Privacy-Preserving Observation in Public Spaces

被引:3
|
作者
Kerschbaum, Florian [1 ]
Lim, Hoon Wei [2 ]
机构
[1] SAP, Karlsruhe, Germany
[2] Singtel R&D Lab, Singapore, Singapore
来源
关键词
D O I
10.1007/978-3-319-24177-7_5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
One method of privacy-preserving accounting or billing in cyber-physical systems, such as electronic toll collection or public transportation ticketing, is to have the user present an encrypted record of transactions and perform the accounting or billing computation securely on them. Honesty of the user is ensured by spot checking the record for some selected surveyed transactions. But how much privacy does that give the user, i.e. how many transactions need to be surveyed? It turns out that due to collusion in mass surveillance all transactions need to be observed, i.e. this method of spot checking provides no privacy at all. In this paper we present a cryptographic solution to the spot checking problem in cyber-physical systems. Users carry an authentication device that authenticates only based on fair random coins. The probability can be set high enough to allow for spot checking, but in all other cases privacy is perfectly preserved. We analyze our protocol for computational efficiency and show that it can be efficiently implemented even on platforms with limited computing resources, such as smart cards and smart phones.
引用
收藏
页码:81 / 100
页数:20
相关论文
共 50 条
  • [1] Privacy-Preserving Event Detection in Pervasive Spaces
    Hore, Bijit
    Wickramasuriya, Jehan
    Mehrotra, Sharad
    Venkatasubramanian, Nalini
    Massaguer, Daniel
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM), VOLS 1 AND 2, 2009, : 233 - 242
  • [2] Privacy-Preserving Public Transport Ticketing System
    Milutinovic, Milica
    Decroix, Koen
    Naessens, Vincent
    De Decker, Bart
    [J]. Data and Applications Security and Privacy XXIX, 2015, 9149 : 135 - 150
  • [3] Privacy-Preserving Public Information for Sequential Games
    Blum, Avrim
    Morgenstern, Jamie
    Sharma, Ankit
    Smith, Adam
    [J]. PROCEEDINGS OF THE 6TH INNOVATIONS IN THEORETICAL COMPUTER SCIENCE (ITCS'15), 2015, : 173 - 180
  • [4] Privacy-preserving Realization of the STORK Framework in the Public Cloud
    Zwattendorfer, Bernd
    Slamanig, Daniel
    [J]. PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013), 2013, : 419 - 426
  • [5] Privacy-Preserving Public Key Infrastructure for Vehicular Networks
    Gaiduk, Pavlo
    Ranjan, Kumar Rajeev
    Basmer, Thomas
    Tschorsch, Florian
    [J]. PROCEEDINGS OF THE 2020 IEEE 45TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2020), 2020, : 154 - 163
  • [6] Privacy-preserving public auditing for data integrity in cloud
    Saleem, M. Shaik
    Murali, M.
    [J]. PROCEEDINGS OF THE 10TH NATIONAL CONFERENCE ON MATHEMATICAL TECHNIQUES AND ITS APPLICATIONS (NCMTA 18), 2018, 1000
  • [7] Privacy-Preserving Public Verification of Ethical Cobalt Sourcing
    Becher, Kilian
    Lagodzinski, J. A. Gregor
    Strufe, Thorsten
    [J]. 2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 999 - 1006
  • [8] Privacy-Preserving Public Auditing for Secure Cloud Storage
    Wang, Cong
    Chow, Sherman S. M.
    Wang, Qian
    Ren, Kui
    Lou, Wenjing
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (02) : 362 - 375
  • [9] Privacy-preserving boosting
    Sébastien Gambs
    Balázs Kégl
    Esma Aïmeur
    [J]. Data Mining and Knowledge Discovery, 2007, 14 : 131 - 170
  • [10] Privacy-preserving boosting
    Gambs, Sebastien
    Kegl, Balazs
    Aimeur, Esma
    [J]. DATA MINING AND KNOWLEDGE DISCOVERY, 2007, 14 (01) : 131 - 170