0% found this document useful (0 votes)
99 views34 pages

Privacy Preserving Data Aggregation Scheme For Mobile Edge Computing Assisted Iot Applications

This document describes a project report submitted by 4 students for their Bachelor of Technology degree in Computer Science and Engineering. The report proposes a privacy preserving data aggregation scheme for mobile edge computing assisted IoT applications. The key components of the proposed system include terminal devices that generate and encrypt data before transmitting it to edge servers, which then aggregate and encrypt the data before sending it to cloud servers for storage. The report outlines the introduction, literature review, existing system analysis, proposed system and architecture, implementation details, and conclusions. The proposed scheme aims to provide data privacy, source authentication, integrity, and efficiency for IoT data transmission and storage.

Uploaded by

AJ Videos
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
99 views34 pages

Privacy Preserving Data Aggregation Scheme For Mobile Edge Computing Assisted Iot Applications

This document describes a project report submitted by 4 students for their Bachelor of Technology degree in Computer Science and Engineering. The report proposes a privacy preserving data aggregation scheme for mobile edge computing assisted IoT applications. The key components of the proposed system include terminal devices that generate and encrypt data before transmitting it to edge servers, which then aggregate and encrypt the data before sending it to cloud servers for storage. The report outlines the introduction, literature review, existing system analysis, proposed system and architecture, implementation details, and conclusions. The proposed scheme aims to provide data privacy, source authentication, integrity, and efficiency for IoT data transmission and storage.

Uploaded by

AJ Videos
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 34

Privacy Preserving Data Aggregation

Scheme for Mobile Edge Computing


Assisted IoT Applications
BACHELOR OF TECHNOLOGY in
COMPUTER SCIENCE AND ENGINEERING.
The Project report review submitted by:
Y G HEMA 15781A05B0

DILMUROD TASHPULATOV 15781A05D8

BIJAYA TWANABASU 15781A05B9

SENGATHITH KEOMUANVONG 15781A05D5

Under the Guidance of:


Mr. M.BALASUBRAMANIYAN ,

Assistant Professor, Department of CSE


Content
1. Introduction

2. Literature survey

3. System analysis

4. Scope and proposed approach

5. Implementation and result

6. Conclusion

7. Questions Please!!!!!!
1. Introduction
 Rapid development of 5G and Internet of Things (IoT)
techniques
 Traditional architecture of the cloud computing cannot
satisfy the requirements
 IoT terminal devices will send the data to cloud server
through edge server.
 there are three participants in our model, i.e. terminal
device, edge server and public cloud center.
 IoT generates, encrypts and transmits to the edge server
1. Introduction
 Edge server serves as a gate way between cloud sercer and
user
 Data will be encrypted in the cloud server to ensure the
safety of the data.
 Our scheme data privacy, source authentication, integrity
and efficiency.
2. Literature Survey
 In 2014, Roy et al. proposed and synopsis diffusion based secure data

aggregation for ring topology addressing communication loss problem.

 Later, Shin and Park presented a homomorphic encryption based data

aggregation scheme for heterogeneous clustered WSN; it can resist some

attacks, but cannot ensure the integrity of the data.

 Recently, by employing identity-based cryptography, Shen et al. proposed a

secure data aggregation for WSN, which mainly solved coalition attack.
2. Literature Survey
 In 2013, Zhang et al. proposed a verifiable privacy preserving aggregation

scheme (PPAS) for urban sensing systems.

 Later, Li et al. proposed an efficient PPAS in mobile sensing, which

adopted the idea of multi-secret sharing.

 In 2016, Jin et al. proposed a privacy-preserving data aggregation

framework for mobile sensing system that integrates incentives, data

aggregation, and data perturbation mechanisms.


2. Literature Survey
 In 2012, Lu et al. proposed an PPAS for smart grid communication by

using Parlier’s homomorphic encryption. Later, Fan et al. proposed a

PPAS for smart grid to against internal attackers.

 Recently, Wang proposed an identity-based data aggregation protocol for

smart grid to against malicious tampering attack.


3. System analysis - Existing Systems
 Different organizations have predicted that billions of smart devices will be
connected to the Internet in near future and will generate huge amount of data

 Besides, the widespread applications of IoT require the smart devices to have
low latency, high data rate, fast data access for real-time data
processing/analysis and decision making.

 However, the traditional cloud computing cannot satisfy these requirements,


and the concept of mobile edge computing (MEC) was proposed by
researchers.

 Disadvantages:- high communication cost and unsuitable for meeting


the demands
3. System analysis - Architecture:
Architecture:
3. System analysis - Proposed System:
3. System analysis - Proposed System:

1. Initialization

2. Registration

3. TD data encryption and report

4. ES data aggregation and report

5. Decryption
4. Scope of the project

1. Develop the infrastructure to deliver:


1. security,

2. reliability

3. efficiency

2. Solve the problem that currently threatens to IOT devices

3. The objective is to build the GUI, to deliver the best

experience from ease of manipulation as well as

exploitations, secured from other hackers.


4. Proposed approach

1. Create java based web application, where the dashboard

will be provided for the following category of explicators:


I. CSP ADMIN
II. EDGE ADMIN
III. USER

2. Develop using java EE and Oracle technologies.

3. Give ability for these category of users enough options so

that they will have limited control over the system, with

limited capabilities and access controls


4. Proposed approach - MODULES

1. Terminal Device Module (USER MODULE)

2. Edge Server Module

3. Cloud Server Module


4. Proposed approach – System requirements
 H/W System Configuration:-
1. Processor - I3/Intel Processor
2. RAM - 4GB (min)
3. Hard Disk - 160GB

 S/W System Configuration:-


1. Operating System Windows 7/8/10
2. Application Server Glassfish server 4.3
3. Front End HTML, JSP
4. Scripts JavaScript.
5. Server side Script Java Server Pages.
6. Database Oracle 10g
7. Database Connectivity JDBC
5. IMPLEMENTATION

1. Sign up and Register

2. Cloud Server Admin Dashboard

3. Edge Server Admin Dashboard

4. User Dashboard
5. IMPLEMENTATION

1. Sign up and Register


 In case of register, the system reads the fields such as username,
password, mobile, and email. Then verifies it through its database
so that any collision of token could be avoided and uniqueness of
the user is being established as well as ensured.

 In case of login, the email, password as well as the type of the user
is being read and matched against the data available in the database,
then the required access is being granted to a particular user.
5. IMPLEMENTATION

1. Sign up and Register RESULT


5. IMPLEMENTATION

1. Sign up and Register RESULT


5. IMPLEMENTATION

2. Cloud Server Admin Dashboard


 There will be provided different opportunities such as add cloud
data center, activate or deactivate the added cloud data center, view
the data center as well as view the purchased data center

 In case of adding data center, the exact longitude as well as latitude


will be read from the google api, so that the exact location will be
established regarding the location of the data center,
5. IMPLEMENTATION

1. Cloud Server Admin Dashboard RESULT


5. IMPLEMENTATION

1. Cloud Server Admin Dashboard RESULT


5. IMPLEMENTATION

1. Cloud Server Admin Dashboard RESULT


5. IMPLEMENTATION

1. Cloud Server Admin Dashboard RESULT


5. IMPLEMENTATION

3. Edge Server Admin Dashboard


 There will be provided different opportunities such as add edge
cloud data center, activate or deactivate the added edge cloud data
center, and view the status of the edge server.

 In case of adding data center, the exact longitude as well as latitude


will be read from the google api, so that the exact location will be
established regarding the location of the data center,
5. IMPLEMENTATION

3. Edge Server Admin Dashboard RESULT


5. IMPLEMENTATION

3. Edge Server Admin Dashboard RESULT


5. IMPLEMENTATION

4. User Dashboard
 There will be provided different opportunities such as select cloud
data center cloud data center, remove the selected data center as well
as upload and download file to/from datacenter.

 In case of adding uploading or downloading, the data downloaded to


data center will be stored in the secured way and while downloading
it it will be decrypted and returned back to user.
5. IMPLEMENTATION

4. User Dashboard RESULT


5. IMPLEMENTATION

4. User Dashboard RESULT


5. IMPLEMENTATION

4. User Dashboard RESULT


5. IMPLEMENTATION

4. User Dashboard RESULT


5. Conclusion
 Mobile edge computing is a new paradigm that complements the could

computing and IoT complement to each other.

 We will designed a privacy preserving data aggregation for mobile edge

computing assisted IoT applications based on the homomorphic property of

Boneh-Goh-Nissimcryptosystem or RSA ALGORITHM

 The proposed scheme can protect privacy and provide source authentication

and integrity as well as save almost half of the communication cost compared

with traditional method.


Thank you for your attention.

Questions Please !

You might also like