{Anonysense}: Privacy-Aware People-Centric Sensing

{Anonysense}: Privacy-Aware People-Centric Sensing

AnonySense: Privacy-Aware People-Centric Sensing Cory Cornelius, Apu Kapadia, Nikos Triandopoulos David Kotz, Dan Peebles, Minho Shin Department of Computer Science Institute for Security Technology Studies University of Aarhus, Denmark Dartmouth College, USA ABSTRACT 1. INTRODUCTION Personal mobile devices are increasingly equipped with the Opportunistic sensing has been gaining popularity, with capability to sense the physical world (through cameras, mi- several systems and applications being proposed to leverage crophones, and accelerometers, for example) and the net- users’ mobile devices to collectively measure environmental work world (with Wi-Fi and Bluetooth interfaces). Such data, sometimes used as context in pervasive-computing ap- devices offer many new opportunities for cooperative sens- plications. In these systems, applications can task mobile ing applications. For example, users’ mobile phones may nodes (such as a user’s sensor-equipped mobile phone or ve- contribute data to community-oriented information services, hicle) in a target region to report context information from from city-wide pollution monitoring to enterprise-wide de- their vicinity. In this model, the system opportunistically tection of unauthorized Wi-Fi access points. This people- hands the task to mobile nodes that choose to participate, centric mobile-sensing model introduces a new security chal- and the nodes report sensor data through opportunistic net- lenge in the design of mobile systems: protecting the privacy work connections (such as third-party access points they en- of participants while allowing their devices to reliably con- counter). Examples of such systems include CarTel [18], tribute high-quality data to these large-scale applications. Mobiscopes [1], Urbanet [31], Urban Atmospheres [40], Ur- We describe AnonySense, a privacy-aware architecture for ban Sensing [8], SenseWeb [32] and our own Metrosense [7] realizing pervasive applications based on collaborative, op- at Dartmouth College. Applications of opportunistic sensing portunistic sensing by personal mobile devices. AnonySense include collecting traffic reports or pollution readings from allows applications to submit sensing tasks that will be a particular street or part of a university campus [18, 7], distributed across anonymous participating mobile devices, finding parking spots [31], locating lost Bluetooth-enabled later receiving verified, yet anonymized, sensor data reports objects with the help of other users’ mobile devices [13], back from the field, thus providing the first secure imple- and even inferring coffee-shop space availability [36]. mentation of this participatory sensing model. We describe Although opportunistic sensing is a best-effort service, it our trust model, and the security properties that drove the can be useful if there is no fixed-sensor infrastructure in the design of the AnonySense system. We evaluate our proto- places where an application desires sensor data. Indeed, by type implementation through experiments that indicate the leveraging personal mobile devices as its sensor nodes, this feasibility of this approach, and through two applications: a model collects context information closely related to real-life Wi-Fi rogue access point detector and a lost-object finder. experience “by the humans, for the humans” and potentially with little or no infrastructure cost. Categories and Subject Descriptors In short, opportunistic sensing introduces a new, people- centric, dynamic and highly mobile communication and com- C.2.4 [Communications]: Distributed Systems; D.4.6 putation model. It raises three major challenges. [Operating Systems]: Security and Protection; H.3.4 First, it depends on a large-scale, inherently heteroge- [Information Systems]: Systems and Software neous and unpredictable collection of users’ personal devices General Terms forming the sensing infrastructure, in which available mobile nodes are tasked with specific context requests and expected Design, Experimentation, Measurement, Security to later report the sensed data. Second, this new model for tasking, sensing, and report- Keywords ing is likely to be implemented across administratively au- mobile sensing, opportunistic sensing, privacy, anonymity tonomous wireless access points and the public Internet. Third and most importantly, opportunistic sensing poses a new security dimension. Users offer the services of their devices for sensing the environment and usually do not gain Permission to make digital or hard copies of all or part of this work for a direct benefit from reporting such data; they, therefore, personal or classroom use is granted without fee provided that copies are will be reluctant to participate in environmental sensing not made or distributed for profit or commercial advantage and that copies if their privacy is at risk, or if it consumes too many re- bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific sources on their mobile device. Since reports usually in- permission and/or a fee. clude the time and location of the sensor reading, the re- MobiSys’08, June 17–20, 2008, Breckenridge, Colorado, USA. port could trivially reveal the user’s location at a particular Copyright 2008 ACM 978-1-60558-139-2/08/06 ...$5.00. time. Furthermore, since context is produced by volunteer We note that AnonySense focuses on anonymous tasking users and is queried and collected through third-party access and reporting, but does not address the leakage of private points, higher-level applications will require certain guaran- information through the reported data. For example, a re- tees about the integrity of the system and the reliability of port containing Alice’s office as the location where the sensor reports. The new challenge is to ensure reliable, efficient, reading was taken leaks information about Alice’s identity. and privacy-preserving context tasking and reporting. In There is a wealth of research focused on this problem, and this paper, we address this challenge and describe how our our architecture can be extended to include techniques such system, AnonySense, incorporates new privacy-aware tech- as k-anonymity and spatio-temporal cloaking [35, 15, 14, 19, niques for secure tasking and reporting, and demonstrate 17] to reduce the leakage of private data through reports. In- that our solution consumes few device resources. Other ma- deed, we propose one such cloaking technique in the context jor systems note these challenges but offer no solutions [1, of AnonySense in another paper [23]. These techniques are, 7, 18, 31, 8, 32]. however, orthogonal to the work presented in this paper, We should note that simply suppressing or anonymizing which focuses on anonymous tasking and reporting. In the the node’s identity in reports [36] is insufficient to protect remainder of the paper, therefore, we assume that such tech- users’ privacy—if multiple reports from nodes can be linked niques are used in conjunction with our tasking-reporting as being from the same user, they may reveal the identity of protocol. the user [24]. Cryptographic unlinkability [4] is insufficient if various reports uploaded by a user can be linked based on Our contributions. the timing of the reports. Care must be taken, therefore, We summarize the contributions of our work in the con- to ensure that multiple reports from the same user are un- text of the design, implementation, and evaluation of mobile linkable through timing attacks. Prior approaches provide systems and applications as follows: only part of the solution for anonymous tasking and report- ing, because they focus either on a narrow set of pre-defined • We present AnonySense, a general-purpose framework applications, or only parts of the tasking and reporting life- for anonymous opportunistic tasking and reporting, cycle. which, by design, allows applications to query and re- To this end, we present AnonySense, an application- ceive context through an expressive task language and independent infrastructure for realizing anonymous tasking by leveraging a broad range of sensor types on users’ and reporting that is designed from the ground up to provide mobile devices, and at the same time respects the pri- users with privacy. AnonySense provides a new tasking lan- vacy of users. guage that can express a rich set of context queries; applica- • We have implemented AnonySense and through exper- tions can deliver tasks to anonymous nodes, and eventually iments we show that our privacy-aware tasking and collect verifiable, yet unlinkable, reports from anonymous reporting approach can be realized efficiently, that is, nodes. We use a stringent threat model that adopts min- consuming little CPU time, network bandwidth, and imal trust assumptions: in particular, we assume that the battery energy. mobile-device carriers do not completely trust the system, the applications, or the users of the applications, with the • We demonstrate the flexibility and feasibility of anonymity of the reports produced by their mobile devices. AnonySense in supporting collaborative-sensing appli- AnonySense is designed so that no entity should be able to cations by presenting two such prototype applications: link a report to a particular carrier and, additionally, so that RogueFinder and ObjectFinder. no intermediate entity can infer information about what is reported, tamper with tasks, or falsify reports. To the best of our knowledge, AnonySense is the first se- Paper outline.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    14 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us