A Theory for Multiresolution Signal Decomposition: The Wavelet Representation
IEEE Transactions on Pattern Analysis and Machine Intelligence
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
The Eigentrust algorithm for reputation management in P2P networks
WWW '03 Proceedings of the 12th international conference on World Wide Web
A reputation-based trust model for peer-to-peer ecommerce communities [Extended Abstract]
Proceedings of the 4th ACM conference on Electronic commerce
Probabilistic encryption & how to play mental poker keeping secret all partial information
STOC '82 Proceedings of the fourteenth annual ACM symposium on Theory of computing
Convex Optimization
Trust network analysis with subjective logic
ACSC '06 Proceedings of the 29th Australasian Computer Science Conference - Volume 48
CarTel: a distributed mobile sensor computing system
Proceedings of the 4th international conference on Embedded networked sensor systems
L-diversity: Privacy beyond k-anonymity
ACM Transactions on Knowledge Discovery from Data (TKDD)
On Sensor Sampling and Quality of Information: A Starting Point
PERCOMW '07 Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications Workshops
Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control
SP '07 Proceedings of the 2007 IEEE Symposium on Security and Privacy
IEEE Transactions on Computers
Reputation-based framework for high integrity sensor networks
ACM Transactions on Sensor Networks (TOSN)
Robust De-anonymization of Large Sparse Datasets
SP '08 Proceedings of the 2008 IEEE Symposium on Security and Privacy
PoolView: stream privacy for grassroots participatory sensing
Proceedings of the 6th ACM conference on Embedded network sensor systems
Fully homomorphic encryption using ideal lattices
Proceedings of the forty-first annual ACM symposium on Theory of computing
Proceedings of the 7th international conference on Mobile systems, applications, and services
On the tradeoff between privacy and utility in data publishing
Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining
Operators for propagating trust and their evaluation in social networks
Proceedings of The 8th International Conference on Autonomous Agents and Multiagent Systems - Volume 2
A survey of computational location privacy
Personal and Ubiquitous Computing
Persona: an online social network with user-defined privacy
Proceedings of the ACM SIGCOMM 2009 conference on Data communication
Virtual individual servers as privacy-preserving proxies for mobile devices
Proceedings of the 1st ACM workshop on Networking, systems, and applications for mobile handhelds
Personalised and dynamic trust in social networks
Proceedings of the third ACM conference on Recommender systems
mCrowd: a platform for mobile crowdsourcing
Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems
A privacy framework for mobile health and home-care systems
Proceedings of the first ACM workshop on Security and privacy in medical and home-care systems
Lockr: better privacy for social networks
Proceedings of the 5th international conference on Emerging networking experiments and technologies
Using mobile phones to determine transportation modes
ACM Transactions on Sensor Networks (TOSN)
Myths and fallacies of "Personally Identifiable Information"
Communications of the ACM
Privacy-preserving data publishing: A survey of recent developments
ACM Computing Surveys (CSUR)
Biketastic: sensing and mapping for better biking
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Challenges in resource monitoring for residential spaces
Proceedings of the First ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Buildings
PrPl: a decentralized social networking infrastructure
Proceedings of the 1st ACM Workshop on Mobile Cloud Computing & Services: Social Networks and Beyond
Prisense: privacy-preserving data aggregation in people-centric urban sensing systems
INFOCOM'10 Proceedings of the 29th conference on Information communications
Compressive oversampling for robust data transmission in sensor networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
Locaccino: a privacy-centric location sharing application
Proceedings of the 12th ACM international conference adjunct papers on Ubiquitous computing - Adjunct
Privacy-aware regression modeling of participatory sensing data
Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems
Private memoirs of a smart meter
Proceedings of the 2nd ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Building
Crowd-sourced sensing and collaboration using twitter
WOWMOM '10 Proceedings of the 2010 IEEE International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)
Personal data vaults: a locus of control for personal data streams
Proceedings of the 6th International COnference
Privacy risks emerging from the adoption of innocuous wearable sensors in the mobile environment
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Functional encryption: definitions and challenges
TCC'11 Proceedings of the 8th conference on Theory of cryptography
Evaluating Laplace Noise Addition to Satisfy Differential Privacy for Numeric Data
Transactions on Data Privacy
Sensorsafe: a framework for privacy-preserving management of personal sensory information
SDM'11 Proceedings of the 8th VLDB international conference on Secure data management
Proceedings of the 9th ACM Conference on Embedded Networked Sensor Systems
ICALP'06 Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part II
Calibrating noise to sensitivity in private data analysis
TCC'06 Proceedings of the Third conference on Theory of Cryptography
Decoding by linear programming
IEEE Transactions on Information Theory
Hi-index | 0.00 |
Miniaturized smart sensors are increasingly being used to collect personal data which embed minute details of our everyday life. When shared, the data streams can easily be mined to draw a rich set of inferences regarding private behaviors and lifestyle patterns. Disclosure of some of these unintended inferences gives rise to the notion of behavioral privacy different from traditional identity privacy typically addressed in the literature. From the provider's perspective, we summarize these privacy concerns into three basic questions: (i) Whom to share data with? (ii) How much data to share? and (iii) What data to share? In this paper, we outline the architecture of SensorSafe as a software-based framework with support for three basic mechanisms to allow privacy-aware data sharing. First, it provides a library of routines accessible using a simple GUI for providers to define fine-grained, context-dependent access control. Second, it uses the trust network between consumers and providers to derive the optimal rate of information flow which would maintain both provider privacy and consumer utility. Finally, it introduces a compressive sensing based feature-sharing procedure to further control the amount of information release. We provide simulation results to illustrate the efficacy of each of these mechanisms.