SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 711
Dynamic and Privacy-Preserving Reputation Management for Block
chain-Based Mobile Crowd sensing
S. Anto Swaruba1, A.J. Afin Jenifer2
1PG Student, Computer Science & Engg, DMI Engineering College, Tamilnadu, India
2Assistant Professor, Computer Science & Engg., DMI Engineering College, Tamilnadu, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Mobile crowd sensing (MCS) is a rising
information assortment worldview that endeavors the
potential of individual cell phones to gain mass informationin
a practical way. One of the significant difficulties in MCS
application is to oppose vindictive clients who give bogus
information to upset the framework. In the current work, the
notoriety the executives conspire is a powerful method to
defeat the test. In any case, most notoriety the board plans
depends on a semi-legitimate server and procedure
information in the plaintext area without thinking about
server security and client protection. In this paper, we
incorporate the block chain and edge registering in the MCS
situation to develop a trustworthy and efficient block chain-
based MCS framework, called BC-MCS. To oppose malignant
clients, we present a security safeguarding notoriety the
executives plot based on the proposed framework. Moreover,
we plan an assignment convention to take care of the natural
issue of client elements in the MCS. The model framework
executed on the Hyper ledger SawtoothandAndroid customer
exhibits that our plan can accomplish higher utility and
security levels in dealing with malignant clients contrasted
and the past unified notoriety the executives plans..
Keywords: Mobile crowd sensing, reputation
management, privacy, block chain, edge computing.
1. INTRODUCTION
With the fast development of cell phones outfitted with
different sensors (e.g., accelerometer, gyrator, camera, and
mouthpiece), Mobile crowd sensing (MCS) is proposed to
detect and gather information from member clientswiththe
benefits of high volumes information securing and low
upkeep cost. In a conventional crowd sensing application,
there are three sorts of jobs in the framework: requesters,
portable detectingclients(additionallycalledlaborers)anda
brought together server. Requesters appropriate detecting
errands to the concentrated server, at that point the server
initiates a lot of suitable detecting clients to detect and
gather information. In the wake of detecting clients
transferring detected information, the server totals every
single got datum and returns final collection result to
requesters In the MCS detecting process, the brought
together server planning whole correspondence is
excessively amazing without supervision. It isn't known
whether the server releases clients' delicate data (e.g.,
detecting information) or whether it totals detecting
information adhering to the standards as specified by the
requester. In most existing MCS frameworks, the
concentrated server is demonstrated as a semi-legitimate
stage, which implies that it executes the endorsed
convention sincerely yet is interested about client
protection. In reality, be that as it may, the focal servermight
be noxious as a result of malware contamination or inward
assault. When the server is undermined, client protection
and collection accuracy can't be ensured. The certificateless
cryptographic strategy is a powerful method to beat some
security issues of a brought together server, yet it can't
fathom the single purpose of disappointment, which is an
unavoidable issue for the concentrated server. In this way,
the conventional MCS engineering, which depends on a
brought together and misty server, is defenseless against
noxious assaults and inside bargain.
1.1 MOBILE CROWD SENSING
Crowd sensing, sometimes referred to as mobile crowd
sensing, is a technique where a large group of individuals
having mobile devices capable of sensing and computing
(such as smartphones, tablet computers, wearables)
collectively share data and extract information to measure,
map, analyze, estimate or infer (predict) any processes of
common interest. In short, this means crowdsourcing of
sensor data from mobile devices. Devices equipped with
various sensors have become ubiquitous.Mostsmartphones
can sense ambient light, noise (through the microphone),
location (through the GPS), movement (through the
accelerometer), and more. These sensors can collect vast
quantities of data that are useful in a variety of ways. For
example, GPS and accelerometer data can be used to locate
potholes in cities, and microphones can be used with GPS to
map noise pollution.
2. PROBLEM DEFINITION
Mobile crowd sensing: Current state was introduced in
2011 by R. K. Ganti [1]. An emerging category of devices at
the edgeof the Internet are consumer-centricmobilesensing
and computing devices, such as smartphones, music players,
and in-vehicle sensors. These devices will fuel the evolution
of the Internet of Things as they feed sensor data to the
Internet at a societal scale. In this article, we examine a
category of applications that we term mobile crowd sensing,
where individuals with sensing and computing devices
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 712
collectively share data and extract information to measure
and map phenomena of common interest.
Blockchain based efficient and robust fair payment was
mentioned in 2018 by R. H. Deng et al. As an attractive
business model of cloud computing, outsourcing services
usually involve online payment and security issues. The
mutual distrust between users and outsourcing service
providers may severely impede the wide adoption of cloud
computing. Nevertheless, most existing payment solutions
only consider a specific type of outsourcing service and rely
on a trusted third-party to realize fairness. In this paper, in
order to realize secure and fair payment of outsourcing
services in general without relying on any third-party,
trusted or not, we introduce BCPay, a block chain based fair
payment framework for outsourcing services in cloud
computing. We first present the system architecture,
specifications and adversary model of BCPay, then describe
in detail its design. Our security analysis indicates that
BCPay achieves Soundness and what we call Robust
Fairness, where the fairness is resilient to eavesdropping
and malleability attacks. Furthermore, our performance
evaluation shows that BCPay is very efficient in terms of the
number of transactions and computationcost.Asillustrative
applications of BCPay, we further construct a block chain-
based provable data possession scheme in cloud computing
and a block chain-based outsourcing computation protocol
in fog computing.
3. PROPOSED WORK
A dynamic and privacy preserving reputation management
scheme based on block chain for mobile crowd sensing to
overcome the defects of existing schemes. Ourcontributions
are summarized as follows.
Fig -1: System Architecture
To overcome the security problem of centralized server in
traditional MCS application, we utilize block chain
technology to propose an efficient BC-MCS system which
serves as the open and supervised crowd sensing platform.
Based on BC-MCS, we present a practical privacy preserving
reputation management scheme in order to defend against
malicious users. To preserve user privacy, we design a two-
stage reputation update scheme using additive secret
sharing without the disclosure of user privacy(sensing data,
aggregation result, and requester’s feedback) in the public
block chain environment. Due to user dynamics in BC-MCS,
we improve the basic privacy-preserving reputation
management scheme by designing a delegation protocol, so
that it has no impact on the system when recruited users
leave the system without contributing sensed data. We
implement the prototype system of our scheme based on
hyper ledger Saw tooth and Android client.
3.1 ISSUE OF KEY AND TASK
First of all, p sends legitimate certificate registered in
advance to the KDC and requests the KDC to generate secret
key s∈Zp for this sensing task. Then, p publishes the crowd
sensing task to the nearest EN.
3.2 SENSING TASK ASSIGNMENT
The sensing task is forwarded to the TDC by ENs.The TDC
recruit sn quality sensing users to carry out the crowd
sensing task published by p. Inaddition,pgeneratesnshares
from s such that s = s1 +s2 +s3 +···+sn, which serve as
blinding factors. After that, p distributes n shares to n
sensing users via secure communication channel (e.g.,KDC)..
3.3 DATA BLINDING
After receiving crowd sensing task and one share, the
recruited sensing users start collecting data with mobile
devices. In general, we can suppose that vi is an integer. To
achieve the goal of preserving privacy, each sensing user ui
utilizes share si to generate blinded data v0 i = vi +si. Then,
the blinded data v0 i is encapsulated into a block chain
transaction and it is sent to the nearest EN.
3.4 BLOCKCHAIN TRANSACTION VERIFICATION
After receiving block chain transactions from all sensing
users, the EN begins to executesmartcontractautomatically.
The EN checks the validity of transactions, including
inspecting transaction format, verifyinguser’ssignatureand
auditing the validity of blindeddata.Theinvalidtransactions
which failed invalidity check are aborted and the valid
transactions are recorded in block chain by the EN.
3.5 DATA AGGREGATION
When all sensing users have provided sensing data and ENs
have recorded transactions into the block chain, the process
of aggregating all sensed data begins to execute as specified
in the smart contract. Here the weighted average of all
sensing data will be computed by smart contract, where the
weight of each sensing data is the sensing user’s global
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 713
reputation score ri stored in block chain publicly. The
computed output va is considered as the final aggregation
result for requester p. Due to the existence of share in v0 i,
we just get the blinded aggregation result v0 a as follows:
3.6 UNBLINDING AGGREGATION RESULTS
We must rely on high precision floating-point calculation to
aggregate data. Recall that we assume the sensed data is the
