Catching Cheats with Interactive Proofs: Privacy-preserving Crowd-sourced Data Collection Without Compromising Integrity
نویسندگان
چکیده
Crowd-sourced sensing systems allow people to voluntarily contribute sensor data from mobile devices. They enable numerous applications, including weather and traffic monitoring. However, their proliferation is at risk if the problems of data integrity and privacy persist. People will be reluctant to contribute sensitive information if they cannot trust the system to maintain their privacy, and the system will be reluctant to accept any data transformed to preserve privacy without proof that the transformation was computed accurately. We present an interactive proof protocol that allows an intermediary to convince a data consumer that it is accurately performing a privacy-preserving transformation with inputs from trusted sources, without providing those inputs to the consumer. We provide soundness and correctness proofs for the protocol, discuss its current limitations, and describe its parameters and their effect on data integrity and privacy when tweaked.
منابع مشابه
Privacy-Preserving Online Mixing of High Integrity Mobile Multi-user Data
Crowd-sourced sensing systems facilitate unprecedented insight into our local environments by leveraging voluntarily contributed data from the impressive array of smartphone sensors (GPS, audio, image, accelerometer, etc.). However, user participation in crowd-sourced sensing will be inhibited if people cannot trust the system to maintain their privacy. On the other hand, data modified for priv...
متن کاملN Heads Are Better Than One
Social network platforms have transformed how people communicate and share information. However, as these platforms have evolved, the ability for users to control how and with whom information is being shared introduces challenges concerning the configuration and comprehension of privacy settings. To address these concerns, our crowd sourced approach simplifies the understanding of privacy sett...
متن کاملZØ: An Optimizing Distributing Zero-Knowledge Compiler
Applications increasingly rely on privacy-sensitive user data, but storing user’s data in the cloud creates challenges for the application provider, as concerns arise relating to the possibility of data leaks, responding to regulatory pressure, and initiatives such as DoNotTrack. However, storing data in the cloud is not the only option: a recent trend explored in several recent research projec...
متن کاملPrivacy and security protection in cloud integrated sensor networks
Wireless sensor networks have been widely deployed in many social settings to monitor human activities and urban environment. In these contexts, they acquire and collect sensory data, and collaboratively fuse the data. Due to resource constraint, sensor nodes however cannot perform complex data processing. Hence, cloud-integrated sensor networks have been proposed to leverage the cloud computin...
متن کاملCan You Have Your Cake and Eat It Too? Sharing Healthcare Data Without Compromising Privacy and Confidentiality
One major concern with electronic healthcare data relates to preserving the privacy and confidentiality of such data. The recent Health Insurance Portability and Accountability Act (HIPAA) of 1996 has established national standards for the protection of health information. The National Institutes of Health also requires healthcare researchers to share data regarding their subjects, but without ...
متن کامل