Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3434770.3459735acmconferencesArticle/Chapter ViewAbstractPublication PageseurosysConference Proceedingsconference-collections
research-article
Open access

Privacy-Preserving Crowd-Monitoring Using Bloom Filters and Homomorphic Encryption

Published: 26 April 2021 Publication History

Abstract

This paper introduces an architecture for crowd-monitoring which allows statistical counting for pedestrian dynamics while considering privacy-preservation for the individuals being sensed. Monitoring crowds of pedestrians has been an interesting area of study for many years. The recent prevalence of mobile devices paved the way for wide-scale deployments of infrastructures which perform automated sensing. Suddenly, people could be discreetly monitored by leveraging radio signals such as Wi-Fi probe requests periodically sent by their devices. However, this monitoring process implies dealing with sensitive data which is prone to privacy infringement by nature. While routinely performing their tasks, parties involved in this process can try to infer private information about individuals from the data they handle. Following privacy by design principles, we envision a construction which protects the short-term storage and processing of the collected privacy-sensitive sensor readings with strong cryptographic guarantees such that only the end-result (i.e. a statistical count) becomes available in the clear. We combine Bloom filters, to facilitate set membership testing for counting, with homomorphic encryption, to allow the oblivious performance of operations under encryption. We carry out an implementation of our solution using a resource-constrained device as a sensor and perform experiments which demonstrate its feasibility in practice.

References

[1]
Mehmet Adalier and Antara Teknik. 2015. Efficient and secure elliptic curve cryptography implementation of Curve P-256. In Workshop on Elliptic Curve Cryptography Standards, Vol. 66.
[2]
Mohammad Alaggan, Mathieu Cunche, and Sébastien Gambs. 2018. Privacy-preserving wi-fi analytics. Proceedings on Privacy Enhancing Technologies 2018, 2 (2018), 4--26.
[3]
Austin Appleby. 2016. MurmurHash3. (2016). https://github.com/aappleby/smhasher/wiki/MurmurHash3
[4]
Giuseppe Bianchi, Lorenzo Bracciale, and Pierpaolo Loreti. 2012. "Better Than Nothing" Privacy with Bloom Filters: To What Extent?. In International Conference on Privacy in Statistical Databases. Springer, 348--363.
[5]
Burton H Bloom. 1970. Space/time trade-offs in hash coding with allowable errors. Commun. ACM 13, 7 (1970), 422--426.
[6]
Bram Bonné, Arno Barzan, Peter Quax, and Wim Lamotte. 2013. WiFiPi: Involuntary tracking of visitors at mass events. In 2013 IEEE 14th International Symposium on" A World of Wireless, Mobile and Multimedia Networks"(WoWMoM). IEEE, 1--6.
[7]
Prosenjit Bose, Hua Guo, Evangelos Kranakis, Anil Maheshwari, Pat Morin, Jason Morrison, Michiel Smid, and Yihui Tang. 2008. On the false-positive rate of Bloom filters. Inform. Process. Lett. 108, 4 (2008), 210--213.
[8]
Mathieu Cunche. 2014. I know your MAC Address: Targeted tracking of individual using Wi-Fi. Journal of Computer Virology and Hacking Techniques 10, 4 (2014), 219--227.
[9]
Mathieu Cunche, Mohamed-Ali Kaafar, and Roksana Boreli. 2014. Linking wireless devices using information contained in Wi-Fi probe requests. Pervasive and Mobile Computing 11 (2014), 56--69.
[10]
Levent Demir, Mathieu Cunche, and Cédric Lauradoux. 2014. Analysing the privacy policies of Wi-Fi trackers. In Proceedings of the 2014 workshop on physical analytics. 39--44.
[11]
Levent Demir, Amrit Kumar, Mathieu Cunche, and Cedric Lauradoux. 2017. The pitfalls of hashing for privacy. IEEE Communications Surveys & Tutorials 20, 1 (2017), 551--565.
[12]
Yael Ejgenberg, Moriya Farbstein, Meital Levy, and Yehuda Lindell. 2012. SCAPI: The Secure Computation Application Programming Interface. IACR Cryptol. ePrint Arch. 2012 (2012), 629.
[13]
Taher ElGamal. 1985. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE transactions on information theory 31, 4 (1985), 469--472.
[14]
Michael Kamp, Christine Kopp, Michael Mock, Mario Boley, and Michael May. 2013. Privacy-preserving mobility monitoring using sketches of stationary sensor readings. In Joint European Conference on Machine Learning and Knowledge Discovery in Databases. Springer, 370--386.
[15]
Jeremy Martin, Travis Mayberry, Collin Donahue, Lucas Foppe, Lamont Brown, Chadwick Riggins, Erik C Rye, and Dane Brown. 2017. A study of MAC address randomization in mobile devices and when it fails. Proceedings on Privacy Enhancing Technologies 2017, 4 (2017), 365--383.
[16]
Matthias Marx, Ephraim Zimmer, Tobias Mueller, Maximilian Blochberger, and Hannes Federrath. 2018. Hashing of personally identifiable information is not sufficient. SICHERHEIT 2018 (2018).
[17]
ABM Musa and Jakob Eriksson. 2012. Tracking unmodified smartphones using wi-fi monitors. In Proceedings of the 10th ACM conference on embedded network sensor systems. 281--294.
[18]
Ronald L Rivest, Len Adleman, Michael L Dertouzos, et al. 1978. On data banks and privacy homomorphisms. Foundations of secure computation 4, 11 (1978), 169--180.
[19]
Florin Rusu and Alin Dobra. 2007. Statistical analysis of sketch estimators. In Proceedings of the 2007 ACM SIGMOD international conference on Management of data. 187--198.
[20]
Lorenz Schauer, Martin Werner, and Philipp Marcus. 2014. Estimating crowd densities and pedestrian flows using wi-fi and bluetooth. In Proceedings of the 11th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. 171--177.
[21]
Mathy Vanhoef, Célestin Matte, Mathieu Cunche, Leonardo S Cardoso, and Frank Piessens. 2016. Why MAC address randomization is not enough: An analysis of Wi-Fi network discovery mechanisms. In Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security. 413--424.