integer. This is because the additive secret sharing used in
the data aggregation cannot protect the fractional part of
decimal data. In the practical scenario, we can use a scaling
factor Q which is multiples of 10,totransformfractional data
v (sensed data or reputation score) to an integer v = vQ.
Afterthe computing completes, the result vresult is scaled
down by v result.
4. RESULTS
Fig -2: Registration
Fig -3: Login page
Fig 4- User Details
Fig 5- Upload Documents
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 714
4. CONCLUSION
The architecture of traditional MCS systems relies on a
centralized server which is vulnerable to the threats of
internal or external attacks. In this paper, we first integrate
block chain and edge computing in MCS scenario and
propose a BC-MCS system to carry out sensing task
efficiently and resist malicious server. Then, we propose a
privacy preserving reputation management scheme to
protect user privacy (e.g., sensing data, aggregation result,
and requester’s feedback) and prevent malicious users
simultaneously. Our reputation management scheme
consists of local reputation evaluation and global reputation
update. In the local evaluation stage, the reliability of user
data is evaluated by the degree of data distortion, data
consistency, local rating, and contextual factors. The
requester gives positive or negative feedback for the user’s
data service based on data reliability. In the global update
stage, the user global reputationscoresareupdatedbysmart
contract based on the average of all feedback from
requesters.
REFERENCES
[1] R. K. Ganti, F. Ye, and H. Lei, ``Mobile crowdsensing:
Current state andfuturechallenges,''IEEECommun.
Mag., vol. 49, no. 11, pp. 3239, Nov. 2011.
[2] J. Wang, M. Li, Y. He, H. Li, K. Xiao, and C. Wang, ``A
blockchain based privacy-preserving incentive
mechanism in crowdsensing applications,''IEEE
Access, vol. 6, p. 1754517556, 2018.
[3] Y. Zheng, H. Duan, X. Yuan, and C. Wang, ``Privacy-
aware and efficient mobile crowdsensingwithtruth
discovery,'' IEEE Trans. Dependable Secure
Comput., to be published. doi:
10.1109/TDSC.2017.2753245.
[4] Y. Zheng, H. Duan, and C. Wang, ``Learning the truth
privatelyand confidently: Encrypted confidence-
aware truth discovery in mobilecrowdsensing,''
IEEE Trans. Inf. Forensics Security, vol. 13, no. 10,
pp. 2475 2489, Oct. 2018.
[5] A. Karati, S. K. H. Islam, and M. Karuppiah,
``Provably secure and lightweight certi cateless
signature scheme for IIoT environments,'' IEEE
Trans. Ind. Informat., vol. 14, no. 8, pp. 37013711,
Aug. 2018.
[6] Y. Zhang, R. Deng, D. Zheng, J. Li, P. Wu, and J. Cao,
``Efficient and robust certificateless signature for
data crowdsensing in cloud assistedindustrial IoT,''
IEEE Trans. Ind. Informat., to be published. doi:
10.1109/TII.2019.2894108.
[7] S. Nakamoto. (2008). Bitcoin: A Peer-to-Peer
Electronic Cash System. Accessed: Jun. 5, 2018.
[Online]. Available: https://bitcoin.org/bitcoin.pdf
[8] M. Li, J. Weng, A. Yang, W. Lu, Y. Zhang, L. Hou, J.-N.
Liu, Y. Xiang, and R. H. Deng,
``CrowdBC:Ablockchain-based decentralized
framework for crowdsourcing,''IEEETrans.Parallel
Distrib. Syst., vol. 30, no. 6, pp. 12511266, Jun.2019.
doi: 10.1109/TPDS.2018.2881735.
[9] F. Shi, Z. Qin, D. Wu, and J. McCann, ``MPCSToken:
Smart contract enabled fault-tolerant
incentivisation for mobile P2P crowd services,'' in
Proc. IEEE 38th Int. Conf. Distrib. Comput. Syst.
(ICDCS), Jul. 2018, pp. 961971.
[10] C. Cai, Y. Zheng, and C. Wang, ``Leveraging
crowdsensed data streams to discover and sell
knowledge: A secure and efficient realization,'' in
Proc. IEEE 38th Int. Conf. Distrib. Comput. Syst.
(ICDCS), Jul. 2018,
[11] S. K. A. Hossain, M. A. Rahman, and M. A.
Hossain, ``Edge computing framework for enabling
situation awareness in IoT based smart city,'' J.
Parallel Distrib. Comput., vol. 122, pp. 226237, Dec.
2018.
[12] J. Pan, J. Wang, A. Hester, I. Alqerm, Y. Liu,
and Y. Zhao, Edgechain: An edge-iot framework and
prototype based on blockchain and smart
contracts,'' IEEE Internet Things J., to be published.
doi: 10.1109/JIOT.2018.2878154..
[13] J. Kang, R. Yu, X. Huang,M.Wu,S.Maharjan,
S. Xie, and Y. Zhang, ``Blockchain for secure and
ef cient data sharing in vehicular edge computing
and networks,'' IEEE Internet Things J., to be
published. doi: 10.1109/JIOT.2018.2875542.
[14] M. Pouryazdan, B. Kantarci, T. Soyata, L.
Foschini, and H. Song, ``Quantifying user reputation
scores, data trustworthiness, and user incentivesin
mobile crowd-sensing,'' IEEE Access, vol. 5, pp.
13821397, 2017.
[15] L. Xiao, Y. Li, G. Han, H. Dai, and H. V. Poor,
``A secure mobile crowd sensing game with deep
reinforcement learning,'' IEEE Trans. Inf. Forensics
Security, vol. 13, no. 1, pp. 35 47, Jan. 2018..
AUTHORS
S. Anto Swaruba is currently
pursuing her M.E degree in
DepartmentofComputerScience&
Engineering at DMI Engineering
College, Aralvoimozhi, Tamilnadu,
India
A. J. Afin Jenifer, currently
working as Assistant Professor,
DepartmentofComputerScience&
Engineering at DMI Engineering
College, Aralvoimozhi, Tamilnadu,
India.

