Incentives for privacy-concerned mobile sensing systems
Keywords:
Protection of personal information, monetary incentive, portability, detectionAbstract
To gather meaningful data about individuals and other environments, wireless sensor focuses on inputs posted by customers via their Smartphone (e.g., smart phone). Consumers, on the other hand, might well be hesitant to participate leading to a shortage of incentive as well as concern about probable privacy breaches. Both motivation and security challenges must be resolved in order to successfully stimulate public participation. [2] Although motivations as well as security have already been tackled independently in sensing system, addressing both concurrently remains an outstanding challenge. We introduce two resource private information additional incentives in mobile wearable sensors throughout this research, with the concentrate on data protection rather than incentives mechanism design [12]. Our methods allow Smartphone members to earn rewards by providing information without revealing what data they've supplied, and they prevent bad users from abusing the system to gain a limitless number of credits. The first approach takes into account instances in which an internet intermediary (TTP) is provided and depends just on TTP to preserve consumer privacy and avoid abusive threats [5]. The second strategy examines cases in which there is no online TTP.
Downloads
References
J. Hicks, N. Ramanathan, D. Kim, M. Monibi, J. Selsky, M. Hansen, and D. Estrin, “AndWellness: An open mobile system for activity and experience sampling,” in Proc. Wireless Health, 2010, pp. 34–43.
N. D. Lane, M. Mohammod, M. Lin, X. Yang, H. Lu, S. Ali, A. Doryab, E. Berke, T. Choudhury, and A. Campbell, “Bewell: A smartphone application to monitor, model and promote wellbeing,” presented at the 5th Int. ICST Conf. Pervasive Computing Technologies for Healthcare, Dublin, Ireland, 2011.
A. Thiagarajan, L. Ravindranath, K. LaCurts, S. Madden, H. Balakrishnan, S. Toledo, and J. Eriksson, “VTrack: Accurate, Energy-aware road traffic delay estimation using mobile phones,” in Proc. 7th ACM Conf. Embedded Netw. Sens. Syst., 2009, pp. 85–98.
M. Mun, S. Reddy, K. Shilton, N. Yau, J. Burke, D. Estrin, M. Hansen, E. Howard, R. West, and P. Boda, “PEIR, the personal environmental impact report, as a platform for participatory sensing systems research,” in Proc. 7th Int. Conf. Mobile Syst. Appl. Serv., 2009, pp. 55–68.
C. Cornelius, A. Kapadia, D. Kotz, D. Peebles, M. Shin, and N. Triandopoulos, “Anonysense: Privacy-aware people-centric sensing,” in Proc. 6th Int. Conf. Mobile Syst. Appl. Serv., 2008, pp. 211–224.
Thammana Ajay, K Nagi Reddy, Dasari Anantha Reddy, Pattem Sampath Kumar, K Saikumar, “Analysis on SAR Signal Processing for High-Performance Flexible System Design using Signal Processing” in proceedings of 5th International Conference on Electronics, Communication and Aerospace Technology (ICECA) held during 02-04 December 2021, pp.30-34.
V Jothsna, Ibrahim Patel, K Raghu, P Jahnavi, K Nagi Reddy, K Saikumar, “A Fuzzy Expert System for The Drowsiness Detection from Blink Characteristics”, in proceedings of 7th International Conference on Advanced Computing and Communication Systems (ICACCS) held during 19-20 March 2021, pp.1976-1981.
E. D. Cristofaro and C. Soriente, “Short paper: PEPSI-privacyenhanced participatory sensing infrastructure,” in Proc. 4th ACM Conf. Wireless Netw. Security, 2011, pp. 23–28.
D. Christin, C. Rosskopf, M. Hollick, L. A. Martucci, and S. S. Kanhere, “Incognisense: An Anonymity-preserving reputation framework for participatory sensing applications,” in Proc. IEEE Int. Conf. Pervasive Comput. Commun., 2012, pp. 135–143.
P. Gilbert, L. P. Cox, J. Jung, and D. Wetherall, “Toward trustworthy mobile sensing,” in Proc. 11th Workshop Mobile Comput. Syst. Appl., 2010, pp. 31–36.
K. L. Huang, S. S. Kanhere, and W. Hu, “Towards privacy-sensitive participatory sensing,” in Proc. 5th Int. Workshop Sensor Netw. Syst. Pervasive Comput., 2009, pp. 1–6.
Kustina, K.T., Dewi, G.A.A.O., Prena, G.D., Suryasa, W. (2019). Branchless banking, third-party funds, and profitability evidence reference to banking sector in indonesia. Journal of Advanced Research in Dynamical and Control Systems, 11(2), 290-299.
X. O. Wang, W. Cheng, P. Mohapatra, and T. Abdelzaher, “Artsense: Anonymous reputation and trust in participatory sensing,” in Proc. IEEE Conf. Comput. Commun., 2013, pp. 2517– 2525.
H. To, G. Ghinita, and C. Shahabi, “A framework for protecting worker location privacy in spatial crowdsourcing,” Proc. VLDB Endowment, vol. 7, no. 10, pp. 919–930, 2014.
Published
How to Cite
Issue
Section
Copyright (c) 2022 International journal of health sciences

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Articles published in the International Journal of Health Sciences (IJHS) are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJHS right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.
Articles published in IJHS can be copied, communicated and shared in their published form for non-commercial purposes provided full attribution is given to the author and the journal. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
This copyright notice applies to articles published in IJHS volumes 4 onwards. Please read about the copyright notices for previous volumes under Journal History.








