ABSTRACT
We discuss the problem of building a user-acceptable infrastructure for a large organisation that wishes to measure its employees' travel-to-work carbon footprint, based on the gathering of high resolution geolocation data on employees in a privacy-sensitive manner. This motivated the construction of a distributed system of personal containers in which individuals record fine-grained location information into a private data-store which they own, and from which they can trade portions of data to the organisation in return for specific benefits. This framework can be extended to gather a wide variety of personal data and facilitates the transformation of private information into a public good, with minimal and assessable loss of individual privacy.
This is currently a work in progress. We report on the hardware, software and social aspects of piloting this scheme on the University of Cambridge's experimental cloud service, as well as contrasting it to a traditional centralised model.
- R. Chen, A. Reznichenko, and P. Francis. Towards statistical queries over distributed private user data. In proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation. USENIX, 2012. Google ScholarDigital Library
- J. Crowcroft, A. Madhavapeddy, M. Schwarzkopf, T. Hong, and R. Mortier. Unclouded vision. In proceedings of the 12th International Conference on Distributed Computing and Networking, ICDCN'11, pages 29--40. Springer-Verlag, 2011. ISBN 3-642-17678-X, 978-3-642-17678-4. Google ScholarDigital Library
- W. Du and Z. Zhan. Using randomized response techniques for privacy-preserving data mining. In proceedings of the ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD '03, pages 505--510. ACM, 2003. ISBN 1-58113-737-0. doi: 10.1145/956750.956810. Google ScholarDigital Library
- B. Krishnamurthy and C. E. Wills. Characterizing privacy in online social networks. In proceedings of the first workshop on Online Social Networks, WOSN '08, pages 37--42. ACM, 2008. ISBN 978-1-60558-182-8. doi: 10.1145/1397735. 1397744. Google ScholarDigital Library
- B. Krishnamurthy and C. E. Wills. On the leakage of personally identifiable information via online social networks. SIGCOMM Comput, Commun. Rev., 40(1):112--117, Jan. 2010. ISSN 0146--4833. doi: 10.1145/1672308.1672328. Google ScholarDigital Library
- D. McAuley, R. Mortier, and J. Goulding. The dataware manifesto. In COMSNETS'11, pages 1--6, 2011.Google ScholarCross Ref
- F. D. McSherry. Privacy integrated queries: an extensible platform for privacy-preserving data analysis. In proceedings of the 35th SIGMOD international conference on Management of Data, SIGMOD '09, pages 19--30. ACM, 2009. ISBN 978-1-60558-551-2. doi: 10.1145/1559845.1559850. Google ScholarDigital Library
- A. Narayanan and V. Shmatikov. Robust de-anonymization of large sparse datasets. In proceedings of the 2008 IEEE Symposium on Security and Privacy, SP '08, pages 111--125. IEEE Computer Society, 2008. ISBN 978-0-7695-3168-7. doi: 10.1109/SP.2008.33. Google ScholarDigital Library
- U. of Cambridge. Travel plan. URL http://www.admin.cam.ac.uk/offices/em/travel/plan/Travel_Plan_2011.pdf.Google Scholar
- U. of Cambridge. Travel for work survey report, 2010. URL http://www.admin.cam.ac.uk/offices/em/travel/plan/TfW_2010_Survey_Report_University_of_Cambridge.pdf.Google Scholar
- U. of Cambridge. Carbon management plan 2010--2020, Sept. 2010. URL http://www.admin.cam.ac.uk/offices/em/sustainability/environment/climate/cmp.pdf.Google Scholar
- D. Quercia, I. Leontiadis, L. McNamara, C. Mascolo, and J. Crowcroft. Spotme if you can: Randomized responses for location obfuscation on mobile phones. In Proceedings of the 31st International Conference on Distributed Computing Systems, ICDCS '11, pages 363--372. IEEE Computer Society, 2011. ISBN 978-0-7695-4364-2. doi: 10.1109/ICDCS.2011. 79. Google ScholarDigital Library
Index Terms
- Confidential carbon commuting: exploring a privacy-sensitive architecture for incentivising 'greener' commuting
Recommendations
Disclosure Control of Confidential Data by Applying Pac Learning Theory
This paper examines privacy protection in a statistical database from the perspective of an intruder using learning theory to discover private information. With the rapid development of information technology, massive data collection is relatively ...
Understanding sharing preferences and behavior for mHealth devices
WPES '12: Proceedings of the 2012 ACM workshop on Privacy in the electronic societyIf people are not in control of the collection and sharing of their personal health information collected using mobile health (mHealth) devices and applications, privacy concerns could limit their willingness to use and reduce potential benefits ...
Covert channels in privacy-preserving identification systems
CCS '07: Proceedings of the 14th ACM conference on Computer and communications securityWe examine covert channels in privacy-enhanced mobile identification devices where the devices uniquely identify themselves to an authorized verifier. Such devices (e.g. RFID tags) are increasingly commonplace in hospitals and many other environments. ...
Comments