Consent-driven Data Reuse in Multi-tasking Crowdsensing Systems: A Privacy-by-Design Solution

被引:2
作者
Brahem, Mariem [1 ,2 ]
Scerri, Guillaume [1 ,2 ]
Anciaux, Nicolas [1 ,2 ]
Issarny, Valerie [3 ]
机构
[1] Inria SIF, Petrus Team, 1 rue Honore Estienne Orves, F-91120 Palaiseau, France
[2] Univ Versailles St Quentin En Yvelines, 55 Ave, F-78000 Paris, Versailles, France
[3] Inria Paris, MiMove Team, 2 rue Simone Iff, F-75012 Paris, France
关键词
Mobile crowdsensing; Privacy; Consent; Security; Trusted execution environment; SGX; INFORMED-CONSENT; MOBILE; TRUST; SGX;
D O I
10.1016/j.pmcj.2022.101614
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile crowdsensing allows gathering massive data across time and space to feed our environmental knowledge, and to link such knowledge to user behavior. However, a major challenge facing mobile crowdsensing is to guarantee privacy preservation to the contributing users. Privacy preservation in crowdsensing systems has led to two main approaches, sometimes combined, which are, respectively, to trade privacy for rewards, and to take advantage of privacy-enhancing technologies anonymizingthe collected data. Although relevant, we claim that these approaches do not sufficiently take into account the users' own tolerance to the use of the data provided, so that the crowdsensing system guarantees users the expected level of confidentiality as well as fosters the use of crowdsensing data for different tasks. To this end, we leverage the l-Completeness property, which ensures that the data provided can be used for all the tasks to which their owners consent as long as they are analyzed with l - 1 other sources, and that no privacy violations can occur due to the related contribution of users with less stringent privacy requirements. The challenge, therefore, is to ensure l-Completeness when analyzing the data while allowing the data to be used for as many tasks as possible, and promoting the accuracy of the resulting knowledge. This is achieved through a clustering algorithm sensitive to the data distribution, which optimizes data reuse and utility. Nevertheless, it is critical to allow the deployment of such a solution even in the presence of a malicious adversary able to act on the server side, for which we introduce a privacy-by-design architecture leveraging Trusted Execution Environments. The implementation of a prototype using SGX enclaves further allows running experiments that show that our system incurs a reasonable performance overhead, while providing strong security properties against a malicious adversary. (C) 2022 Elsevier B.V. All rights reserved.
引用
收藏
页数:21
相关论文
共 86 条
  • [1] The Accuracy-Privacy Trade-off of Mobile Crowdsensing
    Abu Alsheikh, Mohammad
    Jiao, Yutao
    Niyato, Dusit
    Wang, Ping
    Leong, Derek
    Han, Zhu
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (06) : 132 - 139
  • [2] AMD Secure Technology, US
  • [3] [Anonymous], 2007, European Commission proposes end to anti-dumping duties on energy saving lightbulbs in one year
  • [4] [Anonymous], 2016, Official Journal of the European Union, VL119, P1
  • [5] ARM, Building a secure system using trustzone<(R)>technology
  • [6] Arnautov S, 2016, PROCEEDINGS OF OSDI'16: 12TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, P689
  • [7] Arthur D, 2007, PROCEEDINGS OF THE EIGHTEENTH ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS, P1027
  • [8] Secure Multiparty Computation from SGX
    Bahmani, Raad
    Barbosa, Manuel
    Brasser, Ferdinand
    Portela, Bernardo
    Sadeghi, Ahmad-Reza
    Scerri, Guillaume
    Warinschi, Bogdan
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2017, 2017, 10322 : 477 - 497
  • [9] Shielding Applications from an Untrusted Cloud with Haven
    Baumann, Andrew
    Peinado, Marcus
    Hunt, Galen
    [J]. ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2015, 33 (03):