Cited By

View all
  • (2024)Attendance Tracking System using Many Battery-free Photovoltaic Bluetooth Beacon BadgesProceedings of the 12th International Workshop on Energy Harvesting and Energy-Neutral Sensing Systems10.1145/3698384.3699613(15-20)Online publication date: 4-Nov-2024
  • (2024)Privacy‐preserving WiFi‐based crowd monitoringTransactions on Emerging Telecommunications Technologies10.1002/ett.495635:3Online publication date: 5-Mar-2024
  • (2023)Privacy-Aware Crowd Monitoring and WiFi Traffic Emulation for Effective Crisis Management2023 International Conference on Information and Communication Technologies for Disaster Management (ICT-DM)10.1109/ICT-DM58371.2023.10286944(1-6)Online publication date: 13-Sep-2023
  • Show More Cited By

Index Terms

  1. Privacy-Preserving Crowd-Monitoring Using Bloom Filters and Homomorphic Encryption

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      EdgeSys '21: Proceedings of the 4th International Workshop on Edge Systems, Analytics and Networking
      April 2021
      84 pages
      ISBN:9781450382915
      DOI:10.1145/3434770
      This work is licensed under a Creative Commons Attribution International 4.0 License.

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 26 April 2021

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Bloom filters
      2. crowd-monitoring
      3. homomorphic encryption
      4. pedestrian dynamics
      5. privacy-preservation
      6. statistical counting

      Qualifiers

      • Research-article
      • Research
      • Refereed limited

      Conference

      EuroSys '21
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 10 of 23 submissions, 43%

      Upcoming Conference

      EuroSys '25
      Twentieth European Conference on Computer Systems
      March 30 - April 3, 2025
      Rotterdam , Netherlands

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)208
      • Downloads (Last 6 weeks)16
      Reflects downloads up to 19 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Attendance Tracking System using Many Battery-free Photovoltaic Bluetooth Beacon BadgesProceedings of the 12th International Workshop on Energy Harvesting and Energy-Neutral Sensing Systems10.1145/3698384.3699613(15-20)Online publication date: 4-Nov-2024
      • (2024)Privacy‐preserving WiFi‐based crowd monitoringTransactions on Emerging Telecommunications Technologies10.1002/ett.495635:3Online publication date: 5-Mar-2024
      • (2023)Privacy-Aware Crowd Monitoring and WiFi Traffic Emulation for Effective Crisis Management2023 International Conference on Information and Communication Technologies for Disaster Management (ICT-DM)10.1109/ICT-DM58371.2023.10286944(1-6)Online publication date: 13-Sep-2023
      • (2023)A survey in privacy-preserving by bloom filtersPROCEEDINGS OF THE 4TH INTERNATIONAL COMPUTER SCIENCES AND INFORMATICS CONFERENCE (ICSIC 2022)10.1063/5.0174813(070001)Online publication date: 2023
      • (2023)A roadmap for the future of crowd safety research and practice: Introducing the Swiss Cheese Model of Crowd Safety and the imperative of a Vision Zero targetSafety Science10.1016/j.ssci.2023.106292168(106292)Online publication date: Dec-2023
      • (2023)Privacy-friendly statistical counting for pedestrian dynamicsComputer Communications10.1016/j.comcom.2023.09.009211:C(178-192)Online publication date: 1-Nov-2023
      • (2022)Towards Trustworthy Edge Intelligence: Insights from Voice-Activated Services2022 IEEE International Conference on Services Computing (SCC)10.1109/SCC55611.2022.00043(239-248)Online publication date: Jul-2022

      View Options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media