Skip to main content
Erschienen in: GeoInformatica 1/2014

01.01.2014

User-side adaptive protection of location privacy in participatory sensing

verfasst von: Berker Agir, Thanasis G. Papaioannou, Rammohan Narendula, Karl Aberer, Jean-Pierre Hubaux

Erschienen in: GeoInformatica | Ausgabe 1/2014

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The participatory sensing paradigm, through the growing availability of cheap sensors in mobile devices, enables applications of great social and business interest, e.g., electrosmog exposure measurement and early earthquake detection. However, users’ privacy concerns regarding their activity traces need to be adequately addressed as well. The existing static privacy-enabling approaches, which hide or obfuscate data, offer some protection at the expense of data value. These approaches do not offer privacy guarantees and heterogeneous user privacy requirements cannot be met by them. In this paper, we propose a user-side privacy-protection scheme; it adaptively adjusts its parameters, in order to meet personalized location-privacy protection requirements against adversaries in a measurable manner. As proved by simulation experiments with artificial- and real-data traces, when feasible, our approach not only always satisfies personal location-privacy concerns, but also maximizes data utility (in terms of error, data availability, area coverage), as compared to static privacy-protection schemes.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
D(loc 1, loc 2) can be the absolute distance function, in which case the expected distortion would be in km or meters. We choose to normalize it for the sake of presenting results with a uniform upper bound on the privacy level.
 
2
Note that the size of the obfuscation area at time t 3 is 2 × 2 (as shown in Fig. 4b), therefore there are 4 vertices corresponding to 4 reported locations at this time instant.
 
Literatur
1.
Zurück zum Zitat Canetti R, Feige U, Goldreich O, Naor M (1996) Adaptively secure multi-party computation. In: Proc. of Symposium on Theory of Computing (STOC) Canetti R, Feige U, Goldreich O, Naor M (1996) Adaptively secure multi-party computation. In: Proc. of Symposium on Theory of Computing (STOC)
2.
Zurück zum Zitat Christin D, Reinhardt A, Kanhere SS, Hollick M (2011) A survey on privacy in mobile participatory sensing applications. J Syst Softw 84(11):1928–1946CrossRef Christin D, Reinhardt A, Kanhere SS, Hollick M (2011) A survey on privacy in mobile participatory sensing applications. J Syst Softw 84(11):1928–1946CrossRef
3.
Zurück zum Zitat Christin D, Rosskopf C, Hollick M, Martucci LA, Kanhere SS (2012) IncogniSense: an anonymity-preserving reputation framework for participatory sensing applications. In: Proc. of IEEE conference on Pervasive Computing and Communications (PerCom) Christin D, Rosskopf C, Hollick M, Martucci LA, Kanhere SS (2012) IncogniSense: an anonymity-preserving reputation framework for participatory sensing applications. In: Proc. of IEEE conference on Pervasive Computing and Communications (PerCom)
4.
Zurück zum Zitat Das T, Mohan P, Padmanabhan VN, Ramjee R, Sharma A (2010) PRISM: platform for remote sensing using smartphones. In: Proc. of conference on Mobile Systems, Applications, and Services (MobiSys) Das T, Mohan P, Padmanabhan VN, Ramjee R, Sharma A (2010) PRISM: platform for remote sensing using smartphones. In: Proc. of conference on Mobile Systems, Applications, and Services (MobiSys)
5.
Zurück zum Zitat De Cristofaro E, Soriente C (2011) Short paper: pepsi—privacy-enhanced participatory sensing infrastructure. In: Proc. of 4th ACM conference on Wireless Network Security (WiSec) De Cristofaro E, Soriente C (2011) Short paper: pepsi—privacy-enhanced participatory sensing infrastructure. In: Proc. of 4th ACM conference on Wireless Network Security (WiSec)
6.
Zurück zum Zitat Diaz C, Seys S, Claessens J, Preneel B (2002) Towards measuring anonymity. In: Proc. of conference on Privacy Enhancing Technologies (PET) Diaz C, Seys S, Claessens J, Preneel B (2002) Towards measuring anonymity. In: Proc. of conference on Privacy Enhancing Technologies (PET)
7.
Zurück zum Zitat Dua A, Bulusu N, Feng WC, Hu W (2009) Towards trustworthy participatory sensing. In: Proc. of USENIX conference on Hot Topics in Security (HotSec) Dua A, Bulusu N, Feng WC, Hu W (2009) Towards trustworthy participatory sensing. In: Proc. of USENIX conference on Hot Topics in Security (HotSec)
8.
Zurück zum Zitat Dwork C (2006) Differential privacy. In: International colloquium on automata, languages and programming. Springer, pp 1–12 Dwork C (2006) Differential privacy. In: International colloquium on automata, languages and programming. Springer, pp 1–12
9.
Zurück zum Zitat Gedik BLL (2008) Protecting location privacy with personalized k-anonymity: architecture and algorithms. IEEE Trans Mob Comput 7(1):1–18CrossRef Gedik BLL (2008) Protecting location privacy with personalized k-anonymity: architecture and algorithms. IEEE Trans Mob Comput 7(1):1–18CrossRef
10.
Zurück zum Zitat Groat MM, Edwards B, Horey J, He W, Forrest S (2012) Enhancing privacy in participatory sensing applications with multidimensional data. In: Proc. of IEEE conference on Pervasive Computing and Communications (PerCom) Groat MM, Edwards B, Horey J, He W, Forrest S (2012) Enhancing privacy in participatory sensing applications with multidimensional data. In: Proc. of IEEE conference on Pervasive Computing and Communications (PerCom)
11.
Zurück zum Zitat Hu H, Xu J (2009) Non-exposure location anonymity. In: Proc. of IEEE International Conference on Data Engineering (ICDE) Hu H, Xu J (2009) Non-exposure location anonymity. In: Proc. of IEEE International Conference on Data Engineering (ICDE)
12.
Zurück zum Zitat Jadliwala M, Freudiger J, Aad I, Hubaux J-P, Niemi V (2011) Privacy-triggered communications in pervasive social networks. In: Proc. of IEEE international symposium on World of Wireless, Mobile and Multimedia Networks (WoWMoM) Jadliwala M, Freudiger J, Aad I, Hubaux J-P, Niemi V (2011) Privacy-triggered communications in pervasive social networks. In: Proc. of IEEE international symposium on World of Wireless, Mobile and Multimedia Networks (WoWMoM)
13.
Zurück zum Zitat Komninakis C (2003) A fast and accurate Rayleigh fading simulator. In: Proc. of IEEE Global Telecommunications Conference (GLOBECOM) Komninakis C (2003) A fast and accurate Rayleigh fading simulator. In: Proc. of IEEE Global Telecommunications Conference (GLOBECOM)
14.
Zurück zum Zitat Krause A, Horvitz E, Kansal A, Zhao F (2008) Toward community sensing. In: Proc. of international conference on Information Processing in Sensor Networks (IPSN) Krause A, Horvitz E, Kansal A, Zhao F (2008) Toward community sensing. In: Proc. of international conference on Information Processing in Sensor Networks (IPSN)
16.
Zurück zum Zitat Lu H, Pan W, Lane ND, Choudhury T, Campbell AT (2009) SoundSense: sound sensing for people-centric applications on mobile phones. In: Proc. of conference on Mobile Systems, Applications, and Services (MobiSys) Lu H, Pan W, Lane ND, Choudhury T, Campbell AT (2009) SoundSense: sound sensing for people-centric applications on mobile phones. In: Proc. of conference on Mobile Systems, Applications, and Services (MobiSys)
17.
Zurück zum Zitat Minami K, Borisov N (2010) Protecting location privacy against inference attacks. In: Proc. of ACM Workshop on Privacy in the Wlectronic Society (WPES) Minami K, Borisov N (2010) Protecting location privacy against inference attacks. In: Proc. of ACM Workshop on Privacy in the Wlectronic Society (WPES)
18.
Zurück zum Zitat Mun M, Hao S, Mishra N, Shilton K, Burke J, Estrin D, Hansen M, Govindan R (2010) Personal data vaults: a locus of control for personal data streams. In: Proc. of ACM Conference on Emerging Networking Experiments and Technologies (Co-NEXT) Mun M, Hao S, Mishra N, Shilton K, Burke J, Estrin D, Hansen M, Govindan R (2010) Personal data vaults: a locus of control for personal data streams. In: Proc. of ACM Conference on Emerging Networking Experiments and Technologies (Co-NEXT)
19.
Zurück zum Zitat Mun M, Reddy S, Shilton K, Yau N, Burke J, Estrin D, Hansen M, Howard E, West R, Boda P (2009) PEIR, the personal environmental impact report, as a platform for participatory sensing systems research. In: Proc. of conference on Mobile Systems, Applications, and Services (MobiSys) Mun M, Reddy S, Shilton K, Yau N, Burke J, Estrin D, Hansen M, Howard E, West R, Boda P (2009) PEIR, the personal environmental impact report, as a platform for participatory sensing systems research. In: Proc. of conference on Mobile Systems, Applications, and Services (MobiSys)
21.
Zurück zum Zitat Pingley A, Yu W, Zhang N, Fu X, Zhao W (2009) CAP: a context-aware privacy protection system for location-based services. In: Proc. of IEEE International Conference on Distributed Computing Systems (ICDCS) Pingley A, Yu W, Zhang N, Fu X, Zhao W (2009) CAP: a context-aware privacy protection system for location-based services. In: Proc. of IEEE International Conference on Distributed Computing Systems (ICDCS)
22.
Zurück zum Zitat Serjantov A, Danezis G (2002) Towards an information theoretic metric for anonymity. In: Proc. of conference on Privacy Enhancing Technologies (PET) Serjantov A, Danezis G (2002) Towards an information theoretic metric for anonymity. In: Proc. of conference on Privacy Enhancing Technologies (PET)
23.
Zurück zum Zitat Shankar P, Ganapathy V, Iftode L (2009) Privately querying location-based services with SybilQuery. In: Proc. of conference on Ubiqutious Computing (UbiComp) Shankar P, Ganapathy V, Iftode L (2009) Privately querying location-based services with SybilQuery. In: Proc. of conference on Ubiqutious Computing (UbiComp)
24.
Zurück zum Zitat Shokri R, Freudiger J, Jadliwala M, Hubaux J-P (2009) A distortion-based metric for location privacy. In: Proc. of ACM Workshop on Privacy in the Electronic Society (WPES) Shokri R, Freudiger J, Jadliwala M, Hubaux J-P (2009) A distortion-based metric for location privacy. In: Proc. of ACM Workshop on Privacy in the Electronic Society (WPES)
25.
Zurück zum Zitat Shokri R, Theodorakopoulos G, Danezis G, Hubaux J-P, Le Boudec J-Y (2011) Quantifying location privacy: the case of sporadic location exposure. In: Proc. of Privacy Enhancing Technologies Symposium (PETS) Shokri R, Theodorakopoulos G, Danezis G, Hubaux J-P, Le Boudec J-Y (2011) Quantifying location privacy: the case of sporadic location exposure. In: Proc. of Privacy Enhancing Technologies Symposium (PETS)
26.
Zurück zum Zitat Shokri R, Theodorakopoulos G, Le Boudec J-Y, Hubaux J-P (2011) Quantifying location privacy. In: Proc. of IEEE symposium on Security and Privacy (S&P) Shokri R, Theodorakopoulos G, Le Boudec J-Y, Hubaux J-P (2011) Quantifying location privacy. In: Proc. of IEEE symposium on Security and Privacy (S&P)
27.
Zurück zum Zitat Vu K, Zheng R, Gao J (2012) Efficient algorithms for K-anonymous location privacy in participatory sensing. In: Proc. of IEEE conference om computer communications (IEEE INFOCOM) Vu K, Zheng R, Gao J (2012) Efficient algorithms for K-anonymous location privacy in participatory sensing. In: Proc. of IEEE conference om computer communications (IEEE INFOCOM)
28.
Zurück zum Zitat Westin AF (1967) Privacy and freedom. Atheneum Westin AF (1967) Privacy and freedom. Atheneum
30.
Zurück zum Zitat Xiao X, Tao Y (2006) Personalized privacy preservation. In: Proc. of ACM SIGMOD conference on management of data, SIGMOD ’06 Xiao X, Tao Y (2006) Personalized privacy preservation. In: Proc. of ACM SIGMOD conference on management of data, SIGMOD ’06
31.
Zurück zum Zitat Yan Z, Chakraborty D, Parent C, Spaccapietra S, Aberer K (2011) SeMiTri: a framework for semantic annotation of heterogeneous trajectories. In: Proc. of international conference on Extending Database Technology (EDBT) Yan Z, Chakraborty D, Parent C, Spaccapietra S, Aberer K (2011) SeMiTri: a framework for semantic annotation of heterogeneous trajectories. In: Proc. of international conference on Extending Database Technology (EDBT)
Metadaten
Titel
User-side adaptive protection of location privacy in participatory sensing
verfasst von
Berker Agir
Thanasis G. Papaioannou
Rammohan Narendula
Karl Aberer
Jean-Pierre Hubaux
Publikationsdatum
01.01.2014
Verlag
Springer US
Erschienen in
GeoInformatica / Ausgabe 1/2014
Print ISSN: 1384-6175
Elektronische ISSN: 1573-7624
DOI
https://doi.org/10.1007/s10707-013-0193-z

Weitere Artikel der Ausgabe 1/2014

GeoInformatica 1/2014 Zur Ausgabe