Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

PEPPeR: A Querier’s Privacy Enhancing Protocol for PaRticipatory Sensing

  • Conference paper
Security and Privacy in Mobile Information and Communication Systems (MobiSec 2012)

Abstract

In this work we study the problem of querier privacy in the Participatory Sensing domain. While prior work has attempted to protect the privacy of people contributing sensing data from their mobile phones, little or no work has focused on the problem of querier privacy. Motivated by a novel communication model in which clients may directly query participatory sensing networks operated by potentially untrusted adversaries, we propose PEPPeR, a protocol for privacy-preserving access control in participatory sensing applications that focuses on the privacy of the querier. Contrary to past solutions, PEPPeR enables queriers to have access to the data provided by participating users without placing any trust in third parties or reducing the scope of queries. Additionally, our approach naturally extends the traditional pull/push models of participatory sensing and integrates nicely with mobile social networks, a new breed of sensing which combines mobile sensor devices with personal sensing environments.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Maisonneuve, N., Stevens, M., Ochab, B.: Participatory noise pollution monitoring using mobile phones. Information Policy 15, 51–71 (2010)

    Google Scholar 

  2. Honicky, R., Brewer, E.A., Paulos, E., White, R.: N-smarts: networked suite of mobile atmospheric real-time sensors. In: Proceedings of the 2nd ACM SIGCOMM workshop on Networked systems for developing regions (NSDR 2008), pp. 25–30 (2008)

    Google Scholar 

  3. Mohan, P., Padmanabhan, V.N., Ramjee, R.: Nericell: rich monitoring of road and traffic conditions using mobile smartphones. In: Proceedings of the 6th ACM Conference on Embedded Network Sensor Systems (SenSys 2008), pp. 323–336 (2008)

    Google Scholar 

  4. Das, T., Mohan, P., Padmanabhan, V.N., Ramjee, R., Sharma, A.: PRISM: platform for remote sensing using smartphones. In: Proceedings of the 8th International Conference on Mobile Systems, Applications, and Services (MobiSys 2010), San Francisco, California, USA, pp. 63–76 (2010)

    Google Scholar 

  5. Shin, M., Cornelius, C., Peebles, D., Kapadia, A., Kotz, D., Triandopoulos, N.: AnonySense: A system for anonymous opportunistic sensing. Journal of Pervasive and Mobile Computing (2010)

    Google Scholar 

  6. Krontiris, I., Albers, A.: Monetary incentives in participatory sensing using multi-attributive auctions. International Journal of Parallel, Emergent and Distributed Systems (2012)

    Google Scholar 

  7. Beach, A., Gartrell, M., Xing, X., Han, R., Lv, Q., Mishra, S., Seada, K.: Fusing mobile, sensor, and social data to fully enable context-aware computing. In: Proceedings of the 11th Workshop on Mobile Computing Systems & Applications (HotMobile 2010), Annapolis, Maryland, pp. 60–65 (2010)

    Google Scholar 

  8. Krontiris, I., Freiling, F.C.: Integrating people-centric sensing with social networks: A privacy research agenda. In: Proceeding of the IEEE International Workshop on Security and Social Networking, SESOC (2010)

    Google Scholar 

  9. Carbunar, B., Yu, Y., Shi, W., Pearce, M., Vasudevan, V.: Query privacy in wireless sensor networks. ACM Transactions on Sensor Networks 6(2) (2010)

    Google Scholar 

  10. Zhang, R., Zhang, Y., Ren, K.: DP2AC: Distributed Privacy-Preserving Access Control in Sensor Networks. In: Proceeding of the 28th Conference on Computer Communications, INFOCOM 2009 (2009)

    Google Scholar 

  11. De Cristofaro, E., Ding, X., Tsudik, G.: Privacy-preserving querying in sensor networks. In: Proceeding of the International Conference on Computer Communications and Networks, ICCCN 2009 (2009)

    Google Scholar 

  12. Dimitriou, T., Sabouri, A.: Privacy preservation schemes for querying wireless sensor networks. In: Proceedings of the 7th IEEE PerCom International Workshop on Sensor Networks and Systems for Pervasive Computing (PerSeNS 2011), pp. 178–183 (2011)

    Google Scholar 

  13. De Cristofaro, E., Soriente, C.: Short paper: PEPSI – privacy-enhanced participatory sensing infrastructure. In: Proceedings of the Fourth ACM Conference on Wireless Network Security (WiSec 2011), pp. 23–28 (2011)

    Google Scholar 

  14. Chaum, D.: Blind signatures for untraceable payments. In: CRYPTO, pp. 199–203 (1982)

    Google Scholar 

  15. Abe, M., Fujisaki, E.: How to Date Blind Signatures. In: Kim, K.-C., Matsumoto, T. (eds.) ASIACRYPT 1996. LNCS, vol. 1163, pp. 244–251. Springer, Heidelberg (1996)

    Chapter  Google Scholar 

  16. Boneh, D.: Twenty Years of Attacks on the RSA Cryptosystem. Notices of the American Mathematical Society (AMS) 46(2), 203–213 (1999)

    MathSciNet  MATH  Google Scholar 

  17. Schnorr, C.P.: Efficient signature generation by smart cards. Journal of Cryptology 4(3), 161–174 (1991)

    Article  MATH  Google Scholar 

  18. Okamoto, T.: Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 31–53. Springer, Heidelberg (1993)

    Chapter  Google Scholar 

  19. Brands, S.: Untraceable Off-Line Cash in Wallets with Observers (Extended Abstract). In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 302–318. Springer, Heidelberg (1994)

    Chapter  Google Scholar 

  20. Osipkov, I., Vasserman, E.Y., Hopper, N., Kim, Y.: Combating double-spending using cooperative P2P systems. In: Proceedings of the 27th International Conference on Distributed Computing Systems, ICDCS 2007 (2007)

    Google Scholar 

  21. Bellare, M., Rogaway, P.: The Exact Security of Digital Signatures - How to Sign with RSA and Rabin. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 399–416. Springer, Heidelberg (1996)

    Chapter  Google Scholar 

  22. Coron, J.-S.: On the Exact Security of Full Domain Hash. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 229–235. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Dimitriou, T., Krontiris, I., Sabouri, A. (2012). PEPPeR: A Querier’s Privacy Enhancing Protocol for PaRticipatory Sensing. In: Schmidt, A.U., Russello, G., Krontiris, I., Lian, S. (eds) Security and Privacy in Mobile Information and Communication Systems. MobiSec 2012. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 107. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33392-7_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-33392-7_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-33391-0

  • Online ISBN: 978-3-642-33392-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics