skip to main content
10.1145/2070942.2070961acmconferencesArticle/Chapter ViewAbstractPublication PagessensysConference Proceedingsconference-collections
research-article

YouProve: authenticity and fidelity in mobile sensing

Published: 01 November 2011 Publication History

Abstract

As more services have come to rely on sensor data such as audio and photos collected by mobile phone users, verifying the authenticity of this data has become critical for service correctness. At the same time, clients require the flexibility to tradeoff the fidelity of the data they contribute for resource efficiency or privacy. This paper describes YouProve, a partnership between a mobile device's trusted hardware and software that allows untrusted client applications to directly control the fidelity of data they upload and services to verify that the meaning of source data is preserved. The key to our approach is trusted analysis of derived data, which generates statements comparing the content of a derived data item to its source. Experiments with a prototype implementation for Android demonstrate that YouProve is feasible. Our photo analyzer is over 99% accurate at identifying regions changed only through meaning-preserving modifications such as cropping, compression, and scaling. Our audio analyzer is similarly accurate at detecting which sub-clips of a source audio clip are present in a derived version, even in the face of compression, normalization, splicing, and other modifications. Finally, performance and power costs are reasonable, with analyzers having little noticeable effect on interactive applications and CPU-intensive analysis completing asynchronously in under 70 seconds for 5-minute audio clips and under 30 seconds for 5-megapixel photos.

Supplemental Material

MP4 File

References

[1]
TPM Emulator. http://tpm-emulator.berlios.de/.
[2]
TrouSerS. http://trousers.sourceforge.net/.
[3]
Network Time Protocol (Version 3) Specification, Implementation and Analysis. IETF, March 1992.
[4]
ARM Security Technology Building a Secure System using TrustZone Technology. ARM Technical Paper, 2009.
[5]
Trusted Computing Group (TCG) Mobile Trusted Module Specification 1.0, version 7.02. TCG Published, April 2010.
[6]
X. Bao, T. Narayan, A. A. Sani, W. Richter, R. R. Choudhury, L. Zhong, and M. Satyanarayanan. The Case for Context-Aware Compression. In HotMobile, 2011.
[7]
H. Bay, A. Ess, T. Tuytelaars, and L. Van Gool. Speeded-Up Robust Features (SURF). Comput. Vis. Image Underst., 110:346--359, June 2008.
[8]
J. Burke, D. Estrin, M. Hansen, A. Parker, N. Rmanathan, S. Reddy, and M. B. Srivastava. Participatory Sensing. In World-Sensor-Web, 2006.
[9]
J. R. Douceur. The Sybil Attack. In IPTPS, 2001.
[10]
A. Dua, N. Bulusu, W. chang Feng, and W. Hu. Towards Trustworthy Participatory Sensing. In HotSec, 2009.
[11]
W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smart-phones. In OSDI, 2010.
[12]
A. Fox, S. D. Gribble, E. A. Brewer, and E. Amir. Adapting to Network and Client Variability via On-Demand Dynamic Distillation. In ASPLOS, 1996.
[13]
S. Gaonkar, J. Li, R. R. Choudhury, L. Cox, and A. Schmidt. Micro-Blog: Sharing and Querying Content Through Mobile Phones and Social Participation. In MobiSys, 2008.
[14]
P. Gilbert, L. P. Cox, J. Jung, and D. Wetherall. Toward Trustworthy Mobile Sensing. In HotMobile, 2010.
[15]
M. Gruteser and D. Grunwald. Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In MobiSys, 2003.
[16]
R. Gummadi, H. Balakrishnan, P. Maniatis, and S. Ratnasamy. Not-a-Bot: Improving Service Availability in the Face of Botnet Attacks. In NSDI, 2009.
[17]
B. Hoh, M. Gruteser, R. Herring, J. Ban, D. Work, J.-C. Herrera, A. M. Bayen, M. Annavaram, and Q. Jacobson. Virtual Trip Lines for Distributed Privacy-Preserving Traffic Monitoring. In MobiSys, 2008.
[18]
J. Kincaid. Foursquare Starts To Enforce The Rules, Cracks Down On Fake Check-Ins. TechCrunch, April 2010.
[19]
E. D. Lara, D. S. Wallach, and W. Zwaenepoel. Puppeteer: Component-based Adaptation for Mobile Computing. In USITS, 2001.
[20]
W. Laube. Sickening tsunami of faked photos. The Sydney Morning Herald, March 2011.
[21]
V. Lenders, E. Koukoumidis, P. Zhang, and M. Martonosi. Location-based Trust for Mobile User-generated Content: Applications, Challenges and Implementations. In HotMobile, 2008.
[22]
J. M. McCune, B. J. Parno, A. Perrig, M. K. Reiter, and H. Isozaki. Flicker: An Execution Infrastructure for TCB Minimization. In EuroSys, 2008.
[23]
R. J. Moore. Instagram Now Adding 130,000 Users Per Week: An Analysis. TechCrunch, March 2011.
[24]
M. Mun, S. Reddy, K. Shilton, N. Yau, J. Burke, D. Estrin, M. Hansen, E. Howard, R. West, and P. Boda. PEIR, the Personal Environmental Impact Report, as a Platform for Participatory Sensing Systems Research. In MobiSys, 2009.
[25]
M. Nauman, S. Khan, X. Zhang, and J.-P. Seifert. Beyond Kernel-level Integrity Measurement: Enabling Remote Attestation for the Android Platform. In TRUST, 2010.
[26]
E. M. Newton, L. Sweeney, and B. Malin. Preserving Privacy by De-Identifying Face Images. IEEE Transactions on Knowledge and Data Engineering, 17, February 2005.
[27]
B. D. Noble, M. Satyanarayanan, D. Narayanan, J. E. Tilton, J. Flinn, and K. R. Walker. Agile Application-Aware Adaptation for Mobility. In SOSP, 1997.
[28]
S. Odio. More Beautiful Photos. Official Facebook Blog, September 2010.
[29]
N. Santos, H. Raj, S. Saroiu, and A. Wolman. Trusted Language Runtime (TLR): Enabling Trusted Applications on Smartphones. In HotMobile, 2011.
[30]
S. Saroiu and A. Wolman. Enabling New Mobile Applications with Location Proofs. In HotMobile, 2009.
[31]
S. Saroiu and A. Wolman. I am a Sensor, and I Approve This Message. In HotMobile, 2010.
[32]
F. B. Schneider, K. Walsh, and E. G. Sirer. Nexus Authorization Logic (NAL): Design Rationale and Applications. ACM Transactions on Information and System Security, 14(1), May 2011.
[33]
T. F. Smith and M. S. Waterman. Identification of common molecular subsequences. Journal of molecular biology, 147(1):195--197, Mar. 1981.
[34]
S. J. Snyder. Gotham Tornado: Amazing Photo of Twister Passing Statue of Liberty. Time Newsfeed, September 2010.
[35]
A. Wang. An Industrial Strength Audio Search Algorithm. In ISMIR, 2003.
[36]
J. Winter. Trusted Computing Building Blocks for Embedded Linux-based ARM TrustZone Platforms. In STC Workshop, Oct. 2008.
[37]
X. Zhang, O. Aciiçmez, and J.-P. Seifert. Building Efficient Integrity Measurement and Attestation for Mobile Phone Platforms. In MobiSec, June 2009.

