Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Location Privacy-Preserving Data Recovery for Mobile Crowdsensing

Published: 18 September 2018 Publication History

Abstract

Data recovery techniques such as compressive sensing are commonly used in mobile crowdsensing (MCS) applications to infer the information of unsensed regions based on data from nearby participants. However, the participants' locations are exposed when they report geo-tagged data to an application server. While there are considerable location protection approaches for MCS, they fail to maintain the correlation of sensory data, leading to the existence of unrecoverable data. None of the previous approaches can achieve both data recovery and data privacy preservation. We propose a novel location privacy-preserving data recovery method in this paper. Based on our discovery that the adjacency relations of non-zero elements are key to the missing data recovery in a crowdsensing data matrix, we design a correlation-preserving location obfuscation scheme to hide the participants' locations under effective camouflage. We also design an encrypted data recovery scheme based on the homomorphic encryption in order to avoid location privacy leakage from sensory data. Location obfuscation and data encryption preserve the participants' privacy, while the correlation-preserving and homomorphic properties of our method ensure data recovery accuracy. Evaluations of real-world datasets show that our privacy-preserving method can effectively obfuscate locations (e.g., yielding an average location distortion of 1.7km in a 2.4km x 4km area for successful location hiding), and it can efficiently achieve similar data recovery accuracy to compressive sensing (which has no privacy protection).

References

[1]
Amr Alanwar, Yasser Shoukry, Supriyo Chakraborty, Paul Martin, Paulo Tabuada, and Mani Srivastava. 2017. PrOLoc: Resilient localization with private observers using partial homomorphic encryption. In Proceedings of the ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN). IEEE, 41--52.
[2]
Miguel E Andrés, Nicolás E Bordenabe, Konstantinos Chatzikokolakis, and Catuscia Palamidessi. 2013. Geo-indistinguishability: Differential privacy for location-based systems. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS). ACM, 901--914.
[3]
Nicolás E Bordenabe, Konstantinos Chatzikokolakis, and Catuscia Palamidessi. 2014. Optimal geo-indistinguishable mechanisms for location privacy. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS). ACM, 251--262.
[4]
Emmanuel J Candes and Yaniv Plan. 2010. Matrix completion with noise. Proc. IEEE 98, 6 (2010), 925--936.
[5]
Ayon Chakraborty, Md Shaifur Rahman, Himanshu Gupta, and Samir R Das. 2017. SpecSense: Crowdsensing for efficient querying of spectrum occupancy. In Proceedings of the IEEE Conference on Computer Communications (Infocom). IEEE, 1--9.
[6]
David Chaum. 1983. Blind Signatures for Untraceable Payments. Proceedings of CRYPTO, 199--203.
[7]
Benoît Chevalliermames, Pascal Paillier, and David Pointcheval. 2006. Encoding-free ElGamal encryption without random oracles. In Proceedings of the International Conference on Theory and Practice in Public-Key Cryptography (PKC). Springer, 91--104.
[8]
Delphine Christin, Andreas Reinhardt, Salil S. Kanhere, and Matthias Hollick. 2011. A survey on privacy in mobile participatory sensing applications. Journal of Systems and Software 84, 11 (2011), 1928--1946.
[9]
Cory Cornelius, Apu Kapadia, David Kotz, Dan Peebles, Minho Shin, and Nikos Triandopoulos. 2008. Anonysense: Privacy-aware people-centric sensing. In Proceedings of the International Conference on Mobile Systems, Applications, and Services (MobiSys). ACM, 211--224.
[10]
Srinivas Devarakonda, Parveen Sevusu, Hongzhang Liu, Ruilin Liu, Liviu Iftode, and Badri Nath. 2013. Real-time air quality monitoring through mobile sensing in metropolitan areas. In Proceedings of the ACM SIGKDD International Workshop on Urban Computing. ACM, 1--8.
[11]
A Dimovski and D Gligoroski. 2003. Attacks on the transposition ciphers using optimization heuristics. Proceedings of ICEST (2003), 1--4.
[12]
Benjamin C. M. Fung, Ke Wang, Rui Chen, and Philip S. Yu. 2010. Privacy-preserving data publishing: A survey of recent developments. Comput. Surveys 42, 4 (2010), 53.
[13]
Raghu K. Ganti, Nam Pham, Yu En Tsai, and Tarek F. Abdelzaher. 2008. PoolView: Stream privacy for grassroots participatory sensing. In Proceedings of the ACM International Conference on Embedded Networked Sensor Systems (SenSys). ACM, 281--294.
[14]
Raghu K Ganti, Fan Ye, and Hui Lei. 2011. Mobile crowdsensing: Current state and future challenges. IEEE Communications Magazine 49, 11 (2011), 32--39.
[15]
Bin Guo, Zhu Wang, Zhiwen Yu, Yu Wang, Neil Y Yen, Runhe Huang, and Xingshe Zhou. 2015. Mobile crowd sensing and computing: The review of an emerging human-powered sensing paradigm. ACM Computing Surveys (CSUR) 48, 1 (2015), 33.
[16]
Chao Huang, Dong Wang, and Shenglong Zhu. 2017. Where are you from: Home location profiling of crowd sensors from noisy and sparse crowdsourcing data. In Proceedings of the IEEE Conference on Computer Communications (Infocom). IEEE, 1--9.
[17]
François Ingelrest, Guillermo Barrenetxea, Gunnar Schaefer, Martin Vetterli, Olivier Couach, and Marc Parlange. 2010. Sensorscope: Application-specific sensor network for environmental monitoring. ACM Transactions on Sensor Networks (TOSN) 6, 2 (2010), 32.
[18]
Xiaocong Jin, Rui Zhang, Yimin Chen, Tao Li, and Yanchao Zhang. 2016. Dpsense: Differentially private crowdsourced spectrum sensing. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS). ACM, 296--307.
[19]
Linghe Kong, Liang He, Xiao Yang Liu, Yu Gu, Min You Wu, and Xue Liu. 2015. Privacy-preserving compressive sensing for crowdsensing based trajectory recovery. In Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS). IEEE, 31--40.
[20]
Linghe Kong, Mingyuan Xia, Xiao Yang Liu, Guangshuo Chen, Yu Gu, Min You Wu, and Xue Liu. 2014. Data loss and reconstruction in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems (TPDS) 25, 11 (2014), 2818--2828.
[21]
Qinghua Li, Guohong Cao, and Thomas F La Porta. 2014. Efficient and privacy-aware data aggregation in mobile sensing. IEEE Transactions on Dependable and Secure Computing (TDSC) 11, 2 (2014), 115--129.
[22]
Alfred J Menezes, Paul C Van Oorschot, and Scott A Vanstone. 1996. Handbook of applied cryptography. CRC press.
[23]
Chenglin Miao, Lu Su, Wenjun Jiang, Yaliang Li, and Miaomiao Tian. 2017. A lightweight privacy-preserving truth discovery framework for mobile crowd sensing systems. In Proceedings of the IEEE Conference on Computer Communications (Infocom). IEEE, 1--9.
[24]
James Newsome, Elaine Shi, Dawn Song, and Adrian Perrig. 2004. The sybil attack in sensor networks: analysis 8 defenses. In Proceedings of the ACM/IEEE International Symposium on Information Processing in Sensor Networks (IPSN). ACM, 259--268.
