Skip to main content
Top
Published in: Wireless Personal Communications 1/2018

05-09-2017

Participant Density-Independent Location Privacy Protection for Data Aggregation in Mobile Crowd-Sensing

Authors: Jianwei Chen, Huadong Ma, Dong Zhao, David S. L. Wei

Published in: Wireless Personal Communications | Issue 1/2018

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Mobile crowd-sensing applications produce useful knowledge of the surrounding environment, which makes our life more predictable. However, these applications often require users to contribute, consciously or unconsciously, location-related data for analysis, which gravely encroaches users’ location privacy. Aggregate processing is a feasible way for preserving user privacy to some extent, and based on the mode, some privacy-preserving schemes have been proposed. However, existing schemes still cannot guarantee users’ location privacy in the scenarios with low density participants. Meanwhile, user accountability also needs to be considered comprehensively to protect the system against malicious users. In this paper, we propose data aggregate statistics schemes with participant density-independent location privacy-protection for mobile crowd-sensing applications. First, we make use of multi-pseudonym mechanism to overcome the vulnerability due to low participant density. Then, to further handle sybil attacks, we propose two schemes based on the Paillier cryptosystem. In the basic scheme, we leverage non-interactive zero-knowledge proof technology to verify users’ sensing data. In the advanced scheme, we present a novel verification framework, which also addresses the problem of user accountability, but at the cost of introducing a new entity. Finally, the theoretical analysis indicates that our scheme achieves the desired properties, and the performance experiments demonstrate that our scheme can achieve a balance among accuracy, privacy-protection and computational overhead.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
6.
go back to reference Agir, B., Papaioannou, T. G., Narendula, R., Aberer, K., & Hubaux, J.-P. (2014). User-side adaptive protection of location privacy in participatory sensing. Geoinformatica, 18(1), 165–191.CrossRef Agir, B., Papaioannou, T. G., Narendula, R., Aberer, K., & Hubaux, J.-P. (2014). User-side adaptive protection of location privacy in participatory sensing. Geoinformatica, 18(1), 165–191.CrossRef
7.
go back to reference Beresford, A. R., & Stajano, F. (2003). Location privacy in pervasive computing. IEEE Pervasive Computing, 1, 46–55.CrossRef Beresford, A. R., & Stajano, F. (2003). Location privacy in pervasive computing. IEEE Pervasive Computing, 1, 46–55.CrossRef
8.
go back to reference Boudot, F. (2000). Efficient proofs that a committed number lies in an interval. In B. Preneel (Eds.), Advances in cryptology–EUROCRYPT 2000. EUROCRYPT 2000. Lecture Notes in Computer Science (Vol. 1807). Berlin: Springer. Boudot, F. (2000). Efficient proofs that a committed number lies in an interval. In B. Preneel (Eds.), Advances in cryptology–EUROCRYPT 2000. EUROCRYPT 2000. Lecture Notes in Computer Science (Vol. 1807). Berlin: Springer.
9.
go back to reference Brown, J. W. S., Ohrimenko, O., & Tamassia, R. (2013). Haze: Privacy-preserving real-time traffic statistics. In: Proceedings of the 21st ACM SIGSPATIAL international conference on advances in geographic information systems (pp. 540–543). ACM. Brown, J. W. S., Ohrimenko, O., & Tamassia, R. (2013). Haze: Privacy-preserving real-time traffic statistics. In: Proceedings of the 21st ACM SIGSPATIAL international conference on advances in geographic information systems (pp. 540–543). ACM.
10.
go back to reference Burke, J. A., Estrin, D., Hansen, M., Parker, A., Ramanathan, N., Reddy, S., et al. (2006). Participatory sensing. In ACM sensys workshop on WorldSensor-Web (WSW’06): Mobile device centric sensor networks and applications. Burke, J. A., Estrin, D., Hansen, M., Parker, A., Ramanathan, N., Reddy, S., et al. (2006). Participatory sensing. In ACM sensys workshop on WorldSensor-Web (WSW’06): Mobile device centric sensor networks and applications.
