Trusted and privacy-preserving sensor data onloading

被引:1
|
作者
Liu, Yin [1 ]
Cruz, Breno Dantas [2 ]
Tilevich, Eli [3 ]
机构
[1] Beijing Univ Technol, Fac Informat Technol, Beijing 100124, Peoples R China
[2] Iowa State Univ, Lab Software Design, Ames, IA USA
[3] Virginia Tech, Software Innovat Lab, Blacksburg, VA USA
基金
美国国家科学基金会; 北京市自然科学基金;
关键词
Data onloading; Adaptive privacy preservation; Sensor data; Trusted middleware; SECURE; INTERNET;
D O I
10.1016/j.comcom.2023.04.027
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To personalize their services (e.g., advertisement, navigation, healthcare), mobile apps collect sensor data. Typically, they upload the collected sensor data to the cloud, which returns the inferred user profiles required to personalize mobile services. However, privacy concerns and network connectivity/congestion issues can render cloud-based processing inapplicable. If different apps collect the same type of sensor data, app providers can collaborate by combining their data collections to infer on-device the user profiles required for personalization. Although major mobile platforms provide on-device data sharing mechanisms, these direct data exchanges provide no privacy protection. As an alternative to direct data sharing, we present differentially privatized sensor data onloading for app providers' collaboration. With our approach, app providers can safely collaborate by using shared sensor data to personalize their mobile services. We realize our approach as a middleware that acts as a trusted intermediary. The middleware aggregates the sensor data contributed by individual apps, which execute statistical queries against the combined datasets. Furthermore, the middleware's adaptive privacy-preserving scheme (1) computes and adds the required amount of noise to the query results so as to balance utility and privacy; (2) introduces a Trust-Data Theory so as to detect and remove spurious data from the combined collections; (3) rewards active contributing app providers so as to incentivize data contribution; (4) integrates a Trusted Execution Environment (TEE) so as to secure all data processing. Our evaluation shows that it is feasible and useful to personalize mobile services while protecting data privacy: queries' execution time is within 10 ms; participants' dissimilar privacy/utility requirements are satisfied; untrustworthy data are effectively detected; mobile services are personalized, and data privacy of both app providers and users are preserved.1
引用
收藏
页码:133 / 151
页数:19
相关论文
共 50 条
  • [1] Privacy-Preserving Data Deduplication on Trusted Processors
    Dang, Hung
    Chang, Ee-Chien
    2017 IEEE 10TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2017, : 66 - 73
  • [2] Privacy-Preserving Data Analysis without Trusted Third Party
    Miyaji, Atsuko
    Takahashi, Tomoka
    Wang, Ping-Lun
    Yamatsuki, Tatsuhiro
    Mimoto, Tomoaki
    2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 710 - 717
  • [3] Privacy-Preserving Sharing of Mobile Sensor Data
    Liu, Yin
    Cruz, Breno Dantas
    Tilevich, Eli
    MOBILE COMPUTING, APPLICATIONS, AND SERVICES, MOBICASE 2021, 2022, 434 : 19 - 41
  • [4] Privacy-Preserving Data Aggregation in Wireless Sensor
    Madan, Surbhi
    Kumar, Deepak
    Agnihotri, Anamika
    PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON SYSTEM MODELING & ADVANCEMENT IN RESEARCH TRENDS (SMART), 2018, : 165 - 167
  • [5] Privacy-preserving raw data collection without a trusted authority for IoT
    Liu, Yi-Ning
    Wang, Yan-Ping
    Wang, Xiao-Fen
    Xia, Zhe
    Xu, Jing-Fang
    COMPUTER NETWORKS, 2019, 148 : 340 - 348
  • [6] A Trusted and Privacy-Preserving Internet of Mobile Energy
    Jurdak, Raja
    Dorri, Ali
    Vilathgamuwa, Mahinda
    IEEE COMMUNICATIONS MAGAZINE, 2021, 59 (06) : 89 - 95
  • [7] Blockchain for the IoT: Privacy-Preserving Protection of Sensor Data
    Chanson, Mathieu
    Bogner, Andreas
    Bilgeri, Dominik
    Fleisch, Elgar
    Wortmann, Felix
    JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2019, 20 (09): : 1274 - 1309
  • [8] Communication-Efficient and Privacy-Preserving Data Aggregation without Trusted Authority
    Gong, Xuhui
    Hua, Qiang-Sheng
    Qian, Lixiang
    Yu, Dongxiao
    Jin, Hai
    IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2018), 2018, : 1250 - 1258
  • [9] A Framework for Privacy-Preserving Genomic Data Analysis Using Trusted Execution Environments
    Asvadishirehjini, Aref
    Kantarcioglu, Murat
    Malin, Bradley
    2020 SECOND IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2020), 2020, : 138 - 147
  • [10] A Trusted Approach for Decentralised and Privacy-Preserving Identity Management
    Torres Moreno, Rafael
    Garcia-Rodriguez, Jesus
    Bernal Bernabe, Jorge
    Skarmeta, Antonio
    IEEE ACCESS, 2021, 9 : 105788 - 105804