2008
DOI: 10.1007/978-3-540-79576-6_17
|View full text |Cite
|
Sign up to set email alerts
|

AnonySense: Opportunistic and Privacy-Preserving Context Collection

Abstract: Abstract. Opportunistic sensing allows applications to "task" mobile devices to measure context in a target region. For example, one could leverage sensorequipped vehicles to measure traffic or pollution levels on a particular street, or users' mobile phones to locate (Bluetooth-enabled) objects in their neighborhood. In most proposed applications, context reports include the time and location of the event, putting the privacy of users at increased risk-even if a report has been anonymized, the accompanying ti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
60
0

Year Published

2008
2008
2019
2019

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 75 publications
(60 citation statements)
references
References 27 publications
0
60
0
Order By: Relevance
“…This can be done using pre-defined campaigns that specify the data to collect, when to collect that data, and how to aggregate it [Burke et al 2006;Kapadia et al 2008]. Then, during the course of receiving data, the portal pseudo-randomly requests the mobile proxy for the latest window of signed raw data used to compute the just received aggregate (the proxy needs to buffer this data).…”
Section: Secure Tasking and Aggregationmentioning
confidence: 99%
“…This can be done using pre-defined campaigns that specify the data to collect, when to collect that data, and how to aggregate it [Burke et al 2006;Kapadia et al 2008]. Then, during the course of receiving data, the portal pseudo-randomly requests the mobile proxy for the latest window of signed raw data used to compute the just received aggregate (the proxy needs to buffer this data).…”
Section: Secure Tasking and Aggregationmentioning
confidence: 99%
“…If ρ does not reach the threshold τ , the node decreases ρ by 1 k , chooses a friend by random out of k-1 friends (excluding the previous node who sent the image to the node to avoid sending messages back and forth between two users.) and sends m (line [12][13][14]. If the current user only has one friend, it starts over the HP 3 algorithm (line 10).…”
Section: A Message Routing Algorithmmentioning
confidence: 99%
“…Although the context in participatory sensing networks is different from locationbased services, the principle of k-anonymity can be used to address location privacy problems in such scenario as well. In [6], [12], the authors employed k-anonymity by generalizing k users into a tile of the spatial tessellation so that each one of them is indistinguishable from k-1 other users. Huang et al [8] extended the same idea by using a microaggregation method to find the best coordinates to represent tiles which decreased the data distortion error.…”
Section: Introductionmentioning
confidence: 99%
“…While the above mentioned works try to protect the privacy of users accessing a remote service, the AnonySense system [48] is aimed at supporting privacy in opportunistic sensing applications, i.e., applications that leverage opportunistic networks formed by mobile devices to acquire aggregated context data in a particular region. To reach this goal, the geographic area is logically partitioned into tiles large enough to probabilistically gain k-anonymity; i.e., regions visited with high probability by more than k persons during a given time granule.…”
Section: Obfuscation Of Context Datamentioning
confidence: 99%