Privacy and accountability for location-based aggregate statistics
Raluca Ada Popa,Andrew J. Blumberg,Hari Balakrishnan,Frank Li +3 more
- pp 653-666
Reads0
Chats0
TLDR
This paper develops and evaluates PrivStats, a system for computing aggregate statistics over location data that simultaneously achieves two properties: first, provable guarantees on location privacy even in the face of any side information about users known to the server, and second, privacy-preserving accountability.Abstract:
A significant and growing class of location-based mobile applications aggregate position data from individual devices at a server and compute aggregate statistics over these position streams. Because these devices can be linked to the movement of individuals, there is significant danger that the aggregate computation will violate the location privacy of individuals. This paper develops and evaluates PrivStats, a system for computing aggregate statistics over location data that simultaneously achieves two properties: first, provable guarantees on location privacy even in the face of any side information about users known to the server, and second, privacy-preserving accountability (i.e., protection against abusive clients uploading large amounts of spurious data). PrivStats achieves these properties using a new protocol for uploading and aggregating data anonymously as well as an efficient zero-knowledge proof of knowledge protocol we developed from scratch for accountability. We implemented our system on Nexus One smartphones and commodity servers. Our experimental results demonstrate that PrivStats is a practical system: computing a common aggregate (e.g., count) over the data of 10,000 clients takes less than 0.46 s at the server and the protocol has modest latency (0.6 s) to upload data from a Nexus phone. We also validated our protocols on real driver traces from the CarTel project.read more
Citations
More filters
Book ChapterDOI
The knowledge complexity of interactive proof-systems
TL;DR: Permission to copy without fee all or part of this material is granted provided that the copies arc not made or distributed for direct commercial advantage.
Proceedings ArticleDOI
Unsafe exposure analysis of mobile in-app advertisements
TL;DR: The investigation indicates the symbiotic relationship between embedded ad libraries and host apps is one main reason behind these exposed risks, and clearly shows the need for better regulating the way ad libraries are integrated in Android apps.
Proceedings ArticleDOI
Knock Knock, Who's There? Membership Inference on Aggregate Location Data
TL;DR: In this article, the authors present a game-based definition of membership inference on aggregate location time-series, and cast it as a classification problem where machine learning can be used to distinguish whether or not a target user is part of the aggregates.
Proceedings Article
Prio: private, robust, and scalable computation of aggregate statistics
Henry Corrigan-Gibbs,Dan Boneh +1 more
TL;DR: Prio as mentioned in this paper is a privacy-preserving system for the collection of aggregate statistics, where each client holds a private data value (e.g., its current location), and a small set of servers compute statistical functions over the values of all clients.
Journal ArticleDOI
DIVERT: A Distributed Vehicular Traffic Re-Routing System for Congestion Avoidance
TL;DR: DIVERT is a hybrid system because it still uses a server and Internet communication to determine an accurate global view of the traffic, and balances the user privacy with the re-routing effectiveness.
References
More filters
Book ChapterDOI
Public-key cryptosystems based on composite degree residuosity classes
TL;DR: A new trapdoor mechanism is proposed and three encryption schemes are derived : a trapdoor permutation and two homomorphic probabilistic encryption schemes computationally comparable to RSA, which are provably secure under appropriate assumptions in the standard model.
Book ChapterDOI
How to prove yourself: practical solutions to identification and signature problems
Amos Fiat,Adi Shamir +1 more
TL;DR: Simple identification and signature schemes which enable any user to prove his identity and the authenticity of his messages to any other user without shared or public keys are described.
Book ChapterDOI
Differential privacy: a survey of results
TL;DR: This survey recalls the definition of differential privacy and two basic techniques for achieving it, and shows some interesting applications of these techniques, presenting algorithms for three specific tasks and three general results on differentially private learning.
Book ChapterDOI
Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing
TL;DR: It is shown how to distribute a secret to n persons such that each person can verify that he has received correct information about the secret without talking with other persons.
Proceedings ArticleDOI
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Marco Gruteser,Dirk Grunwald +1 more
TL;DR: A middleware architecture and algorithms that can be used by a centralized location broker service that adjusts the resolution of location information along spatial or temporal dimensions to meet specified anonymity constraints based on the entities who may be using location services within a given area.