The Community for Technology Leaders
RSS Icon
Issue No.02 - March-April (2014 vol.11)
pp: 115-129
Qinghua Li , The Pennsylvania State University, University Park
Guohong Cao , The Pennsylvania State University, University Park
Thomas F. La Porta , The Pennsylvania State University, University Park
The proliferation and ever-increasing capabilities of mobile devices such as smart phones give rise to a variety of mobile sensing applications. This paper studies how an untrusted aggregator in mobile sensing can periodically obtain desired statistics over the data contributed by multiple mobile users, without compromising the privacy of each user. Although there are some existing works in this area, they either require bidirectional communications between the aggregator and mobile users in every aggregation period, or have high-computation overhead and cannot support large plaintext spaces. Also, they do not consider the Min aggregate, which is quite useful in mobile sensing. To address these problems, we propose an efficient protocol to obtain the Sum aggregate, which employs an additive homomorphic encryption and a novel key management technique to support large plaintext space. We also extend the sum aggregation protocol to obtain the Min aggregate of time-series data. To deal with dynamic joins and leaves of mobile users, we propose a scheme that utilizes the redundancy in security to reduce the communication cost for each join and leave. Evaluations show that our protocols are orders of magnitude faster than existing solutions, and it has much lower communication overhead.
Aggregates, Encryption, Mobile communication, Sensors, Protocols, Equations,data aggregation, Mobile sensing, privacy
Qinghua Li, Guohong Cao, Thomas F. La Porta, "Efficient and Privacy-Aware Data Aggregation in Mobile Sensing", IEEE Transactions on Dependable and Secure Computing, vol.11, no. 2, pp. 115-129, March-April 2014, doi:10.1109/TDSC.2013.31
[1] M. Mun, S. Reddy, K. Shilton, N. Yau, J. Burke, D. Estrin, M. Hansen, E. Howard, R. West, and P. Boda, "Peir, the Personal Environmental Impact Report, As a Platform for Participatory Sensing Systems Research," Proc. ACM/USENIX Int'l Conf. Mobile Systems, Applications, and Services (MobiSys '09), pp. 55-68, 2009.
[2] A. Thiagarajan, L. Ravindranath, K. LaCurts, S. Madden, H. Balakrishnan, S. Toledo, and J. Eriksson, "VTrack: Accurate, Energy-Aware Road Traffic Delay Estimation Using Mobile Phones," Proc. ACM Seventh Conf. Embedded Networked Sensor Systems (SenSys '09), pp. 85-98, 2009.
[3] S. Consolvo, D.W. McDonald, T. Toscos, M.Y. Chen, J. Froehlich, B. Harrison, P. Klasnja, A. LaMarca, L. LeGrand, R. Libby, I. Smith, and J.A. Landay, "Activity Sensing in the Wild: A Field Trial of Ubifit Garden," Proc. SIGCHI Conf. Human Factors in Computing Systems (CHI '08), pp. 1797-1806, 2008.
[4] J. Hicks, N. Ramanathan, D. Kim, M. Monibi, J. Selsky, M. Hansen, and D. Estrin, "AndWellness: An Open Mobile System for Activity and Experience Sampling," Proc. Wireless Health, pp. 34-43, 2010.
[5] N.D. Lane, M. Mohammod, M. Lin, X. Yang, H. Lu, S. Ali, A. Doryab, E. Berke, T. Choudhury, and A. Campbell, "Bewell: A Smartphone Application to Monitor, Model and Promote Wellbeing," Proc. Fifth Int'l ICST Conf. Pervasive Computing Technologies for Healthcare, 2011.
[6] V. Rastogi and S. Nath, "Differentially Private Aggregation of Distributed Time-Series with Transformation and Encryption," Proc. ACM SIGMOD Int'l Conf. Management of Data, 2010.
[7] E. Shi, T.-H.H. Chan, E. Rieffel, R. Chow, and D. Song, "Privacy-Preserving Aggregation of Time-Series Data," Proc. Network and Distributed System Security Symp. (NDSS '11), 2011.
[8] T.-H.H. Chan, E. Shi, and D. Song, "Privacy-Preserving Stream Aggregation with Fault Tolerance," Proc. Sixth Int'l Conf. Financial Cryptography and Data Security (FC '12), 2012.
[9] E.G. Rieffel, J. Biehl, W. van Melle, and A.J. Lee, "Secured Histories: Computing Group Statistics on Encrypted Data While Preserving Individual Privacy,", 2010.
[10] P.-A. Fouque, G. Poupard, and J. Stern, "Sharing Decryption in the Context of Voting or Lotteries," Proc. Fourth Int'l Conf. Financial Cryptography (FC '00), pp. 90-104, 2000.
[11] MNDOLI, "Mnosha Permissible Exposure Limits,", 2013.
[12] S.B. Eisenman, E. Miluzzo, N.D. Lane, R.A. Peterson, G.-S. Ahn, and A.T. Campbell, "The Bikenet Mobile Sensing System for Cyclist Experience Mapping," Proc. ACM Fifth Int'l Conf. Embedded Networked Sensor Systems (SenSys '07), pp. 87-101, 2007.
[13] M.G. Apte, W.J. Fisk, and J.M. Daisey, "Indoor Carbon Dioxide Concentrations and SBS in Office Workers," Proc. Healthy Buildings Conf., pp. 133-138, 2000.
[14] Z. Zhu and G. Cao, "APPLAUS: A Privacy-Preserving Location Proof Updating System for Location-Based Services," Proc. IEEE INFOCOM, 2011.
[15] Q. Li and G. Cao, "Mitigating Routing Misbehavior in Disruption Tolerant Networks," IEEE Trans. Information Forensics and Security, vol. 7, no. 2, pp. 664-675, Apr. 2012.
[16] E.D. Cristofaro and C. Soriente, "Short Paper: Pepsi—Privacy-Enhanced Participatory Sensing Infrastructure," Proc. Fourth ACM Conf. Wireless Network Security (WiSec '11), pp. 23-28, 2011.
[17] Q. Li, S. Zhu, and G. Cao, "Routing in Socially Selfish Delay Tolerant Networks," Proc. IEEE INFOCOM, pp. 1-9, 2010.
[18] Q. Li, W. Gao, S. Zhu, and G. Cao, "A Routing Protocol for Socially Selfish Delay Tolerant Networks," Ad Hoc Networks, vol. 10, no. 8, pp. 664-675, 2012.
[19] D. Bonet, E.-J. Goh, and K. Nissim, "Evaluating 2-DNF Formulas on Ciphertexts," Proc. Second Int'l Conf. Theory of Cryptography (TCC '05), 2005.
[20] C. Gentry, "Fully Homomorphic Encryption Using Ideal Lattices," Proc. ACM Symp. Theory of Computing (STOC '09), pp. 169-178, 2009.
[21] C. Castelluccia, A.C.-F. Chan, E. Mykletun, and G. Tsudik, "Efficient and Provably Secure Aggregation of Encrypted Data in Wireless Sensor Networks," ACM Trans. Sensor Networks, vol. 5, no. 3, pp. 20:1-20:36, 2009.
[22] Y. Yang, X. Wang, S. Zhu, and G. Cao, "SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks," ACM Trans. Information and System Security, vol. 11, no. 4,article 18, 2008.
[23] Z. Yang, S. Zhong, and R.N. Wright, "Privacy-Preserving Classification of Customer Data without Loss of Accuracy," Proc. Fifth SIAM Int'l Conf. Data Mining (SDM '05), pp. 21-23, 2005.
[24] J. Shi, R. Zhang, Y. Liu, and Y. Zhang, "Prisense: Privacy-Preserving Data Aggregation in People-Centric Urban Sensing Systems," Proc. IEEE INFOCOM, pp. 758-766, 2010.
[25] Z. Erkin and G. Tsudik, "Private Computation of Spatial and Temporal Power Consumption with Smart Meters," Proc. Int'l Conf. Applied Cryptography and Network Security (ACNS '12), pp. 561-577, 2012.
[26] G. Ács and C. Castelluccia, "I Have a Dream!: Differentially Private Smart Metering," Proc. 13th Int'l Conf. Information Hiding (IH '11), pp. 118-132, 2011.
[27] M. Jawurek and F. Kerschbaum, "Fault-Tolerant Privacy-Preserving Statistics," Proc. 12th Privacy Enhancing Technologies Symp. (PETS '12), 2012.
[28] M. Shao, Y. Yang, S. Zhu, and G. Cao, "Towards Statistically Strong Source Anonymity for Sensor Networks," Proc. IEEE INFOCOM, 2008.
[29] C. Castelluccia, "Efficient Aggregation of Encrypted Data in Wireless Sensor Networks," Proc. Second Ann. Int'l Conf. Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous '05), pp. 109-117, 2005.
[30] M. Bellare, "New Proofs for NMAC and HMAC: Security without Collision-Resistance," Proc. 26th Ann. Int'l Conf. Advances in Cryptology (CRYPTO '06), pp. 602-619, 2006.
[31] C. Dwork, F. McSherry, K. Nissim, and A. Smith, "Calibrating Noise to Sensitivity in Private Data Analysis," Proc. Third Conf. Theory of Cryptography (TCC '06), 2006.
[32] Q. Li and G. Cao, "Providing Privacy-Aware Incentives for Mobile Sensing," Proc. IEEE PerCom, 2013.
[33] Q. Li and G. Cao, "Efficient Privacy-Preserving Stream Aggregation in Mobile Sensing with Low Aggregation Error," Privacy Enhancing Technologies Symposium (PETS), 2013.
[34] Q. Li and G. Cao, "Efficient and Privacy-Preserving Data Aggregation in Mobile Sensing," Proc. IEEE ICNP, pp. 1-10, 2012.
59 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool