Adversaries and Countermeasures in Privacy-Enhanced Urban Sensing Systems
Today's digital society increasingly relies on the interconnection of heterogenous components, encompassing assorted actors, entities, systems, and a variety of (often mobile) computing devices. Revolutionary computing paradigms, such as people-centric urban sensing, have focused on the seamles...
Saved in:
Published in | IEEE systems journal Vol. 7; no. 2; pp. 311 - 322 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
New York
IEEE
01.06.2013
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
ISSN | 1932-8184 1937-9234 |
DOI | 10.1109/JSYST.2012.2221957 |
Cover
Abstract | Today's digital society increasingly relies on the interconnection of heterogenous components, encompassing assorted actors, entities, systems, and a variety of (often mobile) computing devices. Revolutionary computing paradigms, such as people-centric urban sensing, have focused on the seamless collection of meaningful data from a large number of devices. The increasing complexity of deployed urban systems and related infrastructures, along with the growing amount of information collected, prompts a number of challenging security and privacy concerns. In this paper, we explore a number of scenarios where nodes of a urban sensing system are subject to individual queries. In this setting, multiple users and organizations (e.g., infrastructure operators) co-exist, but they may not trust each other to the full extent. As a result, we address the problems of protecting: 1) secrecy of reported data, and 2) confidentiality of query interests from the prying eyes of malicious entities. We introduce a realistic network model and study different adversarial models and strategies, distinguishing between resident and nonresident adversaries, considering both randomly distributed and local attackers. For each of them, we propose a distributed privacy-preserving technique and evaluate its effectiveness via analysis and simulation. Our techniques are tunable, trading off the level of privacy assurance with a small overhead increase, and independent from the complexity of the underlying infrastructures. We additionally provide a relevant improvement of data reliability and availability, while only relying on standard symmetric cryptography. The practicality of our proposals is demonstrated both analytically and experimentally. |
---|---|
AbstractList | Today's digital society increasingly relies on the interconnection of heterogenous components, encompassing assorted actors, entities, systems, and a variety of (often mobile) computing devices. Revolutionary computing paradigms, such as people-centric urban sensing, have focused on the seamless collection of meaningful data from a large number of devices. The increasing complexity of deployed urban systems and related infrastructures, along with the growing amount of information collected, prompts a number of challenging security and privacy concerns. In this paper, we explore a number of scenarios where nodes of a urban sensing system are subject to individual queries. In this setting, multiple users and organizations (e.g., infrastructure operators) co-exist, but they may not trust each other to the full extent. As a result, we address the problems of protecting: 1) secrecy of reported data, and 2) confidentiality of query interests from the prying eyes of malicious entities. We introduce a realistic network model and study different adversarial models and strategies, distinguishing between resident and nonresident adversaries, considering both randomly distributed and local attackers. For each of them, we propose a distributed privacy-preserving technique and evaluate its effectiveness via analysis and simulation. Our techniques are tunable, trading off the level of privacy assurance with a small overhead increase, and independent from the complexity of the underlying infrastructures. We additionally provide a relevant improvement of data reliability and availability, while only relying on standard symmetric cryptography. The practicality of our proposals is demonstrated both analytically and experimentally. |
Author | Di Pietro, R. De Cristofaro, E. |
Author_xml | – sequence: 1 givenname: E. surname: De Cristofaro fullname: De Cristofaro, E. email: edc@parc.com organization: Palo Alto Res. Center, Palo Alto, CA, USA – sequence: 2 givenname: R. surname: Di Pietro fullname: Di Pietro, R. email: dipietro@mat.uniroma3.it organization: Roma Tre Univ., Rome, Italy |
BookMark | eNqNkU1LAzEURYMoqNU_oJsBN26m5nOSLKX4USkoVBeuhtfMG01pM5rMFPrvnVpx4UJdvfA4J7nhHpLd0AQk5ITRIWPUXtxNn6ePQ04ZH3LOmVV6hxwwK3RuuZC7n2eeG2bkPjlMaU6pMkrbAzK-rFYYE0SPKYNQZaOmCy3GJULqYr_zIXuIfgVunV-FVwgOq-wpziBkUwzJh5dsuk4tLtMR2athkfD4aw7I0_XV4-g2n9zfjEeXk9xJYdrcKWkFADWyFrqe6dnMWUsddaxykiEWUIkKATU3EnhRq1pJgEr1smFSoBiQ8-29b7F57zC15dInh4sFBGy6VLJCM6U41eJvVBSKKUvFf1Ft1AY9-4HOmy6G_s89JfqQBRO6p_iWcrFJKWJdvkW_hLguGS03nZWfnZWbzsqvznrJ_JCcb6H1TWgj-MXv6ulW9Yj4_VbRx9aiEB_45qXF |
CODEN | ISJEB2 |
CitedBy_id | crossref_primary_10_1109_JIOT_2020_3037115 crossref_primary_10_1109_TVT_2015_2415515 crossref_primary_10_1007_s11280_024_01300_4 crossref_primary_10_1109_MCOM_2014_6871673 crossref_primary_10_1016_j_jss_2015_03_067 crossref_primary_10_1007_s11280_019_00745_2 |
Cites_doi | 10.1109/49.668972 10.1145/1555816.1555823 10.1145/1592761.1592778 10.4108/ICST.PERVASIVEHEALTH2010.8851 10.1109/INFCOM.2005.1497887 10.1007/11947950_57 10.1145/1814433.1814448 10.1145/1734583.1734592 10.1145/1689239.1689244 10.1145/1460412.1460445 10.1109/INFCOM.2010.5462094 10.1145/1620545.1620549 10.1145/293347.293350 10.1145/1217299.1217302 10.1007/978-3-642-15497-3_39 10.1145/345910.345953 10.1109/ICNP.2004.1348111 10.1145/1555816.1555834 10.1145/1592606.1592616 10.1109/INFCOM.2010.5462147 10.1145/358549.358563 10.1016/S1570-8705(03)00008-8 10.1016/j.pmcj.2009.10.005 10.1145/1341731.1341735 10.1145/1182807.1182821 10.1109/MCOM.2002.1024422 10.1145/1814433.1814437 10.1109/COMSNETS.2009.4808850 10.1109/PERCOM.2010.5466993 10.1145/1378600.1378624 10.1142/S0218488502001648 10.1145/1814433.1814442 10.1016/j.comcom.2009.08.012 10.1145/501449.501452 10.1109/ICCCN.2010.5560129 10.1145/1234161.1234179 10.1145/1460412.1460440 10.1007/978-3-540-69170-9_10 10.1007/978-3-642-12654-3_9 10.1145/1460412.1460444 10.1145/1340771.1340777 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Jun 2013 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Jun 2013 |
