Abstract
In this work we study the problem of querier privacy in the Participatory Sensing domain. While prior work has attempted to protect the privacy of people contributing sensing data from their mobile phones, little or no work has focused on the problem of querier privacy. Motivated by a novel communication model in which clients may directly query participatory sensing networks operated by potentially untrusted adversaries, we propose PEPPeR, a protocol for privacy-preserving access control in participatory sensing applications that focuses on the privacy of the querier. Contrary to past solutions, PEPPeR enables queriers to have access to the data provided by participating users without placing any trust in third parties or reducing the scope of queries. Additionally, our approach naturally extends the traditional pull/push models of participatory sensing and integrates nicely with mobile social networks, a new breed of sensing which combines mobile sensor devices with personal sensing environments.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Maisonneuve, N., Stevens, M., Ochab, B.: Participatory noise pollution monitoring using mobile phones. Information Policy 15, 51–71 (2010)
Honicky, R., Brewer, E.A., Paulos, E., White, R.: N-smarts: networked suite of mobile atmospheric real-time sensors. In: Proceedings of the 2nd ACM SIGCOMM workshop on Networked systems for developing regions (NSDR 2008), pp. 25–30 (2008)
Mohan, P., Padmanabhan, V.N., Ramjee, R.: Nericell: rich monitoring of road and traffic conditions using mobile smartphones. In: Proceedings of the 6th ACM Conference on Embedded Network Sensor Systems (SenSys 2008), pp. 323–336 (2008)
Das, T., Mohan, P., Padmanabhan, V.N., Ramjee, R., Sharma, A.: PRISM: platform for remote sensing using smartphones. In: Proceedings of the 8th International Conference on Mobile Systems, Applications, and Services (MobiSys 2010), San Francisco, California, USA, pp. 63–76 (2010)
Shin, M., Cornelius, C., Peebles, D., Kapadia, A., Kotz, D., Triandopoulos, N.: AnonySense: A system for anonymous opportunistic sensing. Journal of Pervasive and Mobile Computing (2010)
Krontiris, I., Albers, A.: Monetary incentives in participatory sensing using multi-attributive auctions. International Journal of Parallel, Emergent and Distributed Systems (2012)
Beach, A., Gartrell, M., Xing, X., Han, R., Lv, Q., Mishra, S., Seada, K.: Fusing mobile, sensor, and social data to fully enable context-aware computing. In: Proceedings of the 11th Workshop on Mobile Computing Systems & Applications (HotMobile 2010), Annapolis, Maryland, pp. 60–65 (2010)
Krontiris, I., Freiling, F.C.: Integrating people-centric sensing with social networks: A privacy research agenda. In: Proceeding of the IEEE International Workshop on Security and Social Networking, SESOC (2010)
Carbunar, B., Yu, Y., Shi, W., Pearce, M., Vasudevan, V.: Query privacy in wireless sensor networks. ACM Transactions on Sensor Networks 6(2) (2010)
Zhang, R., Zhang, Y., Ren, K.: DP2AC: Distributed Privacy-Preserving Access Control in Sensor Networks. In: Proceeding of the 28th Conference on Computer Communications, INFOCOM 2009 (2009)
De Cristofaro, E., Ding, X., Tsudik, G.: Privacy-preserving querying in sensor networks. In: Proceeding of the International Conference on Computer Communications and Networks, ICCCN 2009 (2009)
Dimitriou, T., Sabouri, A.: Privacy preservation schemes for querying wireless sensor networks. In: Proceedings of the 7th IEEE PerCom International Workshop on Sensor Networks and Systems for Pervasive Computing (PerSeNS 2011), pp. 178–183 (2011)
De Cristofaro, E., Soriente, C.: Short paper: PEPSI – privacy-enhanced participatory sensing infrastructure. In: Proceedings of the Fourth ACM Conference on Wireless Network Security (WiSec 2011), pp. 23–28 (2011)
Chaum, D.: Blind signatures for untraceable payments. In: CRYPTO, pp. 199–203 (1982)
Abe, M., Fujisaki, E.: How to Date Blind Signatures. In: Kim, K.-C., Matsumoto, T. (eds.) ASIACRYPT 1996. LNCS, vol. 1163, pp. 244–251. Springer, Heidelberg (1996)
Boneh, D.: Twenty Years of Attacks on the RSA Cryptosystem. Notices of the American Mathematical Society (AMS) 46(2), 203–213 (1999)
Schnorr, C.P.: Efficient signature generation by smart cards. Journal of Cryptology 4(3), 161–174 (1991)
Okamoto, T.: Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 31–53. Springer, Heidelberg (1993)
Brands, S.: Untraceable Off-Line Cash in Wallets with Observers (Extended Abstract). In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 302–318. Springer, Heidelberg (1994)
Osipkov, I., Vasserman, E.Y., Hopper, N., Kim, Y.: Combating double-spending using cooperative P2P systems. In: Proceedings of the 27th International Conference on Distributed Computing Systems, ICDCS 2007 (2007)
Bellare, M., Rogaway, P.: The Exact Security of Digital Signatures - How to Sign with RSA and Rabin. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 399–416. Springer, Heidelberg (1996)
Coron, J.-S.: On the Exact Security of Full Domain Hash. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 229–235. Springer, Heidelberg (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Dimitriou, T., Krontiris, I., Sabouri, A. (2012). PEPPeR: A Querier’s Privacy Enhancing Protocol for PaRticipatory Sensing. In: Schmidt, A.U., Russello, G., Krontiris, I., Lian, S. (eds) Security and Privacy in Mobile Information and Communication Systems. MobiSec 2012. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 107. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33392-7_11
Download citation
DOI: https://doi.org/10.1007/978-3-642-33392-7_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-33391-0
Online ISBN: 978-3-642-33392-7
eBook Packages: Computer ScienceComputer Science (R0)