[25]
Evangelos Niforatos, Athanasios Vourvopoulos, Marc Langheinrich, Pedro Campos, and Andre Doria. 2014. Atmos: a hybrid crowdsourcing approach to weather estimation. In Proceedings of the ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication. ACM, 135--138.
[26]
Valeria Nikolaenko, Stratis Ioannidis, Marc Joye, Marc Joye, Nina Taft, and Boneh Dan. 2013. Privacy-preserving matrix factorization. In Proceedings of the ACM Sigsac Conference on Computer and Communications Security (CCS). ACM, 801--812.
[27]
Layla Pournajaf, Daniel A Garcia-Ulloa, Li Xiong, and Vaidy Sunderam. 2016. Participant privacy in mobile crowd sensing task management: A survey of methods and challenges. ACM SIGMOD Record 44, 4 (2016), 23--34.
[28]
Layla Pournajaf, Li Xiong, Vaidy Sunderam, and Slawomir Goryczka. 2014. Spatial task assignment for crowd sensing with cloaked locations. In Proceedings of the International Conference on Mobile Data Management (MDM), Vol. 1. IEEE, 73--82.
[29]
Swati Rallapalli, Lili Qiu, Yin Zhang, and Yi-Chao Chen. 2010. Exploiting temporal stability and low-rank structure for localization in mobile networks. In Proceedings of the International Conference on Mobile Computing and Networking (Mobicom). ACM, 161--172.
[30]
Hien To, Gabriel Ghinita, and Cyrus Shahabi. 2014. A framework for protecting worker location privacy in spatial crowdsourcing. Proceedings of the VLDB Endowment 7, 10 (2014), 919--930.
[31]
Cong Wang, Bingsheng Zhang, Kui Ren, and Janet M Roveda. 2013. Privacy-assured outsourcing of image reconstruction service in cloud. IEEE Transactions on Emerging Topics in Computing 1, 1 (2013), 166--177.
[32]
Leye Wang, Gehua Qin, Dingqi Yang, Xiao Han, and Xiaojuan Ma. 2018. Geographic differential privacy for mobile crowd coverage maximization. In Proceedings of the AAAI Conference on Artificial Intelligence (AAAI). AAAI, 1--10.
[33]
Leye Wang, Dingqi Yang, Xiao Han, Tianben Wang, Daqing Zhang, and Xiaojuan Ma. 2017. Location privacy-preserving task allocation for mobile crowdsensing with differential geo-obfuscation. In Proceedings of the International Conference on World Wide Web (WWW). International World Wide Web Conferences Steering Committee, 627--636.
[34]
Leye Wang, Daqing Zhang, Animesh Pathak, Chao Chen, Haoyi Xiong, Dingqi Yang, and Yasha Wang. 2015. CCS-TA: Quality-guaranteed online task allocation in compressive crowdsensing. In Proceedings of the ACM International Joint Conference on Pervasive and Ubiquitous Computing (Ubicomp). ACM, 683--694.
[35]
Leye Wang, Daqing Zhang, Yasha Wang, Chao Chen, Xiao Han, and Abdallah M'Hamed. 2016. Sparse mobile crowdsensing: challenges and opportunities. IEEE Communications Magazine 54, 7 (2016), 161--167.
[36]
Leye Wang, Daqing Zhang, Dingqi Yang, Brian Y Lim, and Xiaojuan Ma. 2016. Differential location privacy for sparse mobile crowdsensing. In Proceedings of the IEEE International Conference on Data Mining (ICDM). IEEE, 1257--1262.
[37]
Qian Wang, Yan Zhang, Xiao Lu, Zhibo Wang, Zhan Qin, and Kui Ren. 2016. RescueDP: Real-time spatio-temporal crowdsourced data publishing with differential privacy. In Proceedings of the IEEE Conference on Computer Communications (Infocom). IEEE, 1--9.
[38]
Liwen Xu, Xiaohong Hao, Nicholas D Lane, Xin Liu, and Thomas Moscibroda. 2015. More with less: Lowering user burden in mobile crowdsourcing through compressive sensing. In Proceedings of the ACM International Joint Conference on Pervasive and Ubiquitous Computing (Ubicomp). ACM, 659--670.
[39]
Zhiwen Yu, Huang Xu, Zhe Yang, and Bin Guo. 2016. Personalized travel package with multi-point-of-interest recommendation based on crowdsourced user footprints. IEEE Transactions on Human-Machine Systems 46, 1 (2016), 151--158.
[40]
Fan Zhang, Li He, Wenbo He, and Xue Liu. 2012. Data perturbation with state-dependent noise for participatory sensing. In Proceedings of the IEEE Conference on Computer Communications (Infocom). IEEE, 2246--2254.
[41]
Yin Zhang, Matthew Roughan, Walter Willinger, and Lili Qiu. 2009. Spatio-temporal compressive sensing and internet traffic matrices. In ACM SIGCOMM Computer Communication Review, Vol. 39. ACM, 267--278.
[42]
Yu Zheng, Licia Capra, Ouri Wolfson, and Hai Yang. 2014. Urban computing: Concepts, methodologies, and applications. ACM Transactions on Intelligent Systems and Technology (TIST) 5, 3 (2014), 55.
[43]
Yu Zheng, Tong Liu, Yilun Wang, Yanmin Zhu, Yanchi Liu, and Eric Chang. 2014. Diagnosing New York city's noises with ubiquitous data. In Proceedings of the ACM International Joint Conference on Pervasive and Ubiquitous Computing (Ubicomp). ACM, 715--725.
[44]
Hongchao Zhou and Gregory Wornell. 2014. Efficient homomorphic encryption on integer vectors and its applications. In Information Theory and Applications Workshop. 1--9.
[45]
Gaoqiang Zhuo, Qi Jia, Linke Guo, Ming Li, and Pan Li. 2016. Privacy-preserving verifiable data aggregation and analysis for cloud-assisted mobile crowdsourcing. In Proceedings of the IEEE Conference on Computer Communications (Infocom). IEEE, 1--9.

Cited By

View all
  • (2024)SecDR: Enabling Secure, Efficient, and Accurate Data Recovery for Mobile CrowdsensingIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.326226821:2(789-803)Online publication date: Mar-2024
  • (2023)Location Privacy-Preserving Scheme in IoBT Networks Using Deception-Based TechniquesSensors10.3390/s2306314223:6(3142)Online publication date: 15-Mar-2023
  • (2023)A Triple Real-Time Trajectory Privacy Protection Mechanism Based on Edge Computing and Blockchain in Mobile CrowdsourcingIEEE Transactions on Mobile Computing10.1109/TMC.2022.318704722:10(5625-5642)Online publication date: 1-Oct-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies  Volume 2, Issue 3
September 2018
1536 pages
EISSN:2474-9567
DOI:10.1145/3279953
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 18 September 2018
Accepted: 01 September 2018
Revised: 01 April 2018
Received: 01 February 2018
Published in IMWUT Volume 2, Issue 3

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. compressive sensing
  2. data recovery
  3. location privacy
  4. mobile crowdsensing

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

  • National Key Research and Development Program of China
  • National Natural Science Foundation of China

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)31
  • Downloads (Last 6 weeks)4
Reflects downloads up to 26 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2024)SecDR: Enabling Secure, Efficient, and Accurate Data Recovery for Mobile CrowdsensingIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.326226821:2(789-803)Online publication date: Mar-2024
  • (2023)Location Privacy-Preserving Scheme in IoBT Networks Using Deception-Based TechniquesSensors10.3390/s2306314223:6(3142)Online publication date: 15-Mar-2023
  • (2023)A Triple Real-Time Trajectory Privacy Protection Mechanism Based on Edge Computing and Blockchain in Mobile CrowdsourcingIEEE Transactions on Mobile Computing10.1109/TMC.2022.318704722:10(5625-5642)Online publication date: 1-Oct-2023
  • (2023)Research on Cost Control of Mobile Crowdsourcing Supporting Low Budget in Large Scale Environmental Information MonitoringComputer Supported Cooperative Work and Social Computing10.1007/978-981-99-2385-4_11(148-163)Online publication date: 13-May-2023
  • (2022)CrowdHMT: Crowd Intelligence With the Deep Fusion of Human, Machine, and IoTIEEE Internet of Things Journal10.1109/JIOT.2022.31947269:24(24822-24842)Online publication date: 15-Dec-2022
  • (2022)Discovering Truth in Mobile Crowdsensing with Differential Location PrivacyGLOBECOM 2022 - 2022 IEEE Global Communications Conference10.1109/GLOBECOM48099.2022.10001292(903-908)Online publication date: 4-Dec-2022
  • (2022)Privacy protection federated learning system based on blockchain and edge computing in mobile crowdsourcingComputer Networks10.1016/j.comnet.2022.109206215(109206)Online publication date: Oct-2022
  • (2021)The Crowd Wisdom for Location Privacy of Crowdsensing PhotosProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/34781065:3(1-23)Online publication date: 14-Sep-2021
  • (2021)A Mobile Data Recovery Device2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems10.1007/978-981-16-1726-3_99(807-812)Online publication date: 2-Jun-2021
  • (2021)A two‐stage privacy protection mechanism based on blockchain in mobile crowdsourcingInternational Journal of Intelligent Systems10.1002/int.2237136:5(2058-2080)Online publication date: 31-Mar-2021
  • Show More Cited By

View Options

Get Access

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media