Haze: Privacy-Preserving Real-Time Traffic Statistics

作者: Olga Ohrimenko , Roberto Tamassia , Joshua Brown

DOI:

关键词:

摘要: We consider traffic-update mobile applications that let users learn traffic conditions based on reports from other users. These are becoming increasingly popular (e.g., Waze reported 30 million in 2013) since they aggregate real-time road updates actual traveling the roads. However, providers of these services have access to such sensitive information as timestamped locations and movements its In this paper, we describe Haze, a protocol for supports creation statistics user while protecting privacy Haze relies small subset jointly encrypted speed alert data report result service provider. use jury-voting protocols threshold cryptosystem differential techniques hide anyone participating allowing only be extracted sent show is effective practice by developing prototype implementation performing experiments real-world dataset car trajectories.

参考文章(19)
Xenofontas Dimitropoulos, Martin Burkhart, Mario Strasser, Dilip Many, SEPIA: privacy-preserving aggregation of multi-domain network events and statistics usenix security symposium. pp. 15- 15 ,(2010)
Anna Monreale, Wendy Hui Wang, Francesca Pratesi, Salvatore Rinzivillo, Dino Pedreschi, Gennady Andrienko, Natalia Andrienko, Privacy-Preserving Distributed Movement Data Aggregation Geographic Information Science at the Heart of Europe. pp. 225- 245 ,(2013) , 10.1007/978-3-319-00615-4_13
Cynthia Dwork, Krishnaram Kenthapadi, Frank McSherry, Ilya Mironov, Moni Naor, Our Data, Ourselves: Privacy Via Distributed Noise Generation Advances in Cryptology - EUROCRYPT 2006. ,vol. 4004, pp. 486- 503 ,(2006) , 10.1007/11761679_29
Dan Boneh, Eu-Jin Goh, Kobbi Nissim, Evaluating 2-DNF Formulas on Ciphertexts Theory of Cryptography. pp. 325- 341 ,(2005) , 10.1007/978-3-540-30576-7_18
Bogdan Carbunar, Naphtali Rishe, Jaime Ballesteros, Mahmudur Rahman, Eat the Cake and Have It Too: Privacy Preserving Location Aggregates in Geosocial Networks arXiv: Cryptography and Security. ,(2013)
Cynthia Dwork, Frank McSherry, Kobbi Nissim, Adam Smith, Calibrating Noise to Sensitivity in Private Data Analysis Theory of Cryptography. ,vol. 3876, pp. 265- 284 ,(2006) , 10.1007/11681878_14
Marco Gruteser, Dirk Grunwald, Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking Proceedings of the 1st international conference on Mobile systems, applications and services - MobiSys '03. pp. 31- 42 ,(2003) , 10.1145/1066116.1189037
Michael R. Clarkson, Dmitri Chmelev, Adam M. Davis, Civitas: Implementation of a Threshold Cryptosystem ,(2008)
P. Kalnis, G. Ghinita, K. Mouratidis, D. Papadias, Preventing Location-Based Identity Inference in Anonymous Spatial Queries IEEE Transactions on Knowledge and Data Engineering. ,vol. 19, pp. 1719- 1733 ,(2007) , 10.1109/TKDE.2007.190662
Taher ElGamal, A public key cryptosystem and a signature scheme based on discrete logarithms international cryptology conference. ,vol. 31, pp. 10- 18 ,(1985) , 10.1109/TIT.1985.1057074