Privacy-Preserving Data Collection for Mobile Phone Sensing Tasks

  • Yi-Ning LiuEmail author
  • Yan-Ping Wang
  • Xiao-Fen Wang
  • Zhe Xia
  • Jingfang Xu
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11125)


Lack of reliable data is a major obstacle in some research works because users are unwilling to provide their own private data to any third parties directly. Since statistical inference is aimed to analyze the overall data of a well-defined group rather than a specific individual, the paradigm of privacy-preserving data collection scheme is proposed recently, which can motivate users to contribute their data to research works. In this paper, two probable properties that promote the success of sensing tasks are analyzed, and a fog-assisted data collection scheme for mobile phone sensing tasks is proposed. Sensitive measurements are particularly protected by obfuscating them with the group values, which not only provides anonymity for participants but also enables accurate data for the task provider. Especially, the dynamic change of participants is also considered. Theoretical analysis shows that this method achieves the desired security goals, and experiments are performed to demonstrate the efficiency and feasibility.


Privacy-preservation Sensing tasks Anonymity 



This work was partly supported by National Natural Science Foundation of China under grant Nos. 61662016 and 61772224, GUET Excellent Graduate Thesis Program No. 16YJPYSS17, and Innovation Project of Guangxi Graduate Education No. YCSW2017139.