DBID | 97E RIA RIE AAYXX CITATION 7SC 7TB 8FD FR3 JQ2 KR7 L7M L~C L~D |
DOI | 10.1109/JSYST.2012.2221957 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Mechanical & Transportation Engineering Abstracts Technology Research Database Engineering Research Database ProQuest Computer Science Collection Civil Engineering Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Civil Engineering Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Mechanical & Transportation Engineering Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Engineering Research Database Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Civil Engineering Abstracts Civil Engineering Abstracts Civil Engineering Abstracts |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Xplore url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1937-9234 |
EndPage | 322 |
ExternalDocumentID | 2952415021 10_1109_JSYST_2012_2221957 6365736 |
Genre | orig-research |
GroupedDBID | 0R~ 29I 4.4 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACIWK AENEX AETIX AGQYO AGSQL AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS EJD HZ~ IFIPE IPLJI JAVBF LAI M43 O9- OCL RIA RIE RNS AAYXX CITATION RIG 7SC 7TB 8FD FR3 JQ2 KR7 L7M L~C L~D |
ID | FETCH-LOGICAL-c438t-c5493aa084f37fb7bbc990c0c1dc41ee6ad3deae7284a26f5f54aad54388143e3 |
IEDL.DBID | RIE |
ISSN | 1932-8184 |
IngestDate | Fri Sep 05 07:54:10 EDT 2025 Fri Sep 05 06:38:18 EDT 2025 Fri Sep 05 08:24:06 EDT 2025 Sun Jun 29 16:54:42 EDT 2025 Tue Jul 01 03:14:24 EDT 2025 Thu Apr 24 22:54:48 EDT 2025 Tue Aug 26 16:43:18 EDT 2025 |
IsDoiOpenAccess | false |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 2 |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c438t-c5493aa084f37fb7bbc990c0c1dc41ee6ad3deae7284a26f5f54aad54388143e3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 ObjectType-Article-2 ObjectType-Feature-1 content type line 23 |
OpenAccessLink | https://zenodo.org/record/3433429 |
PQID | 1338146137 |
PQPubID | 23500 |
PageCount | 12 |
ParticipantIDs | ieee_primary_6365736 crossref_primary_10_1109_JSYST_2012_2221957 proquest_miscellaneous_1365159033 proquest_journals_1338146137 proquest_miscellaneous_1365157853 proquest_miscellaneous_1671552073 crossref_citationtrail_10_1109_JSYST_2012_2221957 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2013-06-01 |
PublicationDateYYYYMMDD | 2013-06-01 |
PublicationDate_xml | – month: 06 year: 2013 text: 2013-06-01 day: 01 |
PublicationDecade | 2010 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York |
PublicationTitle | IEEE systems journal |
PublicationTitleAbbrev | JSYST |
PublicationYear | 2013 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref13 ref12 ref15 ref14 ref53 ortolani (ref35) 2010 ref52 ref55 dua (ref45) 2009 ref54 ref10 ref17 ref16 de cristofaro (ref47) 2011 ref19 ref18 cormen (ref34) 2001 ref50 daeman (ref33) 1999 ref46 de cristofaro (ref48) 2012 ref42 ref41 ref44 ref43 (ref11) 2010 ref8 ref7 paulos (ref4) 2007 ref9 santanche (ref3) 2006 ref6 ref5 ref37 ref36 ref31 bagula (ref49) 2011 ref32 burke (ref2) 2006 ref1 de cristofaro (ref51) 2009 ref39 ref38 ref24 ref23 huang (ref40) 2010; 33 ref26 ref25 ref20 ref22 dingledine (ref30) 2004 ref28 ref27 ref29 sion (ref21) 2007 |
