skip to main content
10.1145/1460412.1460440acmconferencesArticle/Chapter ViewAbstractPublication PagessensysConference Proceedingsconference-collections
research-article

PoolView: stream privacy for grassroots participatory sensing

Authors Info & Claims
Published:05 November 2008Publication History

ABSTRACT

This paper develops mathematical foundations and architectural components for providing privacy guarantees on stream data in grassroots participatory sensing applications, where groups of participants use privately-owned sensors to collectively measure aggregate phenomena of mutual interest. Grassroots applications refer to those initiated by members of the community themselves as opposed to by some governing or official entities. The potential lack of a hierarchical trust structure in such applications makes it harder to enforce privacy. To address this problem, we develop a privacy-preserving architecture, called PoolView, that relies on data perturbation on the client-side to ensure individuals' privacy and uses community-wide reconstruction techniques to compute the aggregate information of interest. PoolView allows arbitrary parties to start new services, called pools, to compute new types of aggregate information for their clients. Both the client-side and server-side components of PoolView are implemented and available for download, including the data perturbation and reconstruction components. Two simple sensing services are developed for illustration; one computes traffic statistics from subscriber GPS data and the other computes weight statistics for a particular diet. Evaluation, using actual data traces collected by the authors, demonstrates the privacy-preserving aggregation functionality in PoolView.

References

  1. T. Abdelzaher et al. Mobiscopes for human spaces. IEEE Pervasive Computing, 6(2):20--29, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. D. Agrawal and C. C. Aggarwal. On the design and quantification of privacy preserving data mining algorithms. In Proc. of ACM Principles of Database Systems, pages 247--255, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. R. Agrawal and R. Srikant. Privacy preserving data mining. In Proc. of ACM Conf. on Management of Data, pages 439--450, May 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. S. S. Alpert. A two-reservoir energy model of the human body. The American Journal of Clinical Nutrition, 32(8):1710--1718, 1979.Google ScholarGoogle ScholarCross RefCross Ref
  5. J. Burke et al. Participatory sensing. Workshop on World-Sensor-Web, co-located with ACM SenSys, 2006.Google ScholarGoogle Scholar
  6. C. Carson and H. Kevin. The dynamics of human body weight change. PLOS Computational Biology, 4(3):1000045, March 2008.Google ScholarGoogle ScholarCross RefCross Ref
  7. K. Chen and L. Liu. Privacy preserving data classification with rotation perturbation. In Proc. of IEEE International Conference on Data Mining, pages 589--592, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. M. Davis et al. Mmm2: Mobile media metadata for media sharing. In CHI Extended Abstracts on Human Factors in Computing Systems, pages 1335--1338, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. W. Du and Z. Zhan. Using randomized response techniques for privacy-preserving data mining. In Proc. of ACM SIGKDD Conf., pages 505--510, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. S. B. Eisenman et al. The bikenet mobile sensing system for cyclist experience mapping. In Proc. of SenSys, November 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. A. Evfimievski. Randomization in privacy preserving data mining. ACM SIGKDD Explorations Newsletter, 4(2):43--48, December 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. A. Evfimievski, J. Gehrke, and R. Srikant. Limiting privacy breaches in privacy preserving data mining. In Proceedings of the SIGMOD/PODS Conference, pages 211--222, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. G. B. Forbes. Weight loss during fasting: Implications for the obese. The American Journal of Clinical Nutrition, 23(9):1212--1219, September 1970.Google ScholarGoogle ScholarCross RefCross Ref
  14. R. K. Ganti, P. Jayachandran, T. F. Abdelzaher, and J. A. Stankovic. Satire: a software architecture for smart attire. In Proc. of ACM MobiSys, pages 110--123, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Garmin eTrex Legend. www8.garmin.com/products/etrexlegend.Google ScholarGoogle Scholar
  16. O. Goldreich. Secure multi-party computation (draft). Technical report, Weizmann Institute of Science, 2002.Google ScholarGoogle Scholar
  17. C. Guestrin et al. Distributed regression: An efficient framework for modeling sensor network data. In Proc. of IPSN '04, pages 1--10, April 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. J. Han and M. Kamber. Data Mining: Concepts and Techniques. Morgan Kaufmann, second edition, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. M. Herty, A. Klar, and A. K. Singh. An ode traffic network model. J. Comput. Appl. Math., 203(2):419--436, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. J.-H. Huang, S. Amjad, and S. Mishra. Cenwits: a sensor-based loosely coupled search and rescue system using witnesses. In Proc. of SenSys, pages 180--191, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Z. Huang, W. Du, and B. Chen. Deriving private information from randomized data. In Proc. of ACM SIGMOD Conference, pages 37--48, June 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. B. Hull et al. Cartel: a distributed mobile sensor computing system. In Proc. of SenSys, pages 125--138, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. M. G. Kang and A. K. Katsaggelos. General choice of the regularization functional in regularized image restoration. IEEE Transaction on Image Processing, 4(5):594--602, May 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. H. Kargutpa, S. Datta, Q. Wang, and K. Sivakumar. On the privacy preserving properties of random data perturbation techniques. In Proc. of the IEEE ICDM, pages 99--106, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. A. Krause, E. Horvitz, A. Kansal, and F. Zhao. Toward community sensing. In Proc. of IPSN, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. R. E. Mickens, D. N. Brewley, and M. L. Russell. A model of dieting. SIAM Review, 40(3):667--672, September 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. S. R. M. Oliveira and O. R. Zaiane. Privacy preservation when sharing data for clustering. In Proc. of International Workshop on Secure Data Management in a Connected World, pages 67--82, August 2004.Google ScholarGoogle ScholarCross RefCross Ref
  28. S. Papadimitriou, F. Li, G. Kollios, and P. S. Yu. Time series compressibility and privacy. In Proc. of VLDB '07, pages 459--470, September 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. A. Parker et al. Network system challenges in selective sharing and verification for personal, social, and urban-scale sensing applications. In Proceedings of HotNets-V, pages 37--42, 2006.Google ScholarGoogle Scholar
  30. PoolView. http://smart-attire.cs.uiuc.edu/poolview/.Google ScholarGoogle Scholar
  31. PoolView Protocol Specifications. http://smart-attire.cs.uiuc.edu/poolview/files/fdtp.pdf.Google ScholarGoogle Scholar
  32. S. Reddy et al. Image browsing, processing, and clustering for participatory sensing: Lessons from a dietsense prototype. In Proc of EmNets, pages 13--17, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. SciLab. www.scilab.org.Google ScholarGoogle Scholar
  34. A. N. Tikhonov and V. Y. Arsenin. Solution of Ill Posed Problems. V. H. Winstons and Sons, 1977.Google ScholarGoogle Scholar
  35. S. L. Warner. Randomized response: A survey technique for eliminating evasive answer bias. Jnl of the American Stat Association, 60(309):63--69, March 1965.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. PoolView: stream privacy for grassroots participatory sensing

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          SenSys '08: Proceedings of the 6th ACM conference on Embedded network sensor systems
          November 2008
          468 pages
          ISBN:9781595939906
          DOI:10.1145/1460412

          Copyright © 2008 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 5 November 2008

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate174of867submissions,20%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader