This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
March-April 2014 (vol. 11 no. 2)
pp. 115-129
Qinghua Li, The Pennsylvania State University, University Park
Guohong Cao, The Pennsylvania State University, University Park
Thomas F. La Porta, The Pennsylvania State University, University Park
The proliferation and ever-increasing capabilities of mobile devices such as smart phones give rise to a variety of mobile sensing applications. This paper studies how an untrusted aggregator in mobile sensing can periodically obtain desired statistics over the data contributed by multiple mobile users, without compromising the privacy of each user. Although there are some existing works in this area, they either require bidirectional communications between the aggregator and mobile users in every aggregation period, or have high-computation overhead and cannot support large plaintext spaces. Also, they do not consider the Min aggregate, which is quite useful in mobile sensing. To address these problems, we propose an efficient protocol to obtain the Sum aggregate, which employs an additive homomorphic encryption and a novel key management technique to support large plaintext space. We also extend the sum aggregation protocol to obtain the Min aggregate of time-series data. To deal with dynamic joins and leaves of mobile users, we propose a scheme that utilizes the redundancy in security to reduce the communication cost for each join and leave. Evaluations show that our protocols are orders of magnitude faster than existing solutions, and it has much lower communication overhead.
Index Terms:
Aggregates,Encryption,Mobile communication,Sensors,Protocols,Equations,data aggregation,Mobile sensing,privacy
Citation:
Qinghua Li, Guohong Cao, Thomas F. La Porta, "Efficient and Privacy-Aware Data Aggregation in Mobile Sensing," IEEE Transactions on Dependable and Secure Computing, vol. 11, no. 2, pp. 115-129, March-April 2014, doi:10.1109/TDSC.2013.31
Usage of this product signifies your acceptance of the Terms of Use.