References_xml | – ident: ref52 doi: 10.1109/49.668972 – ident: ref8 doi: 10.1145/1555816.1555823 – ident: ref36 doi: 10.1145/1592761.1592778 – ident: ref13 doi: 10.4108/ICST.PERVASIVEHEALTH2010.8851 – ident: ref26 doi: 10.1109/INFCOM.2005.1497887 – ident: ref25 doi: 10.1007/11947950_57 – ident: ref12 doi: 10.1145/1814433.1814448 – ident: ref46 doi: 10.1145/1734583.1734592 – ident: ref54 doi: 10.1145/1689239.1689244 – ident: ref10 doi: 10.1145/1460412.1460445 – ident: ref55 doi: 10.1109/INFCOM.2010.5462094 – ident: ref7 doi: 10.1145/1620545.1620549 – ident: ref20 doi: 10.1145/293347.293350 – start-page: 1 year: 2009 ident: ref51 article-title: Privacy-preserving querying in wireless sensor networks publication-title: Proc ICCCN – ident: ref42 doi: 10.1145/1217299.1217302 – ident: ref32 doi: 10.1007/978-3-642-15497-3_39 – year: 2006 ident: ref3 article-title: Senseweb: Browsing the physical world in real time publication-title: Proc IPSN – year: 2011 ident: ref49 publication-title: Wireless Sensors for AllLow Cost Open Solutions for Environmental Monitoring – start-page: 117 year: 2006 ident: ref2 article-title: Participatory sensing publication-title: Proc World Sensor Web Workshop – year: 2007 ident: ref21 article-title: On the computational practicality of private information retrieval publication-title: Proc NDSS – ident: ref27 doi: 10.1145/345910.345953 – ident: ref24 doi: 10.1109/ICNP.2004.1348111 – ident: ref9 doi: 10.1145/1555816.1555834 – ident: ref43 doi: 10.1145/1592606.1592616 – ident: ref22 doi: 10.1109/INFCOM.2010.5462147 – year: 2009 ident: ref45 article-title: Toward trustworthy participatory sensing publication-title: Proc HotSec – year: 1999 ident: ref33 article-title: AES proposal: Rijndael publication-title: Proc 1st AES Conf – ident: ref41 doi: 10.1145/358549.358563 – ident: ref29 doi: 10.1016/S1570-8705(03)00008-8 – ident: ref15 doi: 10.1016/j.pmcj.2009.10.005 – year: 2007 ident: ref4 article-title: Sensing atmosphere publication-title: Proc SenSys Workshops – start-page: 303 year: 2004 ident: ref30 article-title: TOR: The second-generation onion router publication-title: Proc Usenix Security – ident: ref31 doi: 10.1145/1341731.1341735 – ident: ref5 doi: 10.1145/1182807.1182821 – ident: ref50 doi: 10.1109/MCOM.2002.1024422 – ident: ref16 doi: 10.1145/1814433.1814437 – ident: ref37 doi: 10.1109/COMSNETS.2009.4808850 – ident: ref18 doi: 10.1109/PERCOM.2010.5466993 – ident: ref39 doi: 10.1145/1378600.1378624 – year: 2001 ident: ref34 publication-title: Introduction to Algorithms – ident: ref53 doi: 10.1142/S0218488502001648 – ident: ref17 doi: 10.1145/1814433.1814442 – volume: 33 start-page: 1266 year: 2010 ident: ref40 article-title: Preserving privacy in participatory sensing systems publication-title: Comput Commun doi: 10.1016/j.comcom.2009.08.012 – ident: ref28 doi: 10.1145/501449.501452 – ident: ref38 doi: 10.1109/ICCCN.2010.5560129 – start-page: 218 year: 2012 ident: ref48 article-title: Query privacy in urban sensing systems publication-title: Proc ICDCN – start-page: 23 year: 2011 ident: ref47 article-title: PEPSI: Privacy-enhanced participatory sensing infrastructure publication-title: Proc WiSec – ident: ref1 doi: 10.1145/1234161.1234179 – ident: ref44 doi: 10.1145/1460412.1460440 – ident: ref14 doi: 10.1007/978-3-540-69170-9_10 – ident: ref19 doi: 10.1007/978-3-642-12654-3_9 – start-page: 20 year: 2010 ident: ref35 article-title: Event handoff unobservability in WSN publication-title: Proc iNetSec – year: 2010 ident: ref11 publication-title: Quake-Catcher Network – ident: ref6 doi: 10.1145/1460412.1460444 – ident: ref23 doi: 10.1145/1340771.1340777 |