11.
go back to reference Campbell, A. T., Eisenman, S. B., Lane, N. D., Miluzzo, E., & Peterson, R. A. (2006). People-centric urban sensing. In Proceedings of the 2nd annual international workshop on Wireless internet. ACM. Campbell, A. T., Eisenman, S. B., Lane, N. D., Miluzzo, E., & Peterson, R. A. (2006). People-centric urban sensing. In Proceedings of the 2nd annual international workshop on Wireless internet. ACM.
12.
go back to reference Chen, J., & Ma, H.-D. (2014). Privacy-preserving aggregation for participatory sensing with efficient group management. In Proceedings of IEEE global communications conference (pp. 2757–2762). IEEE. Chen, J., & Ma, H.-D. (2014). Privacy-preserving aggregation for participatory sensing with efficient group management. In Proceedings of IEEE global communications conference (pp. 2757–2762). IEEE.
13.
go back to reference Chen, R., Reznichenko, A., Francis, P., & Gehrke, J. (2012). Towards statistical queries over distributed private user data. In Proceedings of the 10th USENIX symposium on networked systems design and implementation (Vol. 12, pp, 13–13). Chen, R., Reznichenko, A., Francis, P., & Gehrke, J. (2012). Towards statistical queries over distributed private user data. In Proceedings of the 10th USENIX symposium on networked systems design and implementation (Vol. 12, pp, 13–13).
14.
go back to reference Chen, X., Wu, X., Li, X.-Y., He, Y., & Liu, Y. (2014). Privacy-preserving high-quality map generation with participatory sensing. In: Proceedings of IEEE international conference on computer communications (pp. 2310–2318). IEEE. Chen, X., Wu, X., Li, X.-Y., He, Y., & Liu, Y. (2014). Privacy-preserving high-quality map generation with participatory sensing. In: Proceedings of IEEE international conference on computer communications (pp. 2310–2318). IEEE.
15.
go back to reference Christin, D., Reinhardt, A., Kanhere, S. S., & Hollick, M. (2011). A survey on privacy in mobile participatory sensing applications. Journal of Systems and Software, 84(11), 1928–1946.CrossRef Christin, D., Reinhardt, A., Kanhere, S. S., & Hollick, M. (2011). A survey on privacy in mobile participatory sensing applications. Journal of Systems and Software, 84(11), 1928–1946.CrossRef
16.
go back to reference Damiani, M. L. (2014). Location privacy models in mobile applications: Conceptual view and research directions. GeoInformatica, 18(4), 819–842.CrossRef Damiani, M. L. (2014). Location privacy models in mobile applications: Conceptual view and research directions. GeoInformatica, 18(4), 819–842.CrossRef
17.
go back to reference Dwork, C. (2006). Differential privacy. In Proceedings of international colloquium on automata, languages and programming. Springer. Dwork, C. (2006). Differential privacy. In Proceedings of international colloquium on automata, languages and programming. Springer.
18.
go back to reference Fan, L., Xiong, L., & Sunderam, V. (2013). Differentially private multi-dimensional time series release for traffic monitoring. In L. Wang & B. Shafiq (Eds.), Data and applications security and privacy XXVII. DBSec 2013. Lecture notes in computer science (Vol. 7964). Berlin: Springer. Fan, L., Xiong, L., & Sunderam, V. (2013). Differentially private multi-dimensional time series release for traffic monitoring. In L. Wang & B. Shafiq (Eds.), Data and applications security and privacy XXVII. DBSec 2013. Lecture notes in computer science (Vol. 7964). Berlin: Springer.
19.
go back to reference Ganti, R. K., Ye, F., & Lei, H. (2011). Mobile crowdsensing: Current state and future challenges. IEEE Communications Magazine, 49(11), 32–39.CrossRef Ganti, R. K., Ye, F., & Lei, H. (2011). Mobile crowdsensing: Current state and future challenges. IEEE Communications Magazine, 49(11), 32–39.CrossRef
20.
go back to reference Gao, S., Ma, J., Shi, W., Zhan, G., & Sun, C. (2013). Trpf: A trajectory privacy-preserving framework for participatory sensing. IEEE Transactions on Information Forensics and Security, 8(6), 874–887.CrossRef Gao, S., Ma, J., Shi, W., Zhan, G., & Sun, C. (2013). Trpf: A trajectory privacy-preserving framework for participatory sensing. IEEE Transactions on Information Forensics and Security, 8(6), 874–887.CrossRef
21.
go back to reference Gisdakis, S., Giannetsos, T., & Papadimitratos, P. (2014). Sppear: Security & privacy-preserving architecture for participatory-sensing applications. In Proceedings of the 2014 ACM conference on Security and privacy in wireless & mobile networks (pp. 39–50). ACM. Gisdakis, S., Giannetsos, T., & Papadimitratos, P. (2014). Sppear: Security & privacy-preserving architecture for participatory-sensing applications. In Proceedings of the 2014 ACM conference on Security and privacy in wireless & mobile networks (pp. 39–50). ACM.
22.
go back to reference Gong, Y., Zhang, C., Fang, Y., & Sun, J. (2015). Protecting location privacy for task allocation in ad hoc mobile cloud computing. In IEEE Transactions on Emerging Topics in Computing. Online. Gong, Y., Zhang, C., Fang, Y., & Sun, J. (2015). Protecting location privacy for task allocation in ad hoc mobile cloud computing. In IEEE Transactions on Emerging Topics in Computing. Online.
23.
go back to reference Gruteser, M., & Grunwald, D. (2003). Anonymous usage of location-based services through spatial and temporal cloaking. In Proceedings of the 1st international conference on mobile systems, applications and services (pp. 31–42). ACM. Gruteser, M., & Grunwald, D. (2003). Anonymous usage of location-based services through spatial and temporal cloaking. In Proceedings of the 1st international conference on mobile systems, applications and services (pp. 31–42). ACM.
24.
go back to reference Guha, S., Reznichenko, A., Tang, K., Haddadi, H., & Francis, P. (2009). Serving ads from localhost for performance, privacy, and profit. In Proceedings of the 8th workshop on hot topics in networks. ACM. Guha, S., Reznichenko, A., Tang, K., Haddadi, H., & Francis, P. (2009). Serving ads from localhost for performance, privacy, and profit. In Proceedings of the 8th workshop on hot topics in networks. ACM.
25.
go back to reference Hull, B., Bychkovsky, V., Zhang, Y., Chen, K., Goraczko, M., Miu, A., et al. (2006). Cartel: A distributed mobile sensor computing system. In Proceedings of the 4th international conference on Embedded networked sensor systems (pp. 125–138). ACM. Hull, B., Bychkovsky, V., Zhang, Y., Chen, K., Goraczko, M., Miu, A., et al. (2006). Cartel: A distributed mobile sensor computing system. In Proceedings of the 4th international conference on Embedded networked sensor systems (pp. 125–138). ACM.
26.
go back to reference Husted, N., & Myers, S. (2010). Mobile location tracking in metro areas: Malnets and others. In Proceedings of the 17th ACM conference on computer and communications security (pp. 85–96). ACM. Husted, N., & Myers, S. (2010). Mobile location tracking in metro areas: Malnets and others. In Proceedings of the 17th ACM conference on computer and communications security (pp. 85–96). ACM.
27.
go back to reference Krontiris, I., & Dimitriou, T. (2015). A platform for privacy protection of data requesters and data providers in mobile sensing. Computer Communications, 65, 43-54. Krontiris, I., & Dimitriou, T. (2015). A platform for privacy protection of data requesters and data providers in mobile sensing. Computer Communications, 65, 43-54.
28.
go back to reference Lane, N. D., Mohammod, M., Lin, M., Yang, X., Lu, H., Ali, S., et al. (2011). Bewell: A smartphone application to monitor, model and promote wellbeing. In Proceedings of the 5th international ICST conference on pervasive computing technologies for healthcare (pp. 23–26). Lane, N. D., Mohammod, M., Lin, M., Yang, X., Lu, H., Ali, S., et al. (2011). Bewell: A smartphone application to monitor, model and promote wellbeing. In Proceedings of the 5th international ICST conference on pervasive computing technologies for healthcare (pp. 23–26).
