Downloads: 145 | Views: 235 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
M.Tech / M.E / PhD Thesis | Electronics & Communication Engineering | India | Volume 7 Issue 6, June 2018 | Popularity: 6.9 / 10
Secure Cloud Assisted Data Analysis Process for Smart Phone Tasks
Kumudashree H S, Triveni C L
Abstract: The omnipresence of smart cell phones makes the versatile crowdsourcing conceivable, where the requester (task requester) can crowdsource information from the smart cell phone user (cell phone clients) by utilizing their sensor-rich cell phones. In any case, information gathering, information total, and information examination have turned out to be testing issues for an asset obliged requester when information volume is to a great degree vast, i. e. , enormous information. Specifically to information examination, set activities, including crossing point, association, and complementation, exist in most enormous information investigation for sifting repetitive information and preprocessing crude information. Confronting challenges as far as restricted calculation and capacity assets, cloud-helped methodologies may fill in as a promising method to handle huge information investigation issue. Cell phone users are not willing to provide their data. If the security of their detecting information and personality are not very much protected in the untrusted cloud. In this work, we propose to utilize cloud to process set task for the requester, in the meantime users & #039, information security and characters protection are very much saved. Additionally, the requester can confirm the rightness of set activity comes about. We likewise stretch out our plan to help information preprocessing, with which invalid information can be barred before information examination. By utilizing clump check and information refresh strategies, the proposed conspire incredibly decreases the computational cost. Broad execution examination and investigation in view of genuine cloud framework have demonstrated both the achievability and productivity of our proposed conspire.
Keywords: Crowdsourcing, Privacy, Verifiable Set Operation
Edition: Volume 7 Issue 6, June 2018
Pages: 1002 - 1006
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 7 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2
Research Paper, Electronics & Communication Engineering, India, Volume 13 Issue 2, February 2024
Pages: 179 - 185Drone Detection using Multi-Sensor Data Fusion
Praveen Kumar S, Dr. Rajanikanth Kashi Nagaraj
Downloads: 88
Research Paper, Electronics & Communication Engineering, India, Volume 3 Issue 8, August 2014
Pages: 1471 - 1476HMAC Based Secure Authentication of VANETs
Swagat. S. Gudagudi, Dr. Veena Desai
Downloads: 99
Research Paper, Electronics & Communication Engineering, India, Volume 6 Issue 2, February 2017
Pages: 2002 - 2006Text-Dependent Speaker Identification and Verification Using Hindi Database in Adverse Acoustic Condition
Shrikant Upadhyay, Sudhir Kumar Sharma, Pawan Kumar, Aditi Upadhyay
Downloads: 104
Research Paper, Electronics & Communication Engineering, India, Volume 3 Issue 8, August 2014
Pages: 1980 - 1987Implementation of Secured Data Transmission System on Customized Zynq SoC
D. Dhanalaxmi, V. Roopa Reddy
Downloads: 105
Research Paper, Electronics & Communication Engineering, India, Volume 4 Issue 8, August 2015
Pages: 1188 - 1192Face Obfuscation Based Reversible Watermarking For Lossless Image Compression
Vivek Jaladi, Suhasini Andurey