Más contenido relacionado

La actualidad más candente

Location Sharing System Using GPS Technology for Minimizing SMS Delivery
Location Sharing System Using GPS Technology for Minimizing SMS DeliveryLocation Sharing System Using GPS Technology for Minimizing SMS Delivery
Location Sharing System Using GPS Technology for Minimizing SMS DeliveryIJERA Editor
 
Designing for privacy
Designing for privacy  Designing for privacy
Designing for privacy CGI
 
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET-  	  Technical Review of different Methods for Multi Factor AuthenticationIRJET-  	  Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor AuthenticationIRJET Journal
 
Providing Anonymous Communication, Privacy-Preserving Data Aggregation and Dy...
Providing Anonymous Communication, Privacy-Preserving Data Aggregation and Dy...Providing Anonymous Communication, Privacy-Preserving Data Aggregation and Dy...
Providing Anonymous Communication, Privacy-Preserving Data Aggregation and Dy...IJNSA Journal
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...AM Publications
 
Software Defined Networking Architecture for Empowering Internet of Things & ...
Software Defined Networking Architecture for Empowering Internet of Things & ...Software Defined Networking Architecture for Empowering Internet of Things & ...
Software Defined Networking Architecture for Empowering Internet of Things & ...IRJET Journal
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYShakas Technologies
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityPvrtechnologies Nellore
 
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKS
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKSA SECURITY SUITE FOR WIRELESS BODY AREA NETWORKS
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKSIJNSA Journal
 
A DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRID
A DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRIDA DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRID
A DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRIDijcisjournal
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYNexgen Technology
 
IRJET - A Survey Paper on Secure Digital Payment
IRJET -  	  A Survey Paper on Secure Digital PaymentIRJET -  	  A Survey Paper on Secure Digital Payment
IRJET - A Survey Paper on Secure Digital PaymentIRJET Journal
 
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...IRJET Journal
 
Employment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous AuthenticationEmployment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous AuthenticationIRJET Journal
 
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...IRJET Journal
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniqueseSAT Publishing House
 
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...IRJET Journal
 

La actualidad más candente (20)

Location Sharing System Using GPS Technology for Minimizing SMS Delivery
Location Sharing System Using GPS Technology for Minimizing SMS DeliveryLocation Sharing System Using GPS Technology for Minimizing SMS Delivery
Location Sharing System Using GPS Technology for Minimizing SMS Delivery
 
Designing for privacy
Designing for privacy  Designing for privacy
Designing for privacy
 
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET-  	  Technical Review of different Methods for Multi Factor AuthenticationIRJET-  	  Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor Authentication
 
Providing Anonymous Communication, Privacy-Preserving Data Aggregation and Dy...
Providing Anonymous Communication, Privacy-Preserving Data Aggregation and Dy...Providing Anonymous Communication, Privacy-Preserving Data Aggregation and Dy...
Providing Anonymous Communication, Privacy-Preserving Data Aggregation and Dy...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
PATIENT DRIVEN ELECTRONIC HEALTH RECORD USING BLOCK CHAIN
PATIENT DRIVEN ELECTRONIC HEALTH RECORD  USING BLOCK CHAINPATIENT DRIVEN ELECTRONIC HEALTH RECORD  USING BLOCK CHAIN
PATIENT DRIVEN ELECTRONIC HEALTH RECORD USING BLOCK CHAIN
 
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
 
Software Defined Networking Architecture for Empowering Internet of Things & ...
Software Defined Networking Architecture for Empowering Internet of Things & ...Software Defined Networking Architecture for Empowering Internet of Things & ...
Software Defined Networking Architecture for Empowering Internet of Things & ...
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
 
Research paper
Research paperResearch paper
Research paper
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward security
 
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKS
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKSA SECURITY SUITE FOR WIRELESS BODY AREA NETWORKS
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKS
 
A DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRID
A DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRIDA DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRID
A DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRID
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
 
IRJET - A Survey Paper on Secure Digital Payment
IRJET -  	  A Survey Paper on Secure Digital PaymentIRJET -  	  A Survey Paper on Secure Digital Payment
IRJET - A Survey Paper on Secure Digital Payment
 
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...
 
Employment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous AuthenticationEmployment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous Authentication
 
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniques
 
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
 

Similar a IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-based Mobile Crowd Sensing

710201940
710201940710201940
710201940IJRAT
 
IRJET- An Overview on Mobile Cloud Computing
IRJET-  	  An Overview on Mobile Cloud ComputingIRJET-  	  An Overview on Mobile Cloud Computing
IRJET- An Overview on Mobile Cloud ComputingIRJET Journal
 
Performance Evaluation Of A Wimax Testbed
Performance Evaluation Of A Wimax TestbedPerformance Evaluation Of A Wimax Testbed
Performance Evaluation Of A Wimax TestbedAlison Reed
 
IRJET- An Overview of Slum Rehabilitation by IN-SITU Technique
IRJET- An Overview of Slum Rehabilitation by IN-SITU TechniqueIRJET- An Overview of Slum Rehabilitation by IN-SITU Technique
IRJET- An Overview of Slum Rehabilitation by IN-SITU TechniqueIRJET Journal
 
IRJET- Integrating Wireless Sensor Networks with Cloud Computing and Emerging...
IRJET- Integrating Wireless Sensor Networks with Cloud Computing and Emerging...IRJET- Integrating Wireless Sensor Networks with Cloud Computing and Emerging...
IRJET- Integrating Wireless Sensor Networks with Cloud Computing and Emerging...IRJET Journal
 
A Survey on Mobile Sensing Technology and its Platform
A Survey on Mobile Sensing Technology and its PlatformA Survey on Mobile Sensing Technology and its Platform
A Survey on Mobile Sensing Technology and its PlatformEswar Publications
 
A Survey on Mobile Commerce Security Issues and Applications
A Survey on Mobile Commerce Security Issues and ApplicationsA Survey on Mobile Commerce Security Issues and Applications
A Survey on Mobile Commerce Security Issues and Applicationstheijes
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationIAEME Publication
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationIAEME Publication
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfamitkhanna2070
 
Toward a real time framework in cloudlet-based architecture
Toward a real time framework in cloudlet-based architectureToward a real time framework in cloudlet-based architecture
Toward a real time framework in cloudlet-based architectureredpel dot com
 
Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...
Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...
Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...IOSR Journals
 
A Review And Research Towards Mobile Cloud Computing
A Review And Research Towards Mobile Cloud ComputingA Review And Research Towards Mobile Cloud Computing
A Review And Research Towards Mobile Cloud ComputingSuzanne Simmons
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...ijccsa
 
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud
Secure Multi-Owner Group Signature Based Secure M-Health  Records in Cloud Secure Multi-Owner Group Signature Based Secure M-Health  Records in Cloud
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud IJMER
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357IJMER
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357IJMER
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357IJMER
 
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...IRJET Journal
 

Similar a IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-based Mobile Crowd Sensing (20)

710201940
710201940710201940
710201940
 
IRJET- An Overview on Mobile Cloud Computing
IRJET-  	  An Overview on Mobile Cloud ComputingIRJET-  	  An Overview on Mobile Cloud Computing
IRJET- An Overview on Mobile Cloud Computing
 
Performance Evaluation Of A Wimax Testbed
Performance Evaluation Of A Wimax TestbedPerformance Evaluation Of A Wimax Testbed
Performance Evaluation Of A Wimax Testbed
 
IRJET- An Overview of Slum Rehabilitation by IN-SITU Technique
IRJET- An Overview of Slum Rehabilitation by IN-SITU TechniqueIRJET- An Overview of Slum Rehabilitation by IN-SITU Technique
IRJET- An Overview of Slum Rehabilitation by IN-SITU Technique
 
IRJET- Integrating Wireless Sensor Networks with Cloud Computing and Emerging...
IRJET- Integrating Wireless Sensor Networks with Cloud Computing and Emerging...IRJET- Integrating Wireless Sensor Networks with Cloud Computing and Emerging...
IRJET- Integrating Wireless Sensor Networks with Cloud Computing and Emerging...
 
A Survey on Mobile Sensing Technology and its Platform
A Survey on Mobile Sensing Technology and its PlatformA Survey on Mobile Sensing Technology and its Platform
A Survey on Mobile Sensing Technology and its Platform
 
A Survey on Mobile Commerce Security Issues and Applications
A Survey on Mobile Commerce Security Issues and ApplicationsA Survey on Mobile Commerce Security Issues and Applications
A Survey on Mobile Commerce Security Issues and Applications
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdf
 
Toward a real time framework in cloudlet-based architecture
Toward a real time framework in cloudlet-based architectureToward a real time framework in cloudlet-based architecture
Toward a real time framework in cloudlet-based architecture
 
Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...
Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...
Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...
 
F01113945
F01113945F01113945
F01113945
 
A Review And Research Towards Mobile Cloud Computing
A Review And Research Towards Mobile Cloud ComputingA Review And Research Towards Mobile Cloud Computing
A Review And Research Towards Mobile Cloud Computing
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
 
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud
Secure Multi-Owner Group Signature Based Secure M-Health  Records in Cloud Secure Multi-Owner Group Signature Based Secure M-Health  Records in Cloud
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357
 
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
 

Más de IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

Más de IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Último

Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdfSuman Jyoti
 
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSUNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSrknatarajan
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 

Último (20)

Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSUNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 

IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-based Mobile Crowd Sensing

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 711 Dynamic and Privacy-Preserving Reputation Management for Block chain-Based Mobile Crowd sensing S. Anto Swaruba1, A.J. Afin Jenifer2 1PG Student, Computer Science & Engg, DMI Engineering College, Tamilnadu, India 2Assistant Professor, Computer Science & Engg., DMI Engineering College, Tamilnadu, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Mobile crowd sensing (MCS) is a rising information assortment worldview that endeavors the potential of individual cell phones to gain mass informationin a practical way. One of the significant difficulties in MCS application is to oppose vindictive clients who give bogus information to upset the framework. In the current work, the notoriety the executives conspire is a powerful method to defeat the test. In any case, most notoriety the board plans depends on a semi-legitimate server and procedure information in the plaintext area without thinking about server security and client protection. In this paper, we incorporate the block chain and edge registering in the MCS situation to develop a trustworthy and efficient block chain- based MCS framework, called BC-MCS. To oppose malignant clients, we present a security safeguarding notoriety the executives plot based on the proposed framework. Moreover, we plan an assignment convention to take care of the natural issue of client elements in the MCS. The model framework executed on the Hyper ledger SawtoothandAndroid customer exhibits that our plan can accomplish higher utility and security levels in dealing with malignant clients contrasted and the past unified notoriety the executives plans.. Keywords: Mobile crowd sensing, reputation management, privacy, block chain, edge computing. 1. INTRODUCTION With the fast development of cell phones outfitted with different sensors (e.g., accelerometer, gyrator, camera, and mouthpiece), Mobile crowd sensing (MCS) is proposed to detect and gather information from member clientswiththe benefits of high volumes information securing and low upkeep cost. In a conventional crowd sensing application, there are three sorts of jobs in the framework: requesters, portable detectingclients(additionallycalledlaborers)anda brought together server. Requesters appropriate detecting errands to the concentrated server, at that point the server initiates a lot of suitable detecting clients to detect and gather information. In the wake of detecting clients transferring detected information, the server totals every single got datum and returns final collection result to requesters In the MCS detecting process, the brought together server planning whole correspondence is excessively amazing without supervision. It isn't known whether the server releases clients' delicate data (e.g., detecting information) or whether it totals detecting information adhering to the standards as specified by the requester. In most existing MCS frameworks, the concentrated server is demonstrated as a semi-legitimate stage, which implies that it executes the endorsed convention sincerely yet is interested about client protection. In reality, be that as it may, the focal servermight be noxious as a result of malware contamination or inward assault. When the server is undermined, client protection and collection accuracy can't be ensured. The certificateless cryptographic strategy is a powerful method to beat some security issues of a brought together server, yet it can't fathom the single purpose of disappointment, which is an unavoidable issue for the concentrated server. In this way, the conventional MCS engineering, which depends on a brought together and misty server, is defenseless against noxious assaults and inside bargain. 1.1 MOBILE CROWD SENSING Crowd sensing, sometimes referred to as mobile crowd sensing, is a technique where a large group of individuals having mobile devices capable of sensing and computing (such as smartphones, tablet computers, wearables) collectively share data and extract information to measure, map, analyze, estimate or infer (predict) any processes of common interest. In short, this means crowdsourcing of sensor data from mobile devices. Devices equipped with various sensors have become ubiquitous.Mostsmartphones can sense ambient light, noise (through the microphone), location (through the GPS), movement (through the accelerometer), and more. These sensors can collect vast quantities of data that are useful in a variety of ways. For example, GPS and accelerometer data can be used to locate potholes in cities, and microphones can be used with GPS to map noise pollution. 