SSID | ssj0058579 |
Score | 2.0148628 |
Snippet | Today's digital society increasingly relies on the interconnection of heterogenous components, encompassing assorted actors, entities, systems, and a variety... |
SourceID | proquest crossref ieee |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 311 |
SubjectTerms | Adversarial models complex systems Complexity Computation Cryptography Data privacy Detection Devices Infrastructure Privacy Proposals Queries querying security Sensors Silicon Smart phones Studies urban sensing wireless communications Wireless sensor networks |
Title | Adversaries and Countermeasures in Privacy-Enhanced Urban Sensing Systems |
URI | https://ieeexplore.ieee.org/document/6365736 https://www.proquest.com/docview/1338146137 https://www.proquest.com/docview/1365157853 https://www.proquest.com/docview/1365159033 https://www.proquest.com/docview/1671552073 |
Volume | 7 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT9wwEB4BJ3oor1ZdHpWRemu9JHHiJEeEQHSlRZWWlegp8isFgbxoH0jw65lxkhVqEfQWJePI8tgzn-2ZbwC-idQZRNUpJyxAp1U110oLrpLEGmvwbaDMH17I83E6uMquVuDHMhfGOReCz1yfHsNdvp2YBR2VHUkhs1zIVVjFadbkanVWF1Fv4NUjPMLRCaVdgkxUHg1Gv0eXFMWV9NEbxiW5ohdOKFRV-ccUB_9ytgHDrmdNWMltfzHXffP0F2nj_3Z9Ez62QJMdNzNjC1ac34YPL-gHd-BnqMY8C7tlprxllKBOpro5N5yxG89-TW8elHnkp_46xAqw8VQrz0YU9-7_sJbw_BOMz04vT855W1qBm1QUc25wWyiUioq0Fnmtc60NuiUTmdiaNHZOKiusUy5H76USWWd1liplM2xcIMJy4jOs-Yl3X4BZxCh5YeNClcTdJbQs8b-FJWZ5I6XuQdyNdWVa3nEqf3FXhf1HVFZBPxXpp2r104Pvyzb3DevGm9I7NOBLyXase7DfqbRqF-asoi05lTIX2Opw-RmXFN2TKO8mC5Kh-vA5Apn3ZMpIvCUjcyK4QyO6-3oP92A9aapr8Cjeh7X5dOEOEOPM9dcwuZ8B0gz3YA |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Lb9QwEB6VcgAOvApioYCRuIG3Sew4yRFVrbalWyHtrlROkV8pFciL9oHU_npmnGRVFVS4Rck4sjz2zGd75huA90J6i6hacsICdFrVcKON4DrLnHUW30bK_PGpGs3k8Vl-tgUfN7kw3vsYfOaH9Bjv8t3crumobE8JlRdC3YG76Pdl3mZr9XYXcW9k1iNEwtENyT5FJqn2jidfJ1OK48qG6A_TipzRNTcU66r8YYyjhzl8BOO-b21gyffhemWG9uoGbeP_dv4xPOygJvvUzo0nsOXDU3hwjYBwB45iPeZl3C8zHRyjFHUy1u3J4ZJdBPZlcfFL20t-EL7FaAE2Wxgd2IQi38M56yjPn8Hs8GC6P-JdcQVupShX3OLGUGidlLIRRWMKYyw6JpvY1FmZeq-0E85rX6D_0plq8iaXWrscG5eIsbx4DtthHvwLYA5RSlG6tNQVsXcJoyr8b-mIW94qZQaQ9mNd2455nApg_KjjDiSp6qifmvRTd_oZwIdNm58t78at0js04BvJbqwHsNurtO6W5rKmTTkVMxfY6t3mMy4quinRwc_XJEMV4guEMv-SqRJxm4wqiOIOzejLv_fwLdwbTccn9cnR6edXcD9ra23wJN2F7dVi7V8j4lmZN3Gi_wboE_qt |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Adversaries+and+Countermeasures+in+Privacy-Enhanced+Urban+Sensing+Systems&rft.jtitle=IEEE+systems+journal&rft.au=De+Cristofaro%2C+Emiliano&rft.au=Di+Pietro%2C+Roberto&rft.date=2013-06-01&rft.issn=1932-8184&rft.eissn=1937-9234&rft.volume=7&rft.issue=2&rft.spage=311&rft.epage=322&rft_id=info:doi/10.1109%2FJSYST.2012.2221957&rft.externalDBID=NO_FULL_TEXT |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1932-8184&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1932-8184&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1932-8184&client=summon |