首页    期刊浏览 2025年02月21日 星期五
登录注册

文章基本信息

  • 标题:The Effective Encrypt and Decrypt Methodology for Secure Data Aggregation in Mobile Sensing
  • 本地全文:下载
  • 作者:Prathipati Prasanna Kumar ; G. Appa Rao
  • 期刊名称:International Journal of Computer Science & Technology
  • 印刷版ISSN:2229-4333
  • 电子版ISSN:0976-8491
  • 出版年度:2016
  • 卷号:7
  • 期号:2
  • 页码:205-209
  • 语种:English
  • 出版社:Ayushmaan Technologies
  • 摘要:Throughout the years ability of the portable detecting gadgets like advanced mobile phones are expanded as far as catching and sharing the data. This data can be helpful if examined as an accumulated esteem or values. Great illustrations resemble movement pattern specifically territory, therapeutic data specifically region and so on. At the point when such data is shared to an aggregator, client’s personality ought to be traded off and just data should be shared. To accomplish this present client’s personality Li, Cao and Porta has recommended effective convention to get total quality utilizing Homomorphic encryption and novel key administration. Sadly, the utilization of cryptography in the anticipated convention plan presented the win big or bust decoding model. In this manner, the aggregator adapts nothing if a solitary client comes up short. In a portion of the basic applications, information must be gathered from all clients to get right results. Any spillage in information will prompt off base hostility and sub-sequent figuring’s. Adaptation to internal failure must be taken care of to get right results and D. Tune [5] have proposed a strategy to handle adaptation to internal failure. In proposed strategy, a twofold interim tree over n clients, and permit the aggregator to gauge the entirety of coterminous interims of clients as spoke to by hubs in the interim tree. The parallel tree method permits taking care of client disappointments joins and leaves, with a little logarithmic (or polylog) cost as far as correspondence and estimation mistake. In the event that clients have no impetus, or feel that their protection may be jeopardized,it is likely that they won’t partake. In this article, we concentrate on security insurance in participatory detecting and present a reasonable protection improved foundation. To start with, we give an arrangement of meanings of protection prerequisites for both information makers (i.e., clients giving detected data) andbuyers (i.e., applications getting to the information). At that point we propose an effective arrangement intended for cell telephone clients, which acquires low overhead. At last, we examine various open issues and conceivable examination bearings.
  • 关键词:Encryption;Multi-hop network;Mobile Sensing;Data Aggregator; Privacy
国家哲学社会科学文献中心版权所有