2. PROBLEM DEFINITION Mobile crowd sensing: Current state was introduced in 2011 by R. K. Ganti [1]. An emerging category of devices at the edgeof the Internet are consumer-centricmobilesensing and computing devices, such as smartphones, music players, and in-vehicle sensors. These devices will fuel the evolution of the Internet of Things as they feed sensor data to the Internet at a societal scale. In this article, we examine a category of applications that we term mobile crowd sensing, where individuals with sensing and computing devices
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 712 collectively share data and extract information to measure and map phenomena of common interest. Blockchain based efficient and robust fair payment was mentioned in 2018 by R. H. Deng et al. As an attractive business model of cloud computing, outsourcing services usually involve online payment and security issues. The mutual distrust between users and outsourcing service providers may severely impede the wide adoption of cloud computing. Nevertheless, most existing payment solutions only consider a specific type of outsourcing service and rely on a trusted third-party to realize fairness. In this paper, in order to realize secure and fair payment of outsourcing services in general without relying on any third-party, trusted or not, we introduce BCPay, a block chain based fair payment framework for outsourcing services in cloud computing. We first present the system architecture, specifications and adversary model of BCPay, then describe in detail its design. Our security analysis indicates that BCPay achieves Soundness and what we call Robust Fairness, where the fairness is resilient to eavesdropping and malleability attacks. Furthermore, our performance evaluation shows that BCPay is very efficient in terms of the number of transactions and computationcost.Asillustrative applications of BCPay, we further construct a block chain- based provable data possession scheme in cloud computing and a block chain-based outsourcing computation protocol in fog computing. 3. PROPOSED WORK A dynamic and privacy preserving reputation management scheme based on block chain for mobile crowd sensing to overcome the defects of existing schemes. Ourcontributions are summarized as follows. Fig -1: System Architecture To overcome the security problem of centralized server in traditional MCS application, we utilize block chain technology to propose an efficient BC-MCS system which serves as the open and supervised crowd sensing platform. Based on BC-MCS, we present a practical privacy preserving reputation management scheme in order to defend against malicious users. To preserve user privacy, we design a two- stage reputation update scheme using additive secret sharing without the disclosure of user privacy(sensing data, aggregation result, and requester’s feedback) in the public block chain environment. Due to user dynamics in BC-MCS, we improve the basic privacy-preserving reputation management scheme by designing a delegation protocol, so that it has no impact on the system when recruited users leave the system without contributing sensed data. We implement the prototype system of our scheme based on hyper ledger Saw tooth and Android client. 3.1 ISSUE OF KEY AND TASK First of all, p sends legitimate certificate registered in advance to the KDC and requests the KDC to generate secret key s∈Zp for this sensing task. Then, p publishes the crowd sensing task to the nearest EN. 3.2 SENSING TASK ASSIGNMENT The sensing task is forwarded to the TDC by ENs.The TDC recruit sn quality sensing users to carry out the crowd sensing task published by p. Inaddition,pgeneratesnshares from s such that s = s1 +s2 +s3 +···+sn, which serve as blinding factors. After that, p distributes n shares to n sensing users via secure communication channel (e.g.,KDC).. 3.3 DATA BLINDING After receiving crowd sensing task and one share, the recruited sensing users start collecting data with mobile devices. In general, we can suppose that vi is an integer. To achieve the goal of preserving privacy, each sensing user ui utilizes share si to generate blinded data v0 i = vi +si. Then, the blinded data v0 i is encapsulated into a block chain transaction and it is sent to the nearest EN. 3.4 BLOCKCHAIN TRANSACTION VERIFICATION After receiving block chain transactions from all sensing users, the EN begins to executesmartcontractautomatically. The EN checks the validity of transactions, including inspecting transaction format, verifyinguser’ssignatureand auditing the validity of blindeddata.Theinvalidtransactions which failed invalidity check are aborted and the valid transactions are recorded in block chain by the EN. 3.5 DATA AGGREGATION When all sensing users have provided sensing data and ENs have recorded transactions into the block chain, the process of aggregating all sensed data begins to execute as specified in the smart contract. Here the weighted average of all sensing data will be computed by smart contract, where the weight of each sensing data is the sensing user’s global
