Trusted and privacy-preserving sensor data onloading

被引:1
|
作者
Liu, Yin [1 ]
Cruz, Breno Dantas [2 ]
Tilevich, Eli [3 ]
机构
[1] Beijing Univ Technol, Fac Informat Technol, Beijing 100124, Peoples R China
[2] Iowa State Univ, Lab Software Design, Ames, IA USA
[3] Virginia Tech, Software Innovat Lab, Blacksburg, VA USA
基金
美国国家科学基金会; 北京市自然科学基金;
关键词
Data onloading; Adaptive privacy preservation; Sensor data; Trusted middleware; SECURE; INTERNET;
D O I
10.1016/j.comcom.2023.04.027
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To personalize their services (e.g., advertisement, navigation, healthcare), mobile apps collect sensor data. Typically, they upload the collected sensor data to the cloud, which returns the inferred user profiles required to personalize mobile services. However, privacy concerns and network connectivity/congestion issues can render cloud-based processing inapplicable. If different apps collect the same type of sensor data, app providers can collaborate by combining their data collections to infer on-device the user profiles required for personalization. Although major mobile platforms provide on-device data sharing mechanisms, these direct data exchanges provide no privacy protection. As an alternative to direct data sharing, we present differentially privatized sensor data onloading for app providers' collaboration. With our approach, app providers can safely collaborate by using shared sensor data to personalize their mobile services. We realize our approach as a middleware that acts as a trusted intermediary. The middleware aggregates the sensor data contributed by individual apps, which execute statistical queries against the combined datasets. Furthermore, the middleware's adaptive privacy-preserving scheme (1) computes and adds the required amount of noise to the query results so as to balance utility and privacy; (2) introduces a Trust-Data Theory so as to detect and remove spurious data from the combined collections; (3) rewards active contributing app providers so as to incentivize data contribution; (4) integrates a Trusted Execution Environment (TEE) so as to secure all data processing. Our evaluation shows that it is feasible and useful to personalize mobile services while protecting data privacy: queries' execution time is within 10 ms; participants' dissimilar privacy/utility requirements are satisfied; untrustworthy data are effectively detected; mobile services are personalized, and data privacy of both app providers and users are preserved.1
引用
收藏
页码:133 / 151
页数:19
相关论文
共 50 条
  • [31] Privacy-Preserving Deduplication of Sensor Compressed Data in Distributed Fog Computing
    Zhang, Chen
    Miao, Yinbin
    Xie, Qingyuan
    Guo, Yu
    Du, Hongwei
    Jia, Xiaohua
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2022, 33 (12) : 4176 - 4191
  • [32] Data processing based on the privacy-preserving vector for wireless sensor networks
    Zeng, Wei-Ni
    Lin, Ya-Ping
    Yi, Ye-Qing
    He, Shi-Ming
    Chen, Peng
    Tongxin Xuebao/Journal on Communications, 2015, 36 (09): : 34 - 46
  • [33] A Balance Privacy-Preserving Data Aggregation Model in Wireless Sensor Networks
    Zhang, Changlun
    Li, Chao
    Zhao, Yi
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,
  • [34] Privacy-preserving naive Bayes classification on distributed data via semi-trusted mixers
    Yi, Xun
    Zhang, Yanchun
    INFORMATION SYSTEMS, 2009, 34 (03) : 371 - 380
  • [35] A scheme for privacy-preserving data dissemination
    Lilien, Leszek
    Bharuava, Bharat
    IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 2006, 36 (03): : 502 - 506
  • [36] Privacy-Preserving Characterization and Data Publishing
    Ren, Jian
    Li, Tongtong
    2024 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS, ICNC, 2024, : 549 - 553
  • [37] Privacy-Preserving Classification of Data Streams
    Chao, Ching-Ming
    Chen, Po-Zung
    Sun, Chu-Hao
    JOURNAL OF APPLIED SCIENCE AND ENGINEERING, 2009, 12 (03): : 321 - 330
  • [38] Privacy-Preserving Federated Data Sharing
    Fioretto, Ferdinando
    Van Hentenryck, Pascal
    AAMAS '19: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON AUTONOMOUS AGENTS AND MULTIAGENT SYSTEMS, 2019, : 638 - 646
  • [39] Privacy-preserving collaborative data mining
    Zhan, J
    Chang, LW
    Matwin, S
    FOUNDATIONS AND NOVEL APPROACHES IN DATA MINING, 2006, 9 : 213 - +
  • [40] A Review on Privacy-Preserving Data Mining
    Li, Xueyun
    Yan, Zheng
    Zhang, Peng
    2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (CIT), 2014, : 769 - 774