Trusted and privacy-preserving sensor data onloading

被引:1
|
作者
Liu, Yin [1 ]
Cruz, Breno Dantas [2 ]
Tilevich, Eli [3 ]
机构
[1] Beijing Univ Technol, Fac Informat Technol, Beijing 100124, Peoples R China
[2] Iowa State Univ, Lab Software Design, Ames, IA USA
[3] Virginia Tech, Software Innovat Lab, Blacksburg, VA USA
基金
美国国家科学基金会; 北京市自然科学基金;
关键词
Data onloading; Adaptive privacy preservation; Sensor data; Trusted middleware; SECURE; INTERNET;
D O I
10.1016/j.comcom.2023.04.027
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To personalize their services (e.g., advertisement, navigation, healthcare), mobile apps collect sensor data. Typically, they upload the collected sensor data to the cloud, which returns the inferred user profiles required to personalize mobile services. However, privacy concerns and network connectivity/congestion issues can render cloud-based processing inapplicable. If different apps collect the same type of sensor data, app providers can collaborate by combining their data collections to infer on-device the user profiles required for personalization. Although major mobile platforms provide on-device data sharing mechanisms, these direct data exchanges provide no privacy protection. As an alternative to direct data sharing, we present differentially privatized sensor data onloading for app providers' collaboration. With our approach, app providers can safely collaborate by using shared sensor data to personalize their mobile services. We realize our approach as a middleware that acts as a trusted intermediary. The middleware aggregates the sensor data contributed by individual apps, which execute statistical queries against the combined datasets. Furthermore, the middleware's adaptive privacy-preserving scheme (1) computes and adds the required amount of noise to the query results so as to balance utility and privacy; (2) introduces a Trust-Data Theory so as to detect and remove spurious data from the combined collections; (3) rewards active contributing app providers so as to incentivize data contribution; (4) integrates a Trusted Execution Environment (TEE) so as to secure all data processing. Our evaluation shows that it is feasible and useful to personalize mobile services while protecting data privacy: queries' execution time is within 10 ms; participants' dissimilar privacy/utility requirements are satisfied; untrustworthy data are effectively detected; mobile services are personalized, and data privacy of both app providers and users are preserved.1
引用
收藏
页码:133 / 151
页数:19
相关论文
共 50 条
  • [21] Aggregate in my way: Privacy-preserving data aggregation without trusted authority in ICN
    Xu, Chang
    Zhang, Lvhan
    Zhu, Liehuang
    Zhang, Chuan
    Du, Xiaojiang
    Guizani, Mohsen
    Sharif, Kashif
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 111 : 107 - 116
  • [22] Privacy-Preserving Multidimensional Data Aggregation Scheme Without Trusted Authority in Smart Grid
    Zuo, Xiangjian
    Li, Lixiang
    Peng, Haipeng
    Luo, Shoushan
    Yang, Yixian
    IEEE SYSTEMS JOURNAL, 2021, 15 (01): : 395 - 406
  • [23] An Efficient Privacy-Preserving Data Aggregation Scheme without Trusted Authority in Smart Grid
    Zhao, Xinyu
    Li, Jinguo
    Zhao, Na
    Meng, Ping
    International Journal of Network Security, 2022, 24 (05) : 896 - 903
  • [24] Privacy-preserving credentials upon trusted computing augmented servers
    Yang, Yanjiang
    Deng, Robert H.
    Bao, Feng
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2007, 4464 : 177 - +
  • [25] Secure and Privacy-Preserving Body Sensor Data Collection and Query Scheme
    Zhu, Hui
    Gao, Lijuan
    Li, Hui
    SENSORS, 2016, 16 (02)
  • [26] Latent Representation Learning and Manipulation for Privacy-Preserving Sensor Data Analytics
    Hajihassani, Omid
    Ardakanian, Omid
    Khazaei, Hamzeh
    2020 IEEE SECOND WORKSHOP ON MACHINE LEARNING ON EDGE IN SENSOR SYSTEMS (SENSYS-ML 2020), 2020, : 7 - 12
  • [27] Privacy-preserving Technology for Secure Utilization of Sensor Data (Extended Abstract)
    Izu, Tetsuya
    Ogura, Takao
    Sakemi, Yumi
    Takenaka, Masahiko
    Tsuda, Hiroshi
    2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2014, : 583 - 583
  • [28] A Security Framework for Privacy-Preserving Data Aggregation in Wireless Sensor Networks
    Chan, Aldar C-F.
    Castelluccia, Claude
    ACM TRANSACTIONS ON SENSOR NETWORKS, 2011, 7 (04)
  • [29] Privacy-Preserving Data Aggregation Protocols for Wireless Sensor Networks: A Survey
    Bista, Rabindra
    Chang, Jae-Woo
    SENSORS, 2010, 10 (05) : 4577 - 4601
  • [30] Research of privacy-preserving data aggregation algorithm for wireless sensor network
    Yang Lei
    Wu Jue
    Liu Feng
    Peng Lingxi
    INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2014, 16 (01) : 41 - 47