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 713 reputation score ri stored in block chain publicly. The computed output va is considered as the final aggregation result for requester p. Due to the existence of share in v0 i, we just get the blinded aggregation result v0 a as follows: 3.6 UNBLINDING AGGREGATION RESULTS We must rely on high precision floating-point calculation to aggregate data. Recall that we assume the sensed data is the integer. This is because the additive secret sharing used in the data aggregation cannot protect the fractional part of decimal data. In the practical scenario, we can use a scaling factor Q which is multiples of 10,totransformfractional data v (sensed data or reputation score) to an integer v = vQ. Afterthe computing completes, the result vresult is scaled down by v result. 4. RESULTS Fig -2: Registration Fig -3: Login page Fig 4- User Details Fig 5- Upload Documents
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 714 4. CONCLUSION The architecture of traditional MCS systems relies on a centralized server which is vulnerable to the threats of internal or external attacks. In this paper, we first integrate block chain and edge computing in MCS scenario and propose a BC-MCS system to carry out sensing task efficiently and resist malicious server. Then, we propose a privacy preserving reputation management scheme to protect user privacy (e.g., sensing data, aggregation result, and requester’s feedback) and prevent malicious users simultaneously. Our reputation management scheme consists of local reputation evaluation and global reputation update. In the local evaluation stage, the reliability of user data is evaluated by the degree of data distortion, data consistency, local rating, and contextual factors. The requester gives positive or negative feedback for the user’s data service based on data reliability. In the global update stage, the user global reputationscoresareupdatedbysmart contract based on the average of all feedback from requesters. REFERENCES [1] R. K. Ganti, F. Ye, and H. Lei, ``Mobile crowdsensing: Current state andfuturechallenges,''IEEECommun. Mag., vol. 49, no. 11, pp. 3239, Nov. 2011. [2] J. Wang, M. Li, Y. He, H. Li, K. Xiao, and C. Wang, ``A blockchain based privacy-preserving incentive mechanism in crowdsensing applications,''IEEE Access, vol. 6, p. 1754517556, 2018. [3] Y. Zheng, H. Duan, X. Yuan, and C. Wang, ``Privacy- aware and efficient mobile crowdsensingwithtruth discovery,'' IEEE Trans. Dependable Secure Comput., to be published. doi: 10.1109/TDSC.2017.2753245. [4] Y. Zheng, H. Duan, and C. Wang, ``Learning the truth privatelyand confidently: Encrypted confidence- aware truth discovery in mobilecrowdsensing,'' IEEE Trans. Inf. Forensics Security, vol. 13, no. 10, pp. 2475 2489, Oct. 2018. [5] A. Karati, S. K. H. Islam, and M. Karuppiah, ``Provably secure and lightweight certi cateless signature scheme for IIoT environments,'' IEEE Trans. Ind. Informat., vol. 14, no. 8, pp. 37013711, Aug. 2018. [6] Y. Zhang, R. Deng, D. Zheng, J. Li, P. Wu, and J. Cao, ``Efficient and robust certificateless signature for data crowdsensing in cloud assistedindustrial IoT,'' IEEE Trans. Ind. Informat., to be published. doi: 10.1109/TII.2019.2894108. [7] S. Nakamoto. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System. Accessed: Jun. 5, 2018. [Online]. Available: https://bitcoin.org/bitcoin.pdf [8] M. Li, J. Weng, A. Yang, W. Lu, Y. Zhang, L. Hou, J.-N. Liu, Y. Xiang, and R. H. Deng, ``CrowdBC:Ablockchain-based decentralized framework for crowdsourcing,''IEEETrans.Parallel Distrib. Syst., vol. 30, no. 6, pp. 12511266, Jun.2019. doi: 10.1109/TPDS.2018.2881735. [9] F. Shi, Z. Qin, D. Wu, and J. McCann, ``MPCSToken: Smart contract enabled fault-tolerant incentivisation for mobile P2P crowd services,'' in Proc. IEEE 38th Int. Conf. Distrib. Comput. Syst. (ICDCS), Jul. 2018, pp. 961971. [10] C. Cai, Y. Zheng, and C. Wang, ``Leveraging crowdsensed data streams to discover and sell knowledge: A secure and efficient realization,'' in Proc. IEEE 38th Int. Conf. Distrib. Comput. Syst. (ICDCS), Jul. 2018, [11] S. K. A. Hossain, M. A. Rahman, and M. A. Hossain, ``Edge computing framework for enabling situation awareness in IoT based smart city,'' J. Parallel Distrib. Comput., vol. 122, pp. 226237, Dec. 2018. [12] J. Pan, J. Wang, A. Hester, I. Alqerm, Y. Liu, and Y. Zhao, Edgechain: An edge-iot framework and prototype based on blockchain and smart contracts,'' IEEE Internet Things J., to be published. doi: 10.1109/JIOT.2018.2878154.. [13] J. Kang, R. Yu, X. Huang,M.Wu,S.Maharjan, S. Xie, and Y. Zhang, ``Blockchain for secure and ef cient data sharing in vehicular edge computing and networks,'' IEEE Internet Things J., to be published. doi: 10.1109/JIOT.2018.2875542. [14] M. Pouryazdan, B. Kantarci, T. Soyata, L. Foschini, and H. Song, ``Quantifying user reputation scores, data trustworthiness, and user incentivesin mobile crowd-sensing,'' IEEE Access, vol. 5, pp. 13821397, 2017. [15] L. Xiao, Y. Li, G. Han, H. Dai, and H. V. Poor, ``A secure mobile crowd sensing game with deep reinforcement learning,'' IEEE Trans. Inf. Forensics Security, vol. 13, no. 1, pp. 35 47, Jan. 2018.. AUTHORS S. Anto Swaruba is currently pursuing her M.E degree in DepartmentofComputerScience& Engineering at DMI Engineering College, Aralvoimozhi, Tamilnadu, India A. J. Afin Jenifer, currently working as Assistant Professor, DepartmentofComputerScience& Engineering at DMI Engineering College, Aralvoimozhi, Tamilnadu, India.