Skip to main content

2016 | OriginalPaper | Buchkapitel

Enabling Collaborative Privacy in User-Generated Emergency Reports

verfasst von : Amna Qureshi, Helena Rifà-Pous, David Megías

Erschienen in: Privacy in Statistical Databases

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Witnesses are of the utmost importance in emergency systems since they can trigger timely location-based status alerts. However, their collaboration with the authorities can get impaired for the fear of the people of being involved with someone, some place, or even with the same cause of the emergency. Anonymous reporting solutions can encourage the witnesses, but they also pose a threat of system collapse if the authority receives many fake reports. In this paper, we propose an emergency reporting system that ensures the anonymity of honest witnesses but is able to disclose the identity and punish the malicious ones. The system is designed over an online social network that facilitates the indistinguishability of the witness among a group of users. We use a game-theoretic approach based on the co-privacy (co-utility) principles to encourage the users of the network to participate in the protocol. We also use discernible ring signatures to provide the property of conditional anonymity. In addition, the system is designed to provide rewards to a witness and his/her group members in a privacy-preserving manner.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Literatur
3.
Zurück zum Zitat Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: Proceedings of the 1st ACM Conference on Computer and Communications Security, CCS 1993, NY, USA, pp. 62–73. ACM, New York (1993) Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: Proceedings of the 1st ACM Conference on Computer and Communications Security, CCS 1993, NY, USA, pp. 62–73. ACM, New York (1993)
4.
Zurück zum Zitat Camenisch, J.L.: Efficient and generalized group signatures. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 465–479. Springer, Heidelberg (1997)CrossRef Camenisch, J.L.: Efficient and generalized group signatures. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 465–479. Springer, Heidelberg (1997)CrossRef
5.
Zurück zum Zitat Committe, E.: False emergency calls. Operations Document 3.1.2, European Emergency Number Association (EENA) (2011) Committe, E.: False emergency calls. Operations Document 3.1.2, European Emergency Number Association (EENA) (2011)
6.
Zurück zum Zitat Domingo-Ferrer, J.: Coprivacy: an introduction to the theory and applications of cooperative privacy. SORT Stat. Oper. Res. Trans. 35, 25–40 (2011)MathSciNet Domingo-Ferrer, J.: Coprivacy: an introduction to the theory and applications of cooperative privacy. SORT Stat. Oper. Res. Trans. 35, 25–40 (2011)MathSciNet
7.
Zurück zum Zitat Domingo-Ferrer, J., Gonzàlez-Nicolàs, U.: Rational behavior in peer-to-peer profile obfuscation for anonymous keyword search: the multi-hop scenario. Inf. Sci. 200, 123–134 (2012)CrossRef Domingo-Ferrer, J., Gonzàlez-Nicolàs, U.: Rational behavior in peer-to-peer profile obfuscation for anonymous keyword search: the multi-hop scenario. Inf. Sci. 200, 123–134 (2012)CrossRef
8.
Zurück zum Zitat Domingo-Ferrer, J., Sànchez, D., Soria-Comas, J.: Co-utility-self-enforcing collaborative protocols with mutual help. Prog. AI 5(2), 105–110 (2016) Domingo-Ferrer, J., Sànchez, D., Soria-Comas, J.: Co-utility-self-enforcing collaborative protocols with mutual help. Prog. AI 5(2), 105–110 (2016)
9.
Zurück zum Zitat Domingo-Ferrer, J.: Coprivacy: towards a theory of sustainable privacy. In: Domingo-Ferrer, J., Magkos, E. (eds.) PSD 2010. LNCS, vol. 6344, pp. 258–268. Springer, Heidelberg (2010)CrossRef Domingo-Ferrer, J.: Coprivacy: towards a theory of sustainable privacy. In: Domingo-Ferrer, J., Magkos, E. (eds.) PSD 2010. LNCS, vol. 6344, pp. 258–268. Springer, Heidelberg (2010)CrossRef
10.
Zurück zum Zitat Domingo-Ferrer, J., Bras-Amorós, M., Wu, Q., Manjón, J.: User-private information retrieval based on a peer-to-peer community. Data Knowl. Eng. 68(11), 1237–1252 (2009)CrossRef Domingo-Ferrer, J., Bras-Amorós, M., Wu, Q., Manjón, J.: User-private information retrieval based on a peer-to-peer community. Data Knowl. Eng. 68(11), 1237–1252 (2009)CrossRef
11.
Zurück zum Zitat Domingo-Ferrer, J., Megías, D.: Distributed multicast of fingerprinted content based on a rational peer-to-peer community. Comput. Commun. 36(5), 542–550 (2013)CrossRef Domingo-Ferrer, J., Megías, D.: Distributed multicast of fingerprinted content based on a rational peer-to-peer community. Comput. Commun. 36(5), 542–550 (2013)CrossRef
12.
Zurück zum Zitat Furtado, V., Ayres, L., de Oliveira, M., Vasconcelos, E., Caminha, C., D’Orleans, J., Belchior, M.: Collective intelligence in law enforcement - the wikicrimes system. Inf. Sci. 180, 4–17 (2010)CrossRef Furtado, V., Ayres, L., de Oliveira, M., Vasconcelos, E., Caminha, C., D’Orleans, J., Belchior, M.: Collective intelligence in law enforcement - the wikicrimes system. Inf. Sci. 180, 4–17 (2010)CrossRef
13.
Zurück zum Zitat Klonowski, M., Krzywiecki, Ł., Kutyłowski, M., Lauks, A.: Step-out ring signatures. In: Ochmański, E., Tyszkiewicz, J. (eds.) MFCS 2008. LNCS, vol. 5162, pp. 431–442. Springer, Heidelberg (2008)CrossRef Klonowski, M., Krzywiecki, Ł., Kutyłowski, M., Lauks, A.: Step-out ring signatures. In: Ochmański, E., Tyszkiewicz, J. (eds.) MFCS 2008. LNCS, vol. 5162, pp. 431–442. Springer, Heidelberg (2008)CrossRef
14.
Zurück zum Zitat Kumar, S., Agrawal, S., Venkatesan, R., Lokam, S.V., Rangan, C.P.: Threshold discernible ring signatures. In: Obaidat, M.S., Tsihrintzis, G.A., Filipe, J. (eds.) ICETE 2010. CCIS, vol. 222, pp. 259–273. Springer, Heidelberg (2012)CrossRef Kumar, S., Agrawal, S., Venkatesan, R., Lokam, S.V., Rangan, C.P.: Threshold discernible ring signatures. In: Obaidat, M.S., Tsihrintzis, G.A., Filipe, J. (eds.) ICETE 2010. CCIS, vol. 222, pp. 259–273. Springer, Heidelberg (2012)CrossRef
15.
Zurück zum Zitat Meier, P.: Digital Humanitarians: How Big Data is Changing the Face of Humanitarian Response. CRC Press, Boca Raton (2015). chap. 4CrossRef Meier, P.: Digital Humanitarians: How Big Data is Changing the Face of Humanitarian Response. CRC Press, Boca Raton (2015). chap. 4CrossRef
16.
Zurück zum Zitat Namahoot, C.S., Brückner, M.: SPEARS: smart phone emergency and accident reporting system using social network service and Dijkstra’s algorithm on Android. In: Kim, K.J., Wattanapongsakorn, N. (eds.) Mobile and Wireless Technology 2015. LNEE, vol. 310, pp. 173–182. Springer, Heidelberg (2015)CrossRef Namahoot, C.S., Brückner, M.: SPEARS: smart phone emergency and accident reporting system using social network service and Dijkstra’s algorithm on Android. In: Kim, K.J., Wattanapongsakorn, N. (eds.) Mobile and Wireless Technology 2015. LNEE, vol. 310, pp. 173–182. Springer, Heidelberg (2015)CrossRef
17.
Zurück zum Zitat Nisan, N., Roughgarden, T., Tardos, E., Vazirani, V.V.: Algorithmic Game Theory. Cambridge University Press, New York (2007)CrossRefMATH Nisan, N., Roughgarden, T., Tardos, E., Vazirani, V.V.: Algorithmic Game Theory. Cambridge University Press, New York (2007)CrossRefMATH
18.
Zurück zum Zitat Okolloh, O.: Ushahidi or ‘testimony’: web 2.0 tools for crowdsourcing crisis information. Participatory Learn. Action 59, 65–70 (2009) Okolloh, O.: Ushahidi or ‘testimony’: web 2.0 tools for crowdsourcing crisis information. Participatory Learn. Action 59, 65–70 (2009)
19.
Zurück zum Zitat Reed, M., Syverson, P., Goldschlag, D.: Anonymous connections and onion routing. IEEE J. Sel. Areas Commun. 16(4), 482–494 (1998)CrossRef Reed, M., Syverson, P., Goldschlag, D.: Anonymous connections and onion routing. IEEE J. Sel. Areas Commun. 16(4), 482–494 (1998)CrossRef
20.
Zurück zum Zitat Rivest, R.L., Shamir, A., Tauman, Y.: How to leak a secret. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 552–565. Springer, Heidelberg (2001)CrossRef Rivest, R.L., Shamir, A., Tauman, Y.: How to leak a secret. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 552–565. Springer, Heidelberg (2001)CrossRef
Metadaten
Titel
Enabling Collaborative Privacy in User-Generated Emergency Reports
verfasst von
Amna Qureshi
Helena Rifà-Pous
David Megías
Copyright-Jahr
2016
DOI
https://doi.org/10.1007/978-3-319-45381-1_19

Premium Partner