Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Auditing images collected by sensors in ambient intelligence systems with privacy and high efficiency

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

To determine whether sensors should transmit collected images back to the data center, an auditing protocol is desired to check these images before transmission. Since images may contain sensitive information of the environment, privacy is an essential requirement for such an auditing protocol. Moreover, since sensors are typically low-power devices and the data center has to handle a variety of sensors, this auditing protocol should be lightweight. Taking both security and efficiency into account, we propose a novel auditing protocol on images in ambient intelligence systems, called AP-AmI (i.e., Auditing Protocol in Ambient Intelligence Systems). In AP-AmI, we use the local binary pattern technique for extracting features from images and design a novel privacy-preserving Euclid distance computation algorithm for determining whether these collected images are useful. Since these two techniques are both lightweight, AP-AmI can achieve high efficiency. At the same time, since feature vectors cannot be extracted by adversaries, AP-AmI can satisfy the privacy requirement. Experimental results show AP-AmI is feasible for real-world applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

  1. Sadri F (2011) Ambient intelligence: a survey. ACM Comput Surv 43(4):469–534

    Article  Google Scholar 

  2. Avenoglu B, Eren PE (2019) A context-aware and workflow-based framework for pervasive environments. J Ambient Intell Hum Comput 10(1):215–237

    Article  Google Scholar 

  3. Guo L, Wang J, Yau WC (2019) Efficient hierarchical identity-based encryption system for internet of things infrastructure. Symmetry 11(7):913

    Article  Google Scholar 

  4. MntherMark FG, ManulisAndreas P (2014) Privacy-enhanced participatory sensing with collusion resistance and data aggregation. In: Proceedings of Conference on Cryptology and Network Security (CANS’14), pp 321–336. https://doi.org/10.1007/978-3-319-12280-9-21

  5. Zhuo G, Jia Q, Guo L, Li M, Li P (2016) Privacy-preserving verifiable data aggregation and analysis for cloud-assisted mobile crowdsourcing. In: Proceedings of Annual IEEE Conference on Computer Communications (INFOCOM’16), pp 1–9. https://doi.org/10.1109/INFOCOM.2016.7524547

  6. Zhang J, Yang D, Ma R, Shi Y (2021) ’Multi-image and color image encryption via multi-slice ptychographic encoding. Opt Commun

  7. Miao C, Jiang W, Su L, Li Y, Guo S, Qin Z, Ren K (2015) Cloud-enabled privacy-preserving truth discovery in crowd sensing systems. In: Proceedings of ACM Conference on Embedded Networked Sensor Systems (SenSys’15), pp 183–196. https://doi.org/10.1145/2809695.2809719

  8. Chen J, Ma H, Zhao D (2015) Private data aggregation with integrity assurance and fault tolerance for mobile crowdsensing. Wirel Netw 23(1):131–144. https://doi.org/10.1007/s11276-015-1120-z

    Article  Google Scholar 

  9. Tran A, Luong T, Jessada K (2021) An Efficient approach for privacy preserving decentralized deep learning models based on secure multi-party computation. Neurocomputing

  10. Varshney LR, Vempaty A, Varshney PK, Assuring privacy and reliability in crowdsourcing with coding. In: Proceedings of Information Theory and Applications Workshop (ITA’14), pp 1–6. https://doi.org/10.1109/ITA.2014.6804213

  11. Jin H, Su L, Xiao H, Nahrstedt K (2016) Inception: incentivizing privacy-preserving data aggregation for mobile crowd sensing systems. In: Proceedings of International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc’16), vol 16, pp 341–350. https://doi.org/10.1145/2942358.2942375

  12. Wu S, Wang X, Wang S, Zhang Z, Tung AKH (2014) K-anonymity for crowdsourcing database. IEEE Trans Knowl Data Eng 26(9):2207–2221. https://doi.org/10.1109/TKDE.2013.93

    Article  Google Scholar 

  13. Qiu F, Wu F, Chen G (2015) Privacy and quality preserving multimedia data aggregation for participatory sensing systems. IEEE Trans Mob Comput 14(6):12871300. https://doi.org/10.1109/TMC.2014.2352253

    Article  Google Scholar 

  14. Wu Y, Wu Y, Peng H, Chen H, Li C (2016) MagiCrowd: a crowd based incentive for location-aware crowd sensing. In: Proceedings of IEEE Conference on Wireless Communications and Networking (WCNC’16), pp 1–6. https://doi.org/10.1109/WCNC.2016.7565026

  15. Pournajaf L, Xiong L, Sunderam V (2014) Dynamic data driven crowd sensing task assignment. Procedia Comput Sci 29:1314–1323. https://doi.org/10.1016/j.procs.2014.05.118

    Article  Google Scholar 

  16. Pournajaf L, Xiong L, Sunderam V, Goryczka S (2014) Spatial task assignment for crowd sensing with cloaked locations. In: Proceedings of IEEE International Conference on Mobile Data Management (MDM’14), vol 1, pp 73–82. https://doi.org/10.1109/MDM.2014.15

  17. To H, Ghinita G, Shahabi C (2014) A framework for protecting worker location privacy in spatial crowdsourcing. Proc VLDB Endow 7(10):919–930. https://doi.org/10.14778/2732951.2732966

    Article  Google Scholar 

  18. Zhang L, Lu X, Xiong P, Zhu T (2015) A differentially private method for reward-based spatial crowdsourcing. In: Proceedings of Springer International Conference on Applications and Techniques in Information Security (ATIS’14), pp 153–164. https://doi.org/10.1007/978-3662-48683-2_14

  19. Christin D, Engelmann F, Hollick M (2014) Usable privacy for mobile sensing applications. In: Proceedings of International Workshop on Information Security Theory and Practice (WISTP’14), pp 92–107. https://doi.org/10.1007/978-3-662-43826-8_7

  20. Krontiris I, Dimitriou T (2013) Privacy-respecting discovery of data providers in crowd-sensing applications. In: Proceedings of IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS’13), pp 249–257. https://doi.org/10.1109/DCOSS.2013.31

  21. Ren J, Zhang Y, Zhang K, Shen X (2015) Exploiting mobile crowdsourcing for pervasive cloud services: challenges and solutions. IEEE Commun Mag 53(3):98–105. https://doi.org/10.1109/MCOM.2015.7060488

    Article  Google Scholar 

  22. Gong Y, Wei L, Guo Y, Zhang C, Fang Y (2016) Optimal task recommendation for mobile crowdsourcing with privacy control. J Internet of Things 3(5):745–756. https://doi.org/10.1109/JIOT.2015.2512282

    Article  Google Scholar 

  23. Gong Y, Guo Y, Fang Y (2014) A privacy-preserving task recommendation framework for mobile crowdsourcing. In: Proceedings of IEEE Conference on Global Communications Conference (Globecom’14), pp 588–593. https://doi.org/10.1109/GLOCOM.2014.7036871

  24. Ojala T, Pietiknen M, Harwood D (1996) A comparative study of texture measures with classification based on featured distributions. Pattern Recogn J Pattern Recogn Soc 29(1):51–59

    Article  Google Scholar 

  25. Ojala T, Pietikainen M, Maenpaa T (2002) Multiresolution gray-scale and rotation invariant texture classification with local binary patterns. IEEE Trans Pattern Anal Mach Intell 24(7):971–987

    Article  Google Scholar 

  26. Deza MM, Deza E (2013) Encyclopedia of distances. Springer, Berlin

    Book  Google Scholar 

  27. Clifton C, Kantarcioglu M, Lin X, Vaida J, Zhu M (2003) Tools for privacy preserving distributed data mining. SIGKDD Explor 4(2):28–34

    Article  Google Scholar 

  28. LeCun Y et al., The MNIST database of handwritten digits, [Online]. Available: http://yann.lecun.com/exdb/mnist/

  29. National Institute of Standards and Technology (2001) Advanced Encryption Standard (AES): FIPS PUB 197. http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf

  30. Openssl.org (2013) openssl-1.0.1e.tar.gz. http://www.openssl.org/source/

Download references

Acknowledgements

This paper is supported by the NSFC (No.71402070, No.61101088), the NSF of jiangsu province (No.BK20161099), and Jiangsu Provincial Key Laboratory of Computer Network Technology.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Changsheng Wan.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, J., Wan, C., Zhang, C. et al. Auditing images collected by sensors in ambient intelligence systems with privacy and high efficiency. J Supercomput 77, 12771–12789 (2021). https://doi.org/10.1007/s11227-021-03738-z

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-021-03738-z

Keywords