Skip to main content

PEMM: A Privacy-Aware Data Aggregation Solution for Mobile Sensing Networks

  • Conference paper
  • First Online:
Computational Intelligence and Intelligent Systems (ISICA 2015)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 575))

Abstract

By more and more, privacy preservation problem is widely discussed among users and researchers. For mobile sensing network, an imperfect privacy preservation scheme will directly put participants into a dangerous situation. The better privacy protection applied, the better sensing data quality will be achieved. In this paper, we present a privacy-aware data aggregation scheme for mobile sensing networks. We considered both the smart nodes like smart-phone and dumb nodes like wearable device or GPS device. We take the location information and the sensing content into consideration separately. And this thought will make sure the sensing content will be k-anonymous and the accurate location will be protected well either. We use erasure coding technology to slice the sensing data record according to the k-anonymity rules. For the sake of efficiency and stability, we compare two coding technology in two sensing data types and give the experiment results and explanations in detail. After that, we give a social model to describe the social relation and a security data sharing protocol among the participants. The introduction of the participants’ social relation may give a new way to the reputation and data trustworthy evaluation mechanism.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Jose, J., Princy, M., Jose, J.: PEPPDA: power efficient privacy preserving data aggregation for wireless sensor networks. In: 2013 International Conference on Emerging Trends in Computing, Communication and Nanotechnology (ICE-CCN), pp. 330–336, March 2013

    Google Scholar 

  2. Jian, X., Geng, Y., Zhengyu, C., Qianqian, W.: A survey on the privacy-preserving data aggregation in wireless sensor networks. Commun. Chin. 12(5), 162–180 (2015)

    Article  Google Scholar 

  3. Hu, L., Shahabi, C.: Privacy assurance in mobile sensing networks: go beyond trusted servers. In: 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMWorkshops), pp. 613–619, March 2010

    Google Scholar 

  4. Wang, X., Cheng, W., Mohapatra, P., Abdelzaher, T.: Enabling reputation and trust in privacy-preserving mobile sensing. IEEE Trans. Mob. Comput. 13(12), 2777–2790 (2014)

    Article  Google Scholar 

  5. Kalnis, P., Ghinita, G., Mouratidis, K., Papadias, D.: Preventing location-based identity inference in anonymous spatial queries. IEEE Trans. Knowl. Data Eng. 19(12), 1719–1733 (2007)

    Article  Google Scholar 

  6. Yao, Y., Liu, J., Xiong, N.N.: Privacy-preserving data aggregation in two-tiered wireless sensor networks with mobile nodes. Sensors 14(11), 21174 (2014)

    Article  Google Scholar 

  7. Li, N., Zhang, N., Das, S.K., Thuraisingham, B.: Privacy preservation in wireless sensor networks: a state-of-the-art survey. Ad Hoc Netw. 7(8), 1501–1514 (2009). Privacy and Security in Wireless Sensor and Ad Hoc Networks

    Article  Google Scholar 

  8. Ward, J.R., Younis, M.: Increasing base station anonymity using distributed beamforming. Ad Hoc Netw. 32, 53–80 (2015). Internet of Things security and privacy: design methods and optimization

    Article  Google Scholar 

  9. Abuzneid, A.-S., Sobh, T., Faezipour, M., Mahmood, A., James, J.: Fortified anonymous communication protocol for location privacy in wsn: a modular approach. Sensors 15(3), 5820 (2015)

    Article  Google Scholar 

  10. Jhumka, A., Bradbury, M., Leeke, M.: Fake source-based source location privacy in wireless sensor networks. Concurrency Comput. Pract. Exp. 27(12), 2999–3020 (2015)

    Article  Google Scholar 

  11. Qiu, F., Fan, W., Chen, G.: Privacy and quality preserving multimedia data aggregation for participatory sensing systems. IEEE Trans. Mob. Comput. 14(6), 1287–1300 (2015)

    Article  Google Scholar 

  12. Plank, J.S., Simmerman, S., Schuman, C.D.: Jerasure: a library in C/C++ facilitating erasure coding for storage applications - Version 1.2. Technical report CS-08-627, University of Tennessee, August 2008

    Google Scholar 

  13. Wang, H., Zhang, Z., Lin, X., Fang, H.: Socialized WBANs in mobile sensing environments. IEEE Netw. 28(5), 91–95 (2014)

    Article  Google Scholar 

Download references

Acknowledgements

This work is funded by: European Framework Program (FP7) under Grant No. FP7-PEOPLE-2011-IRSES, and by National Natural Science Foundation of China under Grant No. 61073009, and by National Sci-Tech Support Plan of China under Grant No. 2014BAH02F03.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kuo Zhao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Science+Business Media Singapore

About this paper

Cite this paper

Xie, Z., Hu, L., Wang, F., Li, J., Zhao, K. (2016). PEMM: A Privacy-Aware Data Aggregation Solution for Mobile Sensing Networks. In: Li, K., Li, J., Liu, Y., Castiglione, A. (eds) Computational Intelligence and Intelligent Systems. ISICA 2015. Communications in Computer and Information Science, vol 575. Springer, Singapore. https://doi.org/10.1007/978-981-10-0356-1_50

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-0356-1_50

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-0355-4

  • Online ISBN: 978-981-10-0356-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics