Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3034950.3035011acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicmssConference Proceedingsconference-collections
research-article

Maintaining the Balance between Privacy and Data Integrity in Internet of Things

Authors Info & Claims
Published:14 January 2017Publication History

ABSTRACT

The recent proliferation of human-carried mobile and smartphone devices has opened up opportunities of using crowd-sensing to collect sensory data in Internet of Things (IoT). As tapping into the sensory data and resources of the smartphones becomes common place, it is necessary to ensure the privacy of the device user while maintaining the accuracy and the integrity of the data collected. IoT system devices often sacrifice either user privacy or data integrity. It has also become important to limit the computational cost and burden on the user devices, as increasingly more services desire to tap into the resource that these devices provide. In this paper we propose a balanced truth discovery (BTD) framework that attempts to meet all three of the aforementioned needs: user privacy, data integrity, and limited computational cost. The BTD framework also reduces user participation in the truth discovery process. The nature of the BTD framework provides the possibility for easy modification (e.g. cryptography and weight assignment). This reduces computation cost for the user device, but also limits the interactions between the devices and the server, which is essential to data integrity. BTD framework also takes steps to blur the user device's original sensory data, by processing results in groups called zones. An enhanced method takes privacy preservation a step further, by protecting the user from an untrusted data-collecting party. Analysis of simulations running the framework provides evidence for the preservation of data integrity.

References

  1. Miao, C., Jiang, W., Su, L., Li, Y., Guo, S., Qin, Z., Xiao, H., Gao, J., and Ren. K. 2015. Cloud-Enabled Privacy-Preserving Truth Discovery in Crowd Sensing Systems. In Proc. of ACM SenSys, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Bhuiyan, M. Z. A., and Wu, J. 2016. Event Detection through Differential Pattern Mining in Internet of Things. In Proc. of IEEE MASS 2016.Google ScholarGoogle Scholar
  3. Bhuiyan, M., and Wu, J. 2016. Trustworthy and Protected Data Collection for Event Detection Using Networked Sensing Systems. IEEE Sarnoff, 2016.Google ScholarGoogle Scholar
  4. Li, Q., Li, Y., Gao, J., Zhao, B., Fan, W., and Han. J. 2014. Resolving conflicts in heterogeneous data by truth discovery and source reliability estimation. In Proc. of ACM SIGMOD, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Ma, F., Li, Y., Li, Q., Qiu, M., Gao, J., Zhi, S., Su, L., Zhao, B., Ji, H. and Han, J. 2015. Faitcrowd: Fine grained truth discovery for crowdsourced data aggregation. In Proc. of ACM SIGKDD, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Wang, S., Wang, D., Su, L., Kaplan, L., and Abdelzaher, T. F. 2014. Towards cyber-physical systems in social spaces: The data reliability challenge. In Proc. of IEEE RTSS 2014.Google ScholarGoogle Scholar
  7. Li, Q., Li, Y., Gao, J., Su, L., Zhao, B., Demirbas, M., Fan, W., and Han. J. 2014. A confidence-aware approach for truth discovery on long-tail data. Proceedings of the VLDB Endowment, 8(4):425--436, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Bhuiyan, M. Z. A., Wang, G., and Choo, K. R. 2016. Secured Data Collection for a Cloud-Enabled Structural Health Monitoring System. In Proc. of IEEE HPCC 2016.Google ScholarGoogle Scholar
  9. Helgason, O., and Kouyoumdjieva, O. 2011. Enabling multiple controllable radios in omnet++ nodes. In Proc. of ICST, 2011, pp. 398--401. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Pai, H. T., and Han, Y. S. 2008. Power-Efficient Direct-Voting Assurance for Data Fusion in Wireless Sensor Networks. IEEE Transactions on Computers, vol. 57, no. 2, pp. 261--273, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ICMSS '17: Proceedings of the 2017 International Conference on Management Engineering, Software Engineering and Service Sciences
    January 2017
    339 pages
    ISBN:9781450348348
    DOI:10.1145/3034950

    Copyright © 2017 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 14 January 2017

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader