Abstract
To determine whether sensors should transmit collected images back to the data center, an auditing protocol is desired to check these images before transmission. Since images may contain sensitive information of the environment, privacy is an essential requirement for such an auditing protocol. Moreover, since sensors are typically low-power devices and the data center has to handle a variety of sensors, this auditing protocol should be lightweight. Taking both security and efficiency into account, we propose a novel auditing protocol on images in ambient intelligence systems, called AP-AmI (i.e., Auditing Protocol in Ambient Intelligence Systems). In AP-AmI, we use the local binary pattern technique for extracting features from images and design a novel privacy-preserving Euclid distance computation algorithm for determining whether these collected images are useful. Since these two techniques are both lightweight, AP-AmI can achieve high efficiency. At the same time, since feature vectors cannot be extracted by adversaries, AP-AmI can satisfy the privacy requirement. Experimental results show AP-AmI is feasible for real-world applications.
Similar content being viewed by others
References
Sadri F (2011) Ambient intelligence: a survey. ACM Comput Surv 43(4):469–534
Avenoglu B, Eren PE (2019) A context-aware and workflow-based framework for pervasive environments. J Ambient Intell Hum Comput 10(1):215–237
Guo L, Wang J, Yau WC (2019) Efficient hierarchical identity-based encryption system for internet of things infrastructure. Symmetry 11(7):913
MntherMark FG, ManulisAndreas P (2014) Privacy-enhanced participatory sensing with collusion resistance and data aggregation. In: Proceedings of Conference on Cryptology and Network Security (CANS’14), pp 321–336. https://doi.org/10.1007/978-3-319-12280-9-21
Zhuo G, Jia Q, Guo L, Li M, Li P (2016) Privacy-preserving verifiable data aggregation and analysis for cloud-assisted mobile crowdsourcing. In: Proceedings of Annual IEEE Conference on Computer Communications (INFOCOM’16), pp 1–9. https://doi.org/10.1109/INFOCOM.2016.7524547
Zhang J, Yang D, Ma R, Shi Y (2021) ’Multi-image and color image encryption via multi-slice ptychographic encoding. Opt Commun
Miao C, Jiang W, Su L, Li Y, Guo S, Qin Z, Ren K (2015) Cloud-enabled privacy-preserving truth discovery in crowd sensing systems. In: Proceedings of ACM Conference on Embedded Networked Sensor Systems (SenSys’15), pp 183–196. https://doi.org/10.1145/2809695.2809719
Chen J, Ma H, Zhao D (2015) Private data aggregation with integrity assurance and fault tolerance for mobile crowdsensing. Wirel Netw 23(1):131–144. https://doi.org/10.1007/s11276-015-1120-z
Tran A, Luong T, Jessada K (2021) An Efficient approach for privacy preserving decentralized deep learning models based on secure multi-party computation. Neurocomputing
Varshney LR, Vempaty A, Varshney PK, Assuring privacy and reliability in crowdsourcing with coding. In: Proceedings of Information Theory and Applications Workshop (ITA’14), pp 1–6. https://doi.org/10.1109/ITA.2014.6804213
Jin H, Su L, Xiao H, Nahrstedt K (2016) Inception: incentivizing privacy-preserving data aggregation for mobile crowd sensing systems. In: Proceedings of International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc’16), vol 16, pp 341–350. https://doi.org/10.1145/2942358.2942375
Wu S, Wang X, Wang S, Zhang Z, Tung AKH (2014) K-anonymity for crowdsourcing database. IEEE Trans Knowl Data Eng 26(9):2207–2221. https://doi.org/10.1109/TKDE.2013.93
Qiu F, Wu F, Chen G (2015) Privacy and quality preserving multimedia data aggregation for participatory sensing systems. IEEE Trans Mob Comput 14(6):12871300. https://doi.org/10.1109/TMC.2014.2352253
