Trusted and privacy-preserving sensor data onloading

被引:1
|
作者
Liu, Yin [1 ]
Cruz, Breno Dantas [2 ]
Tilevich, Eli [3 ]
机构
[1] Beijing Univ Technol, Fac Informat Technol, Beijing 100124, Peoples R China
[2] Iowa State Univ, Lab Software Design, Ames, IA USA
[3] Virginia Tech, Software Innovat Lab, Blacksburg, VA USA
基金
美国国家科学基金会; 北京市自然科学基金;
关键词
Data onloading; Adaptive privacy preservation; Sensor data; Trusted middleware; SECURE; INTERNET;
D O I
10.1016/j.comcom.2023.04.027
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To personalize their services (e.g., advertisement, navigation, healthcare), mobile apps collect sensor data. Typically, they upload the collected sensor data to the cloud, which returns the inferred user profiles required to personalize mobile services. However, privacy concerns and network connectivity/congestion issues can render cloud-based processing inapplicable. If different apps collect the same type of sensor data, app providers can collaborate by combining their data collections to infer on-device the user profiles required for personalization. Although major mobile platforms provide on-device data sharing mechanisms, these direct data exchanges provide no privacy protection. As an alternative to direct data sharing, we present differentially privatized sensor data onloading for app providers' collaboration. With our approach, app providers can safely collaborate by using shared sensor data to personalize their mobile services. We realize our approach as a middleware that acts as a trusted intermediary. The middleware aggregates the sensor data contributed by individual apps, which execute statistical queries against the combined datasets. Furthermore, the middleware's adaptive privacy-preserving scheme (1) computes and adds the required amount of noise to the query results so as to balance utility and privacy; (2) introduces a Trust-Data Theory so as to detect and remove spurious data from the combined collections; (3) rewards active contributing app providers so as to incentivize data contribution; (4) integrates a Trusted Execution Environment (TEE) so as to secure all data processing. Our evaluation shows that it is feasible and useful to personalize mobile services while protecting data privacy: queries' execution time is within 10 ms; participants' dissimilar privacy/utility requirements are satisfied; untrustworthy data are effectively detected; mobile services are personalized, and data privacy of both app providers and users are preserved.1
引用
收藏
页码:133 / 151
页数:19
相关论文
共 50 条
  • [41] SoK: Privacy-Preserving Data Synthesis
    Hu, Yuzheng
    Wu, Fan
    Li, Qinbin
    Long, Yunhui
    Garrido, Gonzalo Munilla
    Ge, Chang
    Ding, Bolin
    Forsyth, David
    Li, Bo
    Song, Dawn
    45TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP 2024, 2024, : 4696 - 4713
  • [42] Privacy-preserving data set union
    Segre, Alberto Maria
    Wildenberg, Andrew
    Vieland, Veronica
    Zhang, Ying
    PRIVACY IN STATISTICAL DATABASES, PROCEEDINGS, 2006, 4302 : 266 - +
  • [43] Privacy-preserving Sensory Data Recovery
    Chen, Cai
    Zhang, Manyuan
    Zhang, Huanzhi
    Huang, Zhenyun
    Li, Yong
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1646 - 1650
  • [44] Privacy-Preserving and Verifiable Data Aggregation
    Tran, Hieu N.
    Deng, Robert H.
    Pang, HweeHwa
    PROCEEDINGS OF THE SINGAPORE CYBER-SECURITY CONFERENCE (SG-CRC) 2016: CYBER-SECURITY BY DESIGN, 2016, 14 : 115 - 122
  • [45] PRIVACY-PRESERVING COLLABORATIVE DATA MINING
    Zhan, Justin
    KMIS 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON KNOWLEDGE MANAGEMENT AND INFORMATION SHARING, 2009, : IS15 - IS15
  • [46] Privacy-preserving Multimedia Data Analysis
    Zhu, Xiaofeng
    Thung, Kim Han
    Kim, Minjeong
    COMPUTER JOURNAL, 2021, 64 (07): : 991 - 992
  • [47] Privacy-Preserving Integration of Medical Data
    Miyaji, Atsuko
    Nakasho, Kazuhisa
    Nishida, Shohei
    JOURNAL OF MEDICAL SYSTEMS, 2017, 41 (03)
  • [48] Privacy-preserving clustering of data streams
    Chao, Ching-Ming
    Chen, Po-Zung
    Sun, Chu-Hao
    Tamkang Journal of Science and Engineering, 2010, 13 (03): : 349 - 358
  • [49] Privacy-preserving imputation of missing data
    Jagannathan, Geetha
    Wright, Rebecca N.
    DATA & KNOWLEDGE ENGINEERING, 2008, 65 (01) : 40 - 56
  • [50] Privacy-Preserving Sequential Data Publishing
    Wang, Huili
    Ma, Wenping
    Zheng, Haibin
    Liang, Zhi
    Wu, Qianhong
    NETWORK AND SYSTEM SECURITY, NSS 2019, 2019, 11928 : 596 - 614