Abstract
Proliferation of pervasive devices capturing sensible data streams, e.g. mobility records, raise concerns on individual privacy. Even if the data is aggregated at a central server, location data may identify a particular person. Thus, the transmitted data must be guarded against re-identification and an un-trusted server. This paper overcomes limitations of previous works and provides a privacy preserving aggregation framework for distributed data streams. Individual location data is obfuscated to the server and just aggregates of k persons can be processed. This is ensured by use of Pailler’s homomorphic encryption framework and Shamir’s secret sharing procedure. In result we obtain anonymous unification of the data streams in an un-trusted environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
References
Abul, O., Bonchi, F., & Nanni, M. (2008). Never walk alone: Uncertainty for anonymity in moving objects databases. In Proceedings of the 2008 IEEE 24th International Conference on Data Engineering (ICDE’08) (pp. 376–385). Washington, D.C., USA: IEEE Computer Society.
Andrienko, N., Andrienko, G., Stange, H., Liebig, T., & Hecker, D. (2012). Visual analytics for understanding spatial situations from episodic movement data. KI—Künstliche Intelligenz (pp. 241–251).
Andrienko, G., Gkoulalas-Divanis, A., Gruteser, M., Kopp, C., Liebig, T., & Rechert, K. (2013). Report from dagstuhl: The liberation of mobile location data and its implications for privacy research. ACM SIGMOBILE Mobile Computing and Communications Review, 17(2), 7–18.
Bockermann, C., & Blom, H. (2012). The streams framework (p. 12). TU Dortmund University, Technical Report 5.
Bockermann, C., & Blom, H. (2012). Processing data streams with the rapidminer streams-plugin. In Proceedings of the 3rd RapidMiner Community Meeting and Conference.
Boutsis, I., & Kalogeraki, V. (2013). Privacy preservation for participatory sensing data. In 2014 IEEE International Conference on Pervasive Computing and Communications (PerCom) (pp. 103–113).
Clifton, C., et al. (2004). Privacy-preserving data integration and sharing. In DMKD (pp. 19–26).
Damgård, I., & Jurik, M. (2001). A generalisation, a simplification and some applications of paillier’s probabilistic public-key system. In Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography (PKC’01) (pp. 119–136). London, UK: Springer.
Duan, Y. (2009). Privacy without noise. In Proceedings of the 18th ACM Conference on Information and Knowledge Management (CIKM’09) (pp. 1517–1520). New York, USA: ACM.
Dwork, C., McSherry, F., Nissim, K., & Smith, A. (2006). Calibrating noise to sensitivity in private data analysis. In Proceedings of the Third Conference on Theory of Cryptography (TCC’06) (pp. 265–284). Berlin, Heidelberg: Springer.
Florescu, S. C., Mock, M., Körner, C., & May, M. (2012). Efficient mobility pattern detection on mobile devices. In Proceedings of the ECAI’12 Workshop on Ubiquitous Data Mining (pp. 23–27).
Giannotti, F., & Pedreschi, D. (2008). Mobility, data mining and privacy—geographic knowledge discovery. Berlin: Springer.
Hoh, B., Iwuchukwu, T., Jacobson, Q., Work, D. B., Bayen, A. M., Herring, R., et al. (2012). Enhancing privacy and accuracy in probe vehicle-based traffic monitoring via virtual trip lines. IEEE Transactions on Mobile Computing, 11(5), 849–864.
Johnson, D. S. (1984). The NP-completeness column: An ongoing guide. Journal of Algorithms, 5(3), 433–447.
Kopp, C., Mock, M., & May, M. (2012). Privacy-preserving distributed monitoring of visit quantities. In Proceedings of the 20th International Conference on Advances in Geographic Information Systems (SIGSPATIAL’12) (pp. 438–441). New York, USA: ACM.
Lamport, L. (1981). Password authentication with insecure communication. Communications of the ACM, 24(11), 770–772.
Liebig, T. (2014). Privacy preserving aggregation of distributed mobility data streams. In Proceedings of the 11th Symposium on Location-Based Services (pp. 86–99).
Liebig, T., Körner, C., & May, M. (2008). Scalable sparse bayesian network learning for spatial applications. In IEEE International Conference on Data Mining Workshops, 2008 (ICDMW’08) (pp. 420–425). IEEE.
Liebig, T., Körner, C., & May, M. (2009). Fast visual trajectory analysis using spatial bayesian networks. In IEEE International Conference on Data Mining Workshops, 2009 (ICDMW’09) (pp. 668–673). IEEE.
Monreale, A., Andrienko, G., Andrienko, N., Giannotti, F., Pedreschi, D., Rinzivillo, S., et al. (2010). Movement data anonymity through generalization. Journal of Transactions on Data Privacy, 3(2), 91–121.
Monreale, A., Wang, W., Pratesi, F., Rinzivillo, S., Pedreschi, D., Andrienko, G., & Andrienko, N. (2013). Privacy-preserving distributed movement data aggregation. In Geographic Information Science at the Heart of Europe. Lecture Notes in Geoinformation and Cartography (pp. 225–245). Berlin: Springer International Publishing.
Muralidhar, K., & Sarathy, R. (2011). Does differential privacy protect terry gross’ privacy? In J. Domingo-Ferrer & E. Magkos (Eds.), Privacy in Statistical Databases (Vol. 6344, pp. 200–209). Lecture Notes in Computer Science. Berlin, Heidelberg: Springer.
NSA slides explain the PRISM data-collection program. The Washington Post. Available: http://www.washingtonpost.com/wp-srv/special/politics/prism-collection-documents/. [Last accessed: 23 June 2013] (06 June 2013).
Paillier, P. (1999). Public-key cryptosystems based on composite degree residuosity classes. In Proceedings of the 17th International Conference on Theory and Application of Cryptographic Techniques (EUROCRYPT’99) (pp. 223–238). Berlin, Heidelberg: Springer.
Rivest, R. L., Shamir, A., & Adleman, L. (1983). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 26(1), 96–99.
Schnitzler, F., Liebig, T., Mannor, S., Souto, G., Bothe, S., & Stange, H. (2014). Heterogeneous stream processing for disaster detection and alarming. In IEEE International Conference on Big Data (pp. 914–923). Piscataway: IEEE Press.
Shamir, A. (1979). How to share a secret. Communications of the ACM, 22(22), 612–613.
Acknowledgments
This work is funded by the EU FP7 INSIGHT (www.insight-ict.eu) project (Intelligent Synthesis and Real-time Response using Massive Streaming of Heterogeneous Data), 318225.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Liebig, T. (2015). Privacy Preserving Centralized Counting of Moving Objects. In: Bacao, F., Santos, M., Painho, M. (eds) AGILE 2015. Lecture Notes in Geoinformation and Cartography. Springer, Cham. https://doi.org/10.1007/978-3-319-16787-9_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-16787-9_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-16786-2
Online ISBN: 978-3-319-16787-9
eBook Packages: Earth and Environmental ScienceEarth and Environmental Science (R0)