29.
go back to reference Li, M., Salinas, S., & Li, P. (2014). Locaward: A security and privacy aware location-based rewarding system. IEEE Transactions on Parallel and Distributed Systems, 25(2), 343–352.CrossRef Li, M., Salinas, S., & Li, P. (2014). Locaward: A security and privacy aware location-based rewarding system. IEEE Transactions on Parallel and Distributed Systems, 25(2), 343–352.CrossRef
30.
go back to reference Liu, X., Liu, K., Guo, L., Li, X., & Fang, Y. (2013). A game-theoretic approach for achieving k-anonymity in location based services. In Proceedings of IEEE international conference on computer communications (pp. 2985–2993). IEEE. Liu, X., Liu, K., Guo, L., Li, X., & Fang, Y. (2013). A game-theoretic approach for achieving k-anonymity in location based services. In Proceedings of IEEE international conference on computer communications (pp. 2985–2993). IEEE.
31.
go back to reference Luo, H., Luo, J., Liu, Y., & Das, S. K. (2006). Adaptive data fusion for energy efficient routing in wireless sensor networks. IEEE Transactions on Computers, 55(10), 1286–1299.CrossRef Luo, H., Luo, J., Liu, Y., & Das, S. K. (2006). Adaptive data fusion for energy efficient routing in wireless sensor networks. IEEE Transactions on Computers, 55(10), 1286–1299.CrossRef
32.
go back to reference Ma, H.-D., Zhao, D., & Yuan, P. (2014). Opportunities in mobile crowd sensing. IEEE Communications Magazine, 52(8), 29–35.CrossRef Ma, H.-D., Zhao, D., & Yuan, P. (2014). Opportunities in mobile crowd sensing. IEEE Communications Magazine, 52(8), 29–35.CrossRef
33.
go back to reference Mun, M., Reddy, S., Shilton, K., Yau, N., Burke, J., Estrin, D., et al. (2009). Peir, the personal environmental impact report, as a platform for participatory sensing systems research. In Proceedings of the 7th international conference on mobile systems, applications, and services (pp. 55–68). ACM. Mun, M., Reddy, S., Shilton, K., Yau, N., Burke, J., Estrin, D., et al. (2009). Peir, the personal environmental impact report, as a platform for participatory sensing systems research. In Proceedings of the 7th international conference on mobile systems, applications, and services (pp. 55–68). ACM.
34.
go back to reference Paillier, P. (1999). Public-key cryptosystems based on composite degree residuosity classes. In J. Stern (Eds.), Advances in cryptology–EUROCRYPT99. EUROCRYPT 1999. Lecture notes in computer science (Vol. 1592). Berlin: Springer. Paillier, P. (1999). Public-key cryptosystems based on composite degree residuosity classes. In J. Stern (Eds.), Advances in cryptology–EUROCRYPT99. EUROCRYPT 1999. Lecture notes in computer science (Vol. 1592). Berlin: Springer.
35.
go back to reference Popa, R. A., Blumberg, A. J., Balakrishnan, H., & Li, F. H. (2011). Privacy and accountability for location-based aggregate statistics. In Proceedings of the 18th ACM conference on Computer and communications security (pp. 653–666). ACM. Popa, R. A., Blumberg, A. J., Balakrishnan, H., & Li, F. H. (2011). Privacy and accountability for location-based aggregate statistics. In Proceedings of the 18th ACM conference on Computer and communications security (pp. 653–666). ACM.
36.
go back to reference Pyrgelis, A., De Cristofaro, E., & Ross, G. J. (2016). Privacy-friendly mobility analytics using aggregate location data. In Proceedings of the 24th ACM SIGSPATIAL international conference on advances in geographic information systems (p. 34). ACM. Pyrgelis, A., De Cristofaro, E., & Ross, G. J. (2016). Privacy-friendly mobility analytics using aggregate location data. In Proceedings of the 24th ACM SIGSPATIAL international conference on advances in geographic information systems (p. 34). ACM.
37.
go back to reference Riboni, D., & Bettini, C. (2014). Differentially-private release of check-in data for venue recommendation. In Proceedings of IEEE international conference on pervasive computing and communications (pp. 190–198). IEEE. Riboni, D., & Bettini, C. (2014). Differentially-private release of check-in data for venue recommendation. In Proceedings of IEEE international conference on pervasive computing and communications (pp. 190–198). IEEE.
38.
go back to reference Saltzer, J. H., & Schroeder, M. D. (1975). The protection of information in computer systems. Proceedings of the IEEE, 63(9), 1278–1308.CrossRef Saltzer, J. H., & Schroeder, M. D. (1975). The protection of information in computer systems. Proceedings of the IEEE, 63(9), 1278–1308.CrossRef
39.
go back to reference Sweeney, L. (2002). k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(05), 557–570.MathSciNetCrossRefMATH Sweeney, L. (2002). k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(05), 557–570.MathSciNetCrossRefMATH
40.
go back to reference Tang, D., & Ren, J. (2016). A novel delay-aware and privacy-preserving data-forwarding scheme for urban sensing network. IEEE Transactions on Vehicular Technology, 65(4), 2578–2588. Tang, D., & Ren, J. (2016). A novel delay-aware and privacy-preserving data-forwarding scheme for urban sensing network. IEEE Transactions on Vehicular Technology, 65(4), 2578–2588.
41.
go back to reference Thiagarajan, A., Ravindranath, L., LaCurts, K., Madden, S., Balakrishnan, H., Toledo, S., et al. (2009). Vtrack: Accurate, energy-aware road traffic delay estimation using mobile phones. In Proceedings of the 7th ACM conference on embedded networked sensor systems (pp. 85–98). ACM. Thiagarajan, A., Ravindranath, L., LaCurts, K., Madden, S., Balakrishnan, H., Toledo, S., et al. (2009). Vtrack: Accurate, energy-aware road traffic delay estimation using mobile phones. In Proceedings of the 7th ACM conference on embedded networked sensor systems (pp. 85–98). ACM.
42.
go back to reference Vergara-Laurens,Idalides J., Mendez, D., & Labrador, M. A. (2014). Privacy, quality of information, and energy consumption in participatory sensing systems. In Proceedings of IEEE international conference on pervasive computing and communications (pp. 199–207). IEEE. Vergara-Laurens,Idalides J., Mendez, D., & Labrador, M. A. (2014). Privacy, quality of information, and energy consumption in participatory sensing systems. In Proceedings of IEEE international conference on pervasive computing and communications (pp. 199–207). IEEE.
43.
go back to reference Vu, K., Zheng, R., & Gao, J. (2012). Efficient algorithms for k-anonymous location privacy in participatory sensing. In Proceedings of IEEE international conference on computer communications (pp. 2399–2407). IEEE. Vu, K., Zheng, R., & Gao, J. (2012). Efficient algorithms for k-anonymous location privacy in participatory sensing. In Proceedings of IEEE international conference on computer communications (pp. 2399–2407). IEEE.
44.
go back to reference Zhang, X., Yang, Z., Sun, W., Liu, Y., Tang, S., Xing, K., et al. (2016). Incentives for mobile crowd sensing: A survey. IEEE Communications Surveys Tutorials, 18(1), 54–67. Zhang, X., Yang, Z., Sun, W., Liu, Y., Tang, S., Xing, K., et al. (2016). Incentives for mobile crowd sensing: A survey. IEEE Communications Surveys Tutorials, 18(1), 54–67.
45.
go back to reference Zhao, D., Li, X.-Y., & Ma, H.-D. (2014). How to crowdsource tasks truthfully without sacrificing utility: Online incentive mechanisms with budget constraint. In Proceedings of IEEE international conference on computer communications (pp. 1213–1221). IEEE. Zhao, D., Li, X.-Y., & Ma, H.-D. (2014). How to crowdsource tasks truthfully without sacrificing utility: Online incentive mechanisms with budget constraint. In Proceedings of IEEE international conference on computer communications (pp. 1213–1221). IEEE.
Metadata
Title
Participant Density-Independent Location Privacy Protection for Data Aggregation in Mobile Crowd-Sensing
Authors
Jianwei Chen
Huadong Ma
Dong Zhao
David S. L. Wei
Publication date
05-09-2017
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 1/2018
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-017-4891-y

Other articles of this Issue 1/2018

Wireless Personal Communications 1/2018 Go to the issue