Privacy-preserving computation of participatory noise maps in the cloud

被引:23
作者
Drosatos, George [1 ]
Efraimidis, Pavlos S. [1 ]
Athanasiadis, Ioannis N. [1 ]
Stevens, Matthias [2 ,3 ]
D'Hondt, Ellie [3 ]
机构
[1] Democritus Univ Thrace, Dept Elect & Comp Engn, GR-67100 Xanthi, Greece
[2] UCL, Dept Civil Environm & Geomat Engn, ExCiteS Grp, London, England
[3] Vrije Univ Brussel, Dept Comp Sci, BrusSense Team, Brussels, Belgium
基金
英国工程与自然科学研究理事会;
关键词
Privacy-preserving computation; Cloud computing; Participatory sensing;
D O I
10.1016/j.jss.2014.01.035
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper presents a privacy-preserving system for participatory sensing, which relies on cryptographic techniques and distributed computations in the cloud. Each individual user is represented by a personal software agent, deployed in the cloud, where it collaborates on distributed computations without loss of privacy, including with respect to the cloud service providers. We present a generic system architecture involving a cryptographic protocol based on a homomorphic encryption scheme for aggregating sensing data into maps, and demonstrate security in the Honest-But-Curious model both for the users and the cloud service providers. We validate our system in the context of NoiseTube, a participatory sensing framework for noise pollution, presenting experiments with real and artificially generated data sets, and a demo on a heterogeneous set of commercial cloud providers. To the best of our knowledge our system is the first operational privacy-preserving system for participatory sensing. While our validation pertains to the noise domain, the approach used is applicable in any crowd-sourcing application relying on location-based contributions of citizens where maps are produced by aggregating data - also beyond the domain of environmental monitoring. (C) 2014 Elsevier Inc. All rights reserved.
引用
收藏
页码:170 / 183
页数:14
相关论文
共 42 条
  • [1] Acquisti A., 2008, DIGITAL PRIVACY O
  • [2] [Anonymous], 2013, GIVE YOURSELF 5 STAR
  • [3] [Anonymous], 1978, FDN SEC COMPUT
  • [4] Becchetti L., 2010, PHONESENSE 10, V10, P51
  • [5] Meetings through the cloud: Privacy-preserving scheduling on mobile devices
    Bilogrevic, Igor
    Jadliwala, Murtuza
    Kumar, Praveen
    Walia, Sudeep Singh
    Hubaux, Jean-Pierre
    Aad, Imad
    Niemi, Valtteri
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (11) : 1910 - 1927
  • [6] Boutsis I, 2013, INT CONF PERVAS COMP, P103, DOI 10.1109/PerCom.2013.6526720
  • [7] Burke Jeffrey A., 2006, WSW'06
  • [8] Buytendijk F., 2013, FINANCIAL TIMES
  • [9] Side-Channel Leaks in Web Applications: a Reality Today, a Challenge Tomorrow
    Chen, Shuo
    Wang, Rui
    Wang, XiaoFeng
    Zhang, Kehuan
    [J]. 2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2010, : 191 - 206
  • [10] A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
    Chow, Chi-Yin
    Mokbel, Mohamed F.
    He, Tian
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2011, 10 (01) : 94 - 107