Collector approves some of requests

Assignment Help Basic Computer Science
Reference no: EM131046532

Design a privacy-preserving crowd sensing system. This system works in three steps:

Step 1: a remote data collector publishes sensing tasks to all mobile users (e.g., through smartphones carried by users) in the system. A task contains a task identifier and a task description.

Step 2: the mobile users who are interested in a task request the collector to assign the task to them and the collector approves some of requests.

Step 3: those mobile users who are assigned the task submit sensing data to the collector.For privacy reasons, each user does not want the collector to know which tasks she/he has requested and submitted data for.

For trust reasons, the collector wants to make sure only authorized users (i.e., those in the system) can request task and each user can only request each task once. Also only the users assigned a task can submit data for this task. Design a protocol to meet these goals, and clearly describe how it works in each step. Your protocol can have some initialization step before the above Step 1. Here,collusion between authorized users and outside users is not considered. Also, you can assume that no user will be compromised and controlled by the attacker.

Reference no: EM131046532

Questions Cloud

What are the major sources of woolworths revenue : Auditing and Assurance (ACC3AUD) Assignment. You are a part of the team responsible for planning the Woolworths (parent and the consolidated economic entity) audit engagement for 2016. What are the major sources of Woolworths revenue
Username parameter has the value chucky : Write a complete Java method called authenticate that takes two Strings (username, password) as parameters and returns a boolean. If the username parameter has the value "Chucky" and the password parameter has the value "Cheese1", return true. Oth..
What are the differences in acute and chronic pain : What risk factors does John have for risk of opioid withdrawal during this hospitalization? Is there a stigma connected to being disabled and/or methadone?
What has your group accomplished : Describe how your group has worked this past week. What has your group accomplished? What challenges has your group faced? How has your group overcome the challenges?
Collector approves some of requests : Step 1: a remote data collector publishes sensing tasks to all mobile users (e.g., through smartphones carried by users) in the system. A task contains a task identifier and a task description. Step 2: the mobile users who are interested in a tas..
What are the benefits and challenges of using cds systems : Consider how a clinical decision support system provides evidence-based content to its users. What are the benefits and challenges of using CDS systems? How can this assist nurses in providing evidence-based care to their patients?
Network security analyst for a small accounting firm : You have been recently hired as a network security analyst for a small accounting firm. The firm is realizing that they need help to secure their network and customer's data. With your background and skills, they are looking to you to provide guid..
Analyze and describe the elements of the triple constraint : Analyze and describe the elements of the triple constraint in project management. Summarize how the triple constraint impacted management of an IT project from your experience.
List three methods of contraception : Discuss three actions that a woman can take to maintain her reproductive health. List three methods of contraception and describe the advantages and disadvantages of each.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  How to convert a string of binary into decimal

how to convert a string of binary into decimal and a decimal into binary using java

  Design a program that ask for the price of each item

Design a program that ask for the price of each item, and then displays the subtotal of the sale, the amount of sales tax and the total. Assume the sales tax is 6 percent. Need help with this question.

  Computing machinery and intelligence

Read the paper by Alan Turing, "Computing Machinery and Intelligence". In this paper, he describes a test that could be used to determine if a machine is intelligent. He referred to the test as the "Imitation Game".

  Developing the subnet calculator using visual studio

Create a Visual Basic .NET Windows Application with the following user requirements:

  Write a program that asks user to input grade of student

Write a program that asks the user to input the grade of the student. If the grade is equal or greater than 60, the program prints the word "pass", otherwise it prints the word "fail".

  Outline the purpose of the presentation and its contents

7205ICT –ADVANCED DATABASES. A few slides longer that outline the purpose of the presentation and its contents focusing on the Background, Related Work and Methodology.

  Beat the hacker-audits and assessments

Provide a least two examples of security knowledge that would assist you in preparing for or preventing a threat. Explain the time-sensitive nature of the knowledge.

  In the final round of a tv game show

In the final round of a TV game show, contestants have a chance to increase their current winnings of $1 million to $2 million. If they are wrong, their prize is decreased to $500,000. A contestant thinks his guess will be right 50% of the time. Shou..

  Create a new table for suppliers contact information

1. Create a new table for Suppliers' contact information and set the primary key and appropriate data types for the fields. The table should at least contain the following information: a. Company name and address  b. Representative's name, pho..

  Kinds of support and tools are available with visual basic

What kinds of support and tools are available with Visual Basic? Sum-up your research, and make sure to reply to each of the questions.

  Techniques attacker use to access information on system

Recognize all potential security threats on home personal computer. Recognize some of techniques the attacker might use to access some information on system.

  Identify each of the risk tolerance categories

Identify each of the risk tolerance categories. Compare and contrast each and identify the category.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd