Skip to main content

2016 | OriginalPaper | Buchkapitel

Privacy-Enhanced Android for Smart Cities Applications

verfasst von : Matthew Lepinski, David Levin, Daniel McCarthy, Ronald Watro, Michael Lack, Daniel Hallenbeck, David Slater

Erschienen in: Smart City 360°

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Many Smart Cities applications will collect data from and otherwise interact with the mobile devices of individual users. In the past, it has been difficult to assure users that smart applications will protect their private data and use the data only for the application’s intended purpose. The current paper describes a plan for developing Privacy-Enhanced Android, an extension of the current Android OS with new privacy features based on homomorphic and functional encryption and Secure Multiparty Computation. Our goal is to make these advances in privacy-preserving technologies available to the mobile developer community, so that they can be broadly applied and enable the impactful social utility envisioned by Smart Cities.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
3.
Zurück zum Zitat Yao, A.C.: Protocols for secure computations. In: FOCS, 23rd Annual Symposium on Foundations of Computer Science (FOCS 1982), pp. 160–164. doi:10.1109/SFCS.1982.88 Yao, A.C.: Protocols for secure computations. In: FOCS, 23rd Annual Symposium on Foundations of Computer Science (FOCS 1982), pp. 160–164. doi:10.​1109/​SFCS.​1982.​88
4.
Zurück zum Zitat Huang, Y., Chapman, P., Evans, D.: Privacy-preserving applications on smartphones. In: 6th USENIX Workshop on Hot Topics in Security (HotSec 2011), San Francisco, August 2011 Huang, Y., Chapman, P., Evans, D.: Privacy-preserving applications on smartphones. In: 6th USENIX Workshop on Hot Topics in Security (HotSec 2011), San Francisco, August 2011
5.
Zurück zum Zitat Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Symposium on the Theory of Computing (STOC), pp. 169–178 (2009) Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Symposium on the Theory of Computing (STOC), pp. 169–178 (2009)
6.
Zurück zum Zitat Boneh, D., Sahai, A., Waters, B.: Functional encryption: definitions and challenges. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 253–273. Springer, Heidelberg (2011)CrossRef Boneh, D., Sahai, A., Waters, B.: Functional encryption: definitions and challenges. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 253–273. Springer, Heidelberg (2011)CrossRef
7.
Zurück zum Zitat Do, Q., Martini, B., Choo, K.-K.R.: Enhancing user privacy on Android mobile devices via permissions removal. In: 2014 47th Hawaii International Conference on System Sciences (HICSS). IEEE (2014) Do, Q., Martini, B., Choo, K.-K.R.: Enhancing user privacy on Android mobile devices via permissions removal. In: 2014 47th Hawaii International Conference on System Sciences (HICSS). IEEE (2014)
8.
Zurück zum Zitat Kelley, P.G., Consolvo, S., Cranor, L.F., Jung, J., Sadeh, N., Wetherall, D.: A conundrum of permissions: installing applications on an android smartphone. In: Blyth, J., Dietrich, S., Camp, L. (eds.) FC 2012. LNCS, vol. 7398, pp. 68–79. Springer, Heidelberg (2012)CrossRef Kelley, P.G., Consolvo, S., Cranor, L.F., Jung, J., Sadeh, N., Wetherall, D.: A conundrum of permissions: installing applications on an android smartphone. In: Blyth, J., Dietrich, S., Camp, L. (eds.) FC 2012. LNCS, vol. 7398, pp. 68–79. Springer, Heidelberg (2012)CrossRef
9.
Zurück zum Zitat Felt, A.P. et al.: Android permissions: user attention, comprehension, and behavior. In: Proceedings of the Eighth Symposium on Usable Privacy and Security. ACM (2012) Felt, A.P. et al.: Android permissions: user attention, comprehension, and behavior. In: Proceedings of the Eighth Symposium on Usable Privacy and Security. ACM (2012)