  1. 1.
    Mohan, P., Padmanabhan, V.N., Ramjee, R.: Nericell: rich monitoring of road and traffic conditions using mobile smartphones. In: Proceedings of the 6th ACM Conference on Embedded Network Sensor Systems, pp. 323–336. ACM, Raleigh (2008)Google Scholar
  2. 2.
    Dai, J., Bai, X., Yang, Z., et al.: Mobile phone-based pervasive fall detection. Pers. Ubiquit. Comput. 14(7), 633–643 (2010)CrossRefGoogle Scholar
  3. 3.
    Shen, W., Yin, B., Cheng, Y., et al.: Privacy-preserving mobile crowd sensing for big data applications. In: 2017 IEEE International Conference on Communications (ICC), pp. 1–6. IEEE, Paris (2017)Google Scholar
  4. 4.
    Yao, Y., Yang, L.T., Xiong, N.N.: Anonymity-based privacy-preserving data reporting for participatory sensing. IEEE IoT J. 2(5), 381–390 (2015)Google Scholar
  5. 5.
    Khan, W.Z., Xiang, Y., Aalsalem, M.Y., et al.: Mobile phone sensing systems: a survey. IEEE Commun. Surv. Tutor. 15(1), 402–427 (2013)CrossRefGoogle Scholar
  6. 6.
    Kanjo, E.: NoiseSPY: a real-time mobile phone platform for urban noise monitoring and mapping. Mob. Netw. Appl. 15(4), 562–574 (2010)CrossRefGoogle Scholar
  7. 7.
    Devarakonda, S., Sevusu, P., Liu, H., et al.: Real-time air quality monitoring through mobile sensing in metropolitan areas. In: Proceedings of the 2nd ACM SIGKDD International Workshop on Urban Computing, pp. 1–8. ACM, Chicago (2013)Google Scholar
  8. 8.
    Denning, T., Andrew, A., Chaudhri, R., et al.: BALANCE: towards a usable pervasive wellness application with accurate activity inference. In: Proceedings of the 10th Workshop on Mobile Computing Systems and Applications, pp. 1–6. ACM, Santa Cruz (2009)Google Scholar
  9. 9.
    Eisenman, S.B., Miluzzo, E., Lane, N.D., et al.: BikeNet: a mobile sensing system for cyclist experience mapping. ACM Trans. Sens. Netw. (TOSN) 6(1), 1–39 (2009)CrossRefGoogle Scholar
  10. 10.
    Groat, M.M., He, W., Forrest, S.: KIPDA: k-indistinguishable privacy-preserving data aggregation in wireless sensor networks. In: 2011 Proceedings IEEE, INFOCOM, pp. 2024–2032. IEEE, Shanghai (2011)Google Scholar
  11. 11.
    Zhang, Y., Chen, Q., Zhong, S.: Efficient and privacy-preserving min and k-th min computations in mobile sensing systems. IEEE Trans. Dependable Secur. Comput. 14(1), 9–21 (2017)Google Scholar
  12. 12.
    Badra, M., Zeadally, S.: Lightweight and efficient privacy-preserving data aggregation approach for the smart grid. Ad Hoc Netw. 64, 32–40 (2017)CrossRefGoogle Scholar
  13. 13.
    Hu, L., Evans, D.: Secure aggregation for wireless networks. In: Proceedings 2003 Symposium on Applications and the Internet Workshops, pp. 384–391. IEEE, Orlando (2003)Google Scholar
  14. 14.
    Castelluccia, C., Mykletun, E., Tsudik, G.: Efficient aggregation of encrypted data in wireless sensor networks. In: International Conference on Mobile and Ubiquitous Systems: Networking and Services, pp. 109–117. IEEE Computer Society/IEEE, San Diego (2005)Google Scholar
  15. 15.
    Madden, S., Franklin, M.J., Hellerstein, J.M., et al.: TAG: a Tiny AGgregation service for ad-hoc sensor networks. ACM Sigops Oper. Syst. Rev. 36(1), 131–146 (2002)CrossRefGoogle Scholar
  16. 16.
    Jadia, P., Mathuria, A.: Efficient secure aggregation in sensor networks. In: Bougé, L., Prasanna, V.K. (eds.) HiPC 2004. LNCS, vol. 3296, pp. 40–49. Springer, Heidelberg (2004). Scholar
  17. 17.
    Zhang, Y., Chen, Q., Zhong, S.: Privacy-preserving data aggregation in mobile phone sensing. IEEE Trans. Inf. Forensics Secur. 11(5), 980–992 (2016)CrossRefGoogle Scholar
  18. 18.
    Li, Q., Cao, G.: Efficient and privacy-preserving data aggregation in mobile sensing. In: 2012 20th IEEE International Conference on Network Protocols (ICNP), pp. 1–10. IEEE, Austin (2012)Google Scholar
  19. 19.
    Shi, E., Chan, H.T.H., Rieffel, E., et al.: Privacy-preserving aggregation of time-series data. In: Proceedings of the Network and Distributed System Security Symposium, pp. 1–17. DBLP, San Diego (2011)Google Scholar
  20. 20.
    Sweeney, L.: K-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10(5), 557–570 (2002)MathSciNetCrossRefGoogle Scholar
  21. 21.
    Qiu, F., Wu, F., Chen, G.: Privacy and quality preserving multimedia data aggregation for participatory sensing systems. IEEE Trans. Mob. Comput. 14(6), 1287–1300 (2015)CrossRefGoogle Scholar
  22. 22.
    Shrivastava, N., Buragohain, C., Agrawal, D., et al.: Medians and beyond: new aggregation techniques for sensor networks. In: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, pp. 239–249. ACM, Baltimore (2004)Google Scholar
  23. 23.
    Li, Y., Zhao, Y., Ishak, S., et al.: An anonymous data reporting strategy with ensuring incentives for mobile crowd-sensing. J. Ambient. Intell. Hum. Comput. 1–15 (2017)Google Scholar
  24. 24.
    Christin, D.: Privacy in mobile participatory sensing: current trends and future challenges. J. Syst. Softw. 116, 57–68 (2015)CrossRefGoogle Scholar
  25. 25.
    Yang, Z., Zhong, S., Wright, R.N.: Anonymity-preserving data collection. In: Proceedings of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery in Data Mining, pp. 334–343. ACM, Chicago (2005)Google Scholar
  26. 26.
    Brickell, J., Shmatikov, V.: Efficient anonymity-preserving data collection. In: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 76–85. ACM, Philadelphia (2006)Google Scholar
  27. 27.
    Wang, C.J., Ku, W.S.: Anonymous sensory data collection approach for mobile participatory sensing. In: 2012 IEEE 28th International Conference on Data Engineering Workshops, pp. 220–227. IEEE, Arlington (2012)Google Scholar
  28. 28.
    Lin, Y., Shen, H.: Cloud fog: towards high quality of experience in cloud gaming. In: 2015 44th International Conference on Parallel Processing, pp. 500–509. IEEE, Beijing (2015)Google Scholar
  29. 29.
    Lyu, L., Nandakumar, K., Rubinstein, B., et al.: PPFA: privacy preserving fog-enabled aggregation in smart grid. IEEE Trans. Ind. Inform. 1–15 (2018)Google Scholar
  30. 30.
    Boldyreva, A.: Threshold signatures, multisignatures and blind signatures based on the gap-diffie-hellman-group signature scheme. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 31–46. Springer, Heidelberg (2003). Scholar
  31. 31.
    Balasubramanian, N., Balasubramanian, A., Venkataramani, A.: Energy consumption in mobile phones: a measurement study and implications for network applications. In: ACM SIGCOMM Conference