Wu Y, Wu Y, Peng H, Chen H, Li C (2016) MagiCrowd: a crowd based incentive for location-aware crowd sensing. In: Proceedings of IEEE Conference on Wireless Communications and Networking (WCNC’16), pp 1–6. https://doi.org/10.1109/WCNC.2016.7565026
Pournajaf L, Xiong L, Sunderam V (2014) Dynamic data driven crowd sensing task assignment. Procedia Comput Sci 29:1314–1323. https://doi.org/10.1016/j.procs.2014.05.118
Pournajaf L, Xiong L, Sunderam V, Goryczka S (2014) Spatial task assignment for crowd sensing with cloaked locations. In: Proceedings of IEEE International Conference on Mobile Data Management (MDM’14), vol 1, pp 73–82. https://doi.org/10.1109/MDM.2014.15
To H, Ghinita G, Shahabi C (2014) A framework for protecting worker location privacy in spatial crowdsourcing. Proc VLDB Endow 7(10):919–930. https://doi.org/10.14778/2732951.2732966
Zhang L, Lu X, Xiong P, Zhu T (2015) A differentially private method for reward-based spatial crowdsourcing. In: Proceedings of Springer International Conference on Applications and Techniques in Information Security (ATIS’14), pp 153–164. https://doi.org/10.1007/978-3662-48683-2_14
Christin D, Engelmann F, Hollick M (2014) Usable privacy for mobile sensing applications. In: Proceedings of International Workshop on Information Security Theory and Practice (WISTP’14), pp 92–107. https://doi.org/10.1007/978-3-662-43826-8_7
Krontiris I, Dimitriou T (2013) Privacy-respecting discovery of data providers in crowd-sensing applications. In: Proceedings of IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS’13), pp 249–257. https://doi.org/10.1109/DCOSS.2013.31
Ren J, Zhang Y, Zhang K, Shen X (2015) Exploiting mobile crowdsourcing for pervasive cloud services: challenges and solutions. IEEE Commun Mag 53(3):98–105. https://doi.org/10.1109/MCOM.2015.7060488
Gong Y, Wei L, Guo Y, Zhang C, Fang Y (2016) Optimal task recommendation for mobile crowdsourcing with privacy control. J Internet of Things 3(5):745–756. https://doi.org/10.1109/JIOT.2015.2512282
Gong Y, Guo Y, Fang Y (2014) A privacy-preserving task recommendation framework for mobile crowdsourcing. In: Proceedings of IEEE Conference on Global Communications Conference (Globecom’14), pp 588–593. https://doi.org/10.1109/GLOCOM.2014.7036871
Ojala T, Pietiknen M, Harwood D (1996) A comparative study of texture measures with classification based on featured distributions. Pattern Recogn J Pattern Recogn Soc 29(1):51–59
Ojala T, Pietikainen M, Maenpaa T (2002) Multiresolution gray-scale and rotation invariant texture classification with local binary patterns. IEEE Trans Pattern Anal Mach Intell 24(7):971–987
Deza MM, Deza E (2013) Encyclopedia of distances. Springer, Berlin
Clifton C, Kantarcioglu M, Lin X, Vaida J, Zhu M (2003) Tools for privacy preserving distributed data mining. SIGKDD Explor 4(2):28–34
LeCun Y et al., The MNIST database of handwritten digits, [Online]. Available: http://yann.lecun.com/exdb/mnist/
National Institute of Standards and Technology (2001) Advanced Encryption Standard (AES): FIPS PUB 197. http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
Openssl.org (2013) openssl-1.0.1e.tar.gz. http://www.openssl.org/source/
Acknowledgements
This paper is supported by the NSFC (No.71402070, No.61101088), the NSF of jiangsu province (No.BK20161099), and Jiangsu Provincial Key Laboratory of Computer Network Technology.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Zhang, J., Wan, C., Zhang, C. et al. Auditing images collected by sensors in ambient intelligence systems with privacy and high efficiency. J Supercomput 77, 12771–12789 (2021). https://doi.org/10.1007/s11227-021-03738-z
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-021-03738-z