Secure Cloud Assisted Data Analysis Process for Smart Phone Tasks
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 144 | Weekly Hits: ⮙3 | Monthly Hits: ⮙8

M.Tech / M.E / PhD Thesis | Electronics & Communication Engineering | India | Volume 7 Issue 6, June 2018

Secure Cloud Assisted Data Analysis Process for Smart Phone Tasks

Kumudashree H S, Triveni C L

The omnipresence of smart cell phones makes the versatile crowdsourcing conceivable, where the requester (task requester) can crowdsource information from the smart cell phone user (cell phone clients) by utilizing their sensor-rich cell phones. In any case, information gathering, information total, and information examination have turned out to be testing issues for an asset obliged requester when information volume is to a great degree vast, i.e., enormous information. Specifically to information examination, set activities, including crossing point, association, and complementation, exist in most enormous information investigation for sifting repetitive information and preprocessing crude information. Confronting challenges as far as restricted calculation and capacity assets, cloud-helped methodologies may fill in as a promising method to handle huge information investigation issue. Cell phone users are not willing to provide their data. If the security of their detecting information and personality are not very much protected in the untrusted cloud. In this work, we propose to utilize cloud to process set task for the requester, in the meantime users', information security and characters protection are very much saved. Additionally, the requester can confirm the rightness of set activity comes about. We likewise stretch out our plan to help information preprocessing, with which invalid information can be barred before information examination. By utilizing clump check and information refresh strategies, the proposed conspire incredibly decreases the computational cost. Broad execution examination and investigation in view of genuine cloud framework have demonstrated both the achievability and productivity of our proposed conspire.

Keywords: Crowdsourcing, Privacy, Verifiable Set Operation

Edition: Volume 7 Issue 6, June 2018

Pages: 1002 - 1006

Share this Article

How to Cite this Article?

Kumudashree H S, Triveni C L, "Secure Cloud Assisted Data Analysis Process for Smart Phone Tasks", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20183222, Volume 7 Issue 6, June 2018, 1002 - 1006

Enter Your Registered Email Address





Similar Articles with Keyword 'Crowdsourcing'

Downloads: 118 | Monthly Hits: ⮙4

Research Paper, Electronics & Communication Engineering, Kenya, Volume 3 Issue 4, April 2014

Pages: 356 - 365

Early Warning Systems and Disaster Management using Mobile Crowdsourcing

Leonard Ondongo Sweta

Share this Article

Downloads: 144 | Weekly Hits: ⮙3 | Monthly Hits: ⮙8

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 7 Issue 6, June 2018

Pages: 1002 - 1006

Secure Cloud Assisted Data Analysis Process for Smart Phone Tasks

Kumudashree H S, Triveni C L

Share this Article

Similar Articles with Keyword 'Privacy'

Downloads: 88 | Weekly Hits: ⮙3 | Monthly Hits: ⮙16

Research Paper, Electronics & Communication Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1471 - 1476

HMAC Based Secure Authentication of VANETs

Swagat. S. Gudagudi, Dr. Veena Desai

Share this Article

Downloads: 99 | Weekly Hits: ⮙2 | Monthly Hits: ⮙11

Research Paper, Electronics & Communication Engineering, India, Volume 6 Issue 2, February 2017

Pages: 2002 - 2006

Text-Dependent Speaker Identification and Verification Using Hindi Database in Adverse Acoustic Condition

Shrikant Upadhyay, Sudhir Kumar Sharma, Pawan Kumar, Aditi Upadhyay

Share this Article

Downloads: 104 | Weekly Hits: ⮙1 | Monthly Hits: ⮙9

Research Paper, Electronics & Communication Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1980 - 1987

Implementation of Secured Data Transmission System on Customized Zynq SoC

D. Dhanalaxmi, V. Roopa Reddy

Share this Article

Downloads: 104 | Weekly Hits: ⮙5

Research Paper, Electronics & Communication Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1188 - 1192

Face Obfuscation Based Reversible Watermarking For Lossless Image Compression

Vivek Jaladi, Suhasini Andurey

Share this Article

Downloads: 107 | Weekly Hits: ⮙1

Research Paper, Electronics & Communication Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2971 - 2974

Continuous Connectivity Aware Routing Using Hybrid Protocol and Cross Analysis for Message Verification

Bhagyashri Pete, Prachi Jain

Share this Article



Top