The dining cryptographers problem: unconditional sender and recipient untraceability
Journal of Cryptology
Portholes: supporting awareness in a distributed work group
CHI '92 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Work rhythms: analyzing visualizations of awareness histories of distributed groups
CSCW '02 Proceedings of the 2002 ACM conference on Computer supported cooperative work
Learning and reasoning about interruption
Proceedings of the 5th international conference on Multimodal interfaces
Presence versus availability: the design and evaluation of a context-aware communication client
International Journal of Human-Computer Studies
MyConnector: analysis of context cues to predict human availability for communication
Proceedings of the 8th international conference on Multimodal interfaces
Toolkit support for developing and deploying sensor-based statistical models of human situations
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Efficient and provably secure aggregation of encrypted data in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
HICCUPS: health information collaborative collection using privacy and security
Proceedings of the first ACM workshop on Security and privacy in medical and home-care systems
Differentially private aggregation of distributed time-series with transformation and encryption
Proceedings of the 2010 ACM SIGMOD International Conference on Management of data
Privacy-friendly aggregation for the smart-grid
PETS'11 Proceedings of the 11th international conference on Privacy enhancing technologies
Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services
I have a DREAM!: differentially private smart metering
IH'11 Proceedings of the 13th international conference on Information hiding
New proofs for NMAC and HMAC: security without collision-resistance
CRYPTO'06 Proceedings of the 26th annual international conference on Advances in Cryptology
When privacy and utility are in harmony: towards better design of presence technologies
Personal and Ubiquitous Computing
Editorial: Special Issue on Advances in Computer Supported Collaboration: Systems and Technologies
Future Generation Computer Systems
Hi-index | 0.00 |
Collaboration technologies must support information sharing between collaborators, but must also take care not to share too much information or share information too widely. Systems that share information without requiring an explicit action by a user to initiate the sharing must be particularly cautious in this respect. Presence systems are an emerging class of applications that support collaboration. Through the use of pervasive sensors, these systems estimate user location, activities, and available communication channels. Because such presence data are sensitive, to achieve wide-spread adoption, sharing models must reflect the privacy and sharing preferences of their users. This paper looks at the role that privacy-preserving aggregation can play in addressing certain user sharing and privacy concerns with respect to presence data. We define conditions to achieve CollaPSE (Collaboration Presence Sharing Encryption) security, in which (i) an individual has full access to her own data, (ii) a third party performs computation on the data without learning anything about the data values, and (iii) people with special privileges called ''analysts'' can learn statistical information about groups of individuals, but nothing about the individual values contributing to the statistic other than what can be deduced from the statistic. More specifically, analysts can decrypt aggregates without being able to decrypt the individual values contributing to the aggregate. Based in part on studies we carried out that illustrate the need for the conditions encapsulated by CollaPSE security, we designed and implemented a family of CollaPSE protocols. We analyze their security, discuss efficiency tradeoffs, describe extensions, and review more recent privacy-preserving aggregation work.