Small portable devices carried by users can be exploited to provide useful information through active cooperation. To guarantee privacy, the system should use the information on the device without tracing the user. In this work we address this scenario and we present a privacy-preserving distributed technique to estimate the number of distinct mobile users in a given area. This could be of crucial importance in critical situations, like overcrowded airports or demonstrations where monitoring the number of persons could help organizing emergency countermeasures. In our envisioned scenario users periodically transmit a sketch (i.e. a summary) of the users they met in the past obtained applying suitable, duplicate-insensitive hash functions. Sketches are based on hash functions, so they also provide some kind of privacy, as it is not possible to hardware to show that it works on real devices. © 2011 IFIP International Federation for Information Processing.
Privacy-preserving environment monitoring in networks of mobile devices / Bergamini, Lorenzo; Becchetti, Luca; Vitaletti, Andrea. - 6827 LNCS:(2011), pp. 179-191. (Intervento presentato al convegno Int. IFIP TC 6 Workshops on Performance Evaluation of Cognitive Radio Networks: From Theory to Reality, PE-CRN 2011, Network Coding Applications and Protocols, NC-Pro 2011, WCNS 2011, and Sustainable Networking, SUNSET 2011, Held at NETWORKING 2011 tenutosi a Valencia nel 13 May 2011 through 13 May 2011) [10.1007/978-3-642-23041-7_18].
Privacy-preserving environment monitoring in networks of mobile devices
BERGAMINI, LORENZO;BECCHETTI, Luca;VITALETTI, Andrea
2011
Abstract
Small portable devices carried by users can be exploited to provide useful information through active cooperation. To guarantee privacy, the system should use the information on the device without tracing the user. In this work we address this scenario and we present a privacy-preserving distributed technique to estimate the number of distinct mobile users in a given area. This could be of crucial importance in critical situations, like overcrowded airports or demonstrations where monitoring the number of persons could help organizing emergency countermeasures. In our envisioned scenario users periodically transmit a sketch (i.e. a summary) of the users they met in the past obtained applying suitable, duplicate-insensitive hash functions. Sketches are based on hash functions, so they also provide some kind of privacy, as it is not possible to hardware to show that it works on real devices. © 2011 IFIP International Federation for Information Processing.File | Dimensione | Formato | |
---|---|---|---|
VE_2011_11573-484002.pdf
solo gestori archivio
Tipologia:
Versione editoriale (versione pubblicata con il layout dell'editore)
Licenza:
Tutti i diritti riservati (All rights reserved)
Dimensione
302.1 kB
Formato
Adobe PDF
|
302.1 kB | Adobe PDF | Contatta l'autore |
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.