Privacy-Preserving Data Aggregation in Mobile Phone Sensing

被引:67
作者
Zhang, Yuan [1 ,2 ]
Chen, Qingjun [1 ,2 ]
Zhong, Sheng [1 ,2 ]
机构
[1] Nanjing Univ, State Key Lab Novel Software Technol, Nanjing 210023, Jiangsu, Peoples R China
[2] Nanjing Univ, Comp Sci & Technol Dept, Nanjing 210023, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Privacy; data aggregation; cloud computing; security; mobile sensing; PUBLIC-KEY INFRASTRUCTURE; WIRELESS SENSOR NETWORKS; AWARE INCENTIVES; EFFICIENT;
D O I
10.1109/TIFS.2016.2515513
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Mobile phone sensing provides a promising paradigm for collecting sensing data and has been receiving increasing attention in recent years. Different from most existing works, which protect participants' privacy by hiding the content of their data and allow the aggregator to compute some simple aggregation functions, we propose a new approach to protect participants' privacy by delinking data from its sources. This approach allows the aggregator to get the exact distribution of the data aggregation and, therefore, enables the aggregator to efficiently compute arbitrary/complicated aggregation functions. In particular, we first present an efficient protocol that allows an untrusted data aggregator to periodically collect sensed data from a group of mobile phone users without knowing which data belong to which user. Assume there are n users in the group. Our protocol achieves n-source anonymity in the sense that the aggregator only learns that the source of a piece of data is one of the n users. Then, we consider a practical scenario where users may have different source anonymity requirements and provide a solution based on dividing users into groups. This solution optimizes the efficiency of data aggregation and meets all users' requirements at the same time.
引用
收藏
页码:980 / 992
页数:13
相关论文
共 48 条
[1]  
Abuzneid AS, 2015, IEEE WIREL COMMUNN, P91, DOI 10.1109/WCNCW.2015.7122535
[2]   Hybrid trust and reputation management for sensor networks [J].
Aivaloglou, Efthimia ;
Gritzalis, Stefanos .
WIRELESS NETWORKS, 2010, 16 (05) :1493-1510
[3]  
[Anonymous], 2004, FDN CRYPTOGRAPHY BAS
[4]  
[Anonymous], 2003, P 10 ACM C COMP COMM
[5]  
[Anonymous], ACM Transactions on Information and System Security (TISSEC), DOI DOI 10.1145/290163.290168
[6]  
[Anonymous], 1989, WORKSHOP THEORY APPL
[7]  
[Anonymous], 1998, NY TIMES
[8]   Maximizing lifetime of event-unobservable wireless sensor networks [J].
Bicakci, Kemal ;
Gultekin, Hakan ;
Tavli, Bulent ;
Bagci, Ibrahim Ethem .
COMPUTER STANDARDS & INTERFACES, 2011, 33 (04) :401-410
[9]  
Boneh D, 2005, LECT NOTES COMPUT SC, V3378, P325
[10]   Efficient and Provably Secure Aggregation of Encrypted Data in Wireless Sensor Networks [J].
Castelluccia, Claude ;
Chan, Aldar C-F ;
Mykletun, Einar ;
Tsudik, Gene .
ACM TRANSACTIONS ON SENSOR NETWORKS, 2009, 5 (03) :1-36