individuals and other environments, wireless sensor focuses on inputs posted by customers via their Smartphone (e.g., smart phone). Consumers, on the other hand, might well be hesitant to participate leading to a shortage of incentive as well as concern about probable privacy breaches. Both motivation and security challenges must be resolved in order to successfully stimulate public participation. [2] Although motivations as well as security have already been tackled independently in sensing system, addressing both concurrently remains an outstanding challenge. We introduce two resource private information additional incentives in mobile wearable sensors throughout this research, with the concentrate on data protection rather than incentives mechanism design [12]. Our methods allow Smartphone members to earn rewards by providing information without revealing what data they've supplied, and they prevent bad users from abusing the system to gain a limitless number of credits. The first approach takes into account instances in which an internet intermediary (TTP) is provided and depends just on TTP to preserve consumer privacy and avoid abusive threats [5]. The second strategy examines cases in which there is no online TTP.

Downloads

Download data is not yet available.

References

J. Hicks, N. Ramanathan, D. Kim, M. Monibi, J. Selsky, M. Hansen, and D. Estrin, “AndWellness: An open mobile system for activity and experience sampling,” in Proc. Wireless Health, 2010, pp. 34–43.

N. D. Lane, M. Mohammod, M. Lin, X. Yang, H. Lu, S. Ali, A. Doryab, E. Berke, T. Choudhury, and A. Campbell, “Bewell: A smartphone application to monitor, model and promote wellbeing,” presented at the 5th Int. ICST Conf. Pervasive Computing Technologies for Healthcare, Dublin, Ireland, 2011.

A. Thiagarajan, L. Ravindranath, K. LaCurts, S. Madden, H. Balakrishnan, S. Toledo, and J. Eriksson, “VTrack: Accurate, Energy-aware road traffic delay estimation using mobile phones,” in Proc. 7th ACM Conf. Embedded Netw. Sens. Syst., 2009, pp. 85–98.

M. Mun, S. Reddy, K. Shilton, N. Yau, J. Burke, D. Estrin, M. Hansen, E. Howard, R. West, and P. Boda, “PEIR, the personal environmental impact report, as a platform for participatory sensing systems research,” in Proc. 7th Int. Conf. Mobile Syst. Appl. Serv., 2009, pp. 55–68.

C. Cornelius, A. Kapadia, D. Kotz, D. Peebles, M. Shin, and N. Triandopoulos, “Anonysense: Privacy-aware people-centric sensing,” in Proc. 6th Int. Conf. Mobile Syst. Appl. Serv., 2008, pp. 211–224.

Thammana Ajay, K Nagi Reddy, Dasari Anantha Reddy, Pattem Sampath Kumar, K Saikumar, “Analysis on SAR Signal Processing for High-Performance Flexible System Design using Signal Processing” in proceedings of 5th International Conference on Electronics, Communication and Aerospace Technology (ICECA) held during 02-04 December 2021, pp.30-34.

V Jothsna, Ibrahim Patel, K Raghu, P Jahnavi, K Nagi Reddy, K Saikumar, “A Fuzzy Expert System for The Drowsiness Detection from Blink Characteristics”, in proceedings of 7th International Conference on Advanced Computing and Communication Systems (ICACCS) held during 19-20 March 2021, pp.1976-1981.

E. D. Cristofaro and C. Soriente, “Short paper: PEPSI-privacyenhanced participatory sensing infrastructure,” in Proc. 4th ACM Conf. Wireless Netw. Security, 2011, pp. 23–28.

D. Christin, C. Rosskopf, M. Hollick, L. A. Martucci, and S. S. Kanhere, “Incognisense: An Anonymity-preserving reputation framework for participatory sensing applications,” in Proc. IEEE Int. Conf. Pervasive Comput. Commun., 2012, pp. 135–143.

P. Gilbert, L. P. Cox, J. Jung, and D. Wetherall, “Toward trustworthy mobile sensing,” in Proc. 11th Workshop Mobile Comput. Syst. Appl., 2010, pp. 31–36.

K. L. Huang, S. S. Kanhere, and W. Hu, “Towards privacy-sensitive participatory sensing,” in Proc. 5th Int. Workshop Sensor Netw. Syst. Pervasive Comput., 2009, pp. 1–6.

Kustina, K.T., Dewi, G.A.A.O., Prena, G.D., Suryasa, W. (2019). Branchless banking, third-party funds, and profitability evidence reference to banking sector in indonesia. Journal of Advanced Research in Dynamical and Control Systems, 11(2), 290-299.

X. O. Wang, W. Cheng, P. Mohapatra, and T. Abdelzaher, “Artsense: Anonymous reputation and trust in participatory sensing,” in Proc. IEEE Conf. Comput. Commun., 2013, pp. 2517– 2525.

H. To, G. Ghinita, and C. Shahabi, “A framework for protecting worker location privacy in spatial crowdsourcing,” Proc. VLDB Endowment, vol. 7, no. 10, pp. 919–930, 2014.

Published

27-06-2022

How to Cite

Lakshmi, B. N., Maaz, A., Khan, M. I., Mustafa, M., & Aziz, S. A. M. N. (2022). Incentives for privacy-concerned mobile sensing systems. International Journal of Health Sciences, 6(S5), 5405–5413. https://doi.org/10.53730/ijhs.v6nS5.9825

Issue

Section

Peer Review Articles

Most read articles by the same author(s)