10.
Zurück zum Zitat Pantel, P., Lin, T., Gamon, M.: Mining entity types from query logs via user intent modeling. In: Proceedings of the 50th Annual Meeting of the Association for Computational Linguistics: Long Papers, vol. 1. Association for Computational Linguistics (2012) Pantel, P., Lin, T., Gamon, M.: Mining entity types from query logs via user intent modeling. In: Proceedings of the 50th Annual Meeting of the Association for Computational Linguistics: Long Papers, vol. 1. Association for Computational Linguistics (2012)
11.
Zurück zum Zitat Bugiel, S., Heuser, S., Sadeghi, A.-R.: Flexible and fine-grained mandatory access control on android for diverse security and privacy policies. In: Usenix security (2013) Bugiel, S., Heuser, S., Sadeghi, A.-R.: Flexible and fine-grained mandatory access control on android for diverse security and privacy policies. In: Usenix security (2013)
12.
Zurück zum Zitat Wagner, D.T. et al.: Device analyzer: a privacy-aware platform to support research on the Android ecosystem. In: Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks. ACM (2015) Wagner, D.T. et al.: Device analyzer: a privacy-aware platform to support research on the Android ecosystem. In: Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks. ACM (2015)
14.
Zurück zum Zitat Carter, H., Amrutkar, C., Dacosta, I., Traynor, P.: For your phone only: custom protocols for efficient secure function evaluation on mobile devices. Secur. Comm. Netw. 7, 1165–1176. doi:10.1002/sec.851 Carter, H., Amrutkar, C., Dacosta, I., Traynor, P.: For your phone only: custom protocols for efficient secure function evaluation on mobile devices. Secur. Comm. Netw. 7, 1165–1176. doi:10.​1002/​sec.​851
15.
Zurück zum Zitat Carter, H., Mood, B., Traynor, P., Butler, K.: Secure Outsourced Garbled Circuit Evaluation for Mobile Devices. In: Proceedings of the 22nd USENIX Security Symposium, August 2013, Washington, D.C. (2013) Carter, H., Mood, B., Traynor, P., Butler, K.: Secure Outsourced Garbled Circuit Evaluation for Mobile Devices. In: Proceedings of the 22nd USENIX Security Symposium, August 2013, Washington, D.C. (2013)
16.
Zurück zum Zitat Bogetoft, P., et al.: Secure multiparty computation goes live. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 325–343. Springer, Heidelberg (2009)CrossRef Bogetoft, P., et al.: Secure multiparty computation goes live. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 325–343. Springer, Heidelberg (2009)CrossRef
17.
Zurück zum Zitat Peng, H. et al.: Using probabilistic generative models for ranking risks of android apps. In: Proceedings of the 2012 ACM Conference on Computer and Communications security. ACM (2012) Peng, H. et al.: Using probabilistic generative models for ranking risks of android apps. In: Proceedings of the 2012 ACM Conference on Computer and Communications security. ACM (2012)
18.
Zurück zum Zitat Roy, R.S. et al.: Discovering and Understanding Word Level User Intent in Web Search Queries. Web Semantics: Science, Services and Agents on the World Wide Web (2014) Roy, R.S. et al.: Discovering and Understanding Word Level User Intent in Web Search Queries. Web Semantics: Science, Services and Agents on the World Wide Web (2014)
19.
Zurück zum Zitat Smith, T.F., Waterman, M.S.: Identification of common molecular subsequences. J. Mol. Biol. 147, 195–197 (1981)CrossRef Smith, T.F., Waterman, M.S.: Identification of common molecular subsequences. J. Mol. Biol. 147, 195–197 (1981)CrossRef
Metadaten
Titel
Privacy-Enhanced Android for Smart Cities Applications
verfasst von
Matthew Lepinski
David Levin
Daniel McCarthy
Ronald Watro
Michael Lack
Daniel Hallenbeck
David Slater
Copyright-Jahr
2016
DOI
https://doi.org/10.1007/978-3-319-33681-7_6

Premium Partner