Data Collection with Privacy Preserving in Participatory Sensing

被引:2
作者
Chen, Qinghua [1 ,2 ]
Zheng, Shengbao [3 ]
Weng, Zhengqiu [2 ]
机构
[1] Zhejiang Univ Technol, Coll Comp Sci & Technol, Hangzhou, Zhejiang, Peoples R China
[2] Wenzhou Vocat & Tech Coll, Dept Informat Technol, Wenzhou, Peoples R China
[3] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai, Peoples R China
来源
2017 IEEE 23RD INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS) | 2017年
关键词
Data collection; privacy; participatory sensing; smartphone; VEHICULAR NETWORKS; LOCALIZATION;
D O I
10.1109/ICPADS.2017.00018
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Participatory sensing has increasingly become a new paradigm of data collection from a wide physical area and a large population. One of the major challenges in participatory sensing is the privacy issue. Sensing data from smartphones may contain sensitive information such as user locations. Thus, it is of great importance to preserve privacy throughout the data collection process in participatory sensing. It is however very challenging because of the distributed nature of the network, many potential malicious attackers and the convergecast model of data collection. In this paper, we present a data collection approach which preserves user privacy in participatory sensing. In this approach, a smartphone node utilizes other smartphones as intermediate nodes to transfer its sensing data. In addition, asymmetric encryption is used to prevent malicious reverse tracking along the data forwarding route, hence anonymizing the originator of the data. We analyze the security of the approach and show that it achieves a high level of security. Extensive simulations demonstrate that the proposed approach has a low overhead.
引用
收藏
页码:49 / 56
页数:8
相关论文
共 38 条
[1]   Mobiscopes for human spaces [J].
Abdelzaher, Tarek ;
Anokwa, Yaw ;
Boda, Peter ;
Burke, Jeff ;
Estrin, Deborah ;
Guibas, Leonidas ;
Kansal, Aman ;
Madden, Samuel ;
Reich, Jim .
IEEE PERVASIVE COMPUTING, 2007, 6 (02) :20-29
[2]  
Agrawal D., 2001, Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems (PODS '01), P247, DOI [10.1145/375551.375602, DOI 10.1145/375551.375602]
[3]  
[Anonymous], 2006, P WORLD SENS WEB WOR
[4]  
Boneh D, 2005, LECT NOTES COMPUT SC, V3378, P325
[5]  
Boutsis I, 2013, INT CONF PERVAS COMP, P103, DOI 10.1109/PerCom.2013.6526720
[6]  
Campbell AndrewT., 2006, Proceedings of the 2nd Annual International Wireless Internet Conference (WICON' 06), Boston, Massachusetts, P18, DOI [10.1145/1234161.1234179, DOI 10.1145/1234161.1234179]
[7]   Efficient and Provably Secure Aggregation of Encrypted Data in Wireless Sensor Networks [J].
Castelluccia, Claude ;
Chan, Aldar C-F ;
Mykletun, Einar ;
Tsudik, Gene .
ACM TRANSACTIONS ON SENSOR NETWORKS, 2009, 5 (03) :1-36
[8]  
Chan T.-H. H., 2012, International Conference on Financial Cryptography and Data Security, P200
[9]   Confronting the challenges in reconnecting urban planning and public health [J].
Corburn, J .
AMERICAN JOURNAL OF PUBLIC HEALTH, 2004, 94 (04) :541-546
[10]  
De Cristofaro E, 2011, WISEC 11: PROCEEDINGS OF THE FOURTH ACM CONFERENCE ON WIRELESS NETWORK SECURITY, P23