Cited By

View all
  • (2024)ProvCam: A Camera Module with Self-Contained TCB for Producing Verifiable VideosProceedings of the 30th Annual International Conference on Mobile Computing and Networking10.1145/3636534.3649383(588-602)Online publication date: 29-May-2024
  • (2022)SchrodinText: Strong Protection of Sensitive Textual Content of Mobile ApplicationsIEEE Transactions on Mobile Computing10.1109/TMC.2020.302511921:4(1402-1419)Online publication date: 1-Apr-2022
  • (2021)A Lossless Data-Hiding based IoT Data Authenticity Model in Edge-AI for Connected LivingACM Transactions on Internet Technology10.1145/345317122:3(1-25)Online publication date: 6-Dec-2021
  • Show More Cited By

Index Terms

  1. YouProve: authenticity and fidelity in mobile sensing

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      SenSys '11: Proceedings of the 9th ACM Conference on Embedded Networked Sensor Systems
      November 2011
      452 pages
      ISBN:9781450307185
      DOI:10.1145/2070942
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 01 November 2011

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. participatory sensing
      2. privacy
      3. trusted computing

      Qualifiers

      • Research-article

      Funding Sources

      Conference

      Acceptance Rates

      SenSys '11 Paper Acceptance Rate 24 of 123 submissions, 20%;
      Overall Acceptance Rate 198 of 990 submissions, 20%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)20
      • Downloads (Last 6 weeks)1
      Reflects downloads up to 11 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)ProvCam: A Camera Module with Self-Contained TCB for Producing Verifiable VideosProceedings of the 30th Annual International Conference on Mobile Computing and Networking10.1145/3636534.3649383(588-602)Online publication date: 29-May-2024
      • (2022)SchrodinText: Strong Protection of Sensitive Textual Content of Mobile ApplicationsIEEE Transactions on Mobile Computing10.1109/TMC.2020.302511921:4(1402-1419)Online publication date: 1-Apr-2022
      • (2021)A Lossless Data-Hiding based IoT Data Authenticity Model in Edge-AI for Connected LivingACM Transactions on Internet Technology10.1145/345317122:3(1-25)Online publication date: 6-Dec-2021
      • (2021)Trusted Video Streaming on Edge Devices2021 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops)10.1109/PerComWorkshops51409.2021.9431058(655-660)Online publication date: 22-Mar-2021
      • (2019)Streambox-TZProceedings of the 2019 USENIX Conference on Usenix Annual Technical Conference10.5555/3358807.3358853(537-554)Online publication date: 10-Jul-2019
      • (2019)Data Reliability Enhancement Method through Data Validation in Crowdsensing System2019 Eleventh International Conference on Ubiquitous and Future Networks (ICUFN)10.1109/ICUFN.2019.8806104(584-589)Online publication date: Jul-2019
      • (2018)Trusted Operations on Sensor Data †Sensors10.3390/s1805136418:5(1364)Online publication date: 27-Apr-2018
      • (2018)FIRSTACM Transactions on Sensor Networks10.1145/326710515:1(1-35)Online publication date: 15-Dec-2018
      • (2018)VButtonProceedings of the 16th Annual International Conference on Mobile Systems, Applications, and Services10.1145/3210240.3210330(28-40)Online publication date: 10-Jun-2018
      • (2018)SandTrapProceedings of the 16th Annual International Conference on Mobile Systems, Applications, and Services10.1145/3210240.3210321(230-242)Online publication date: 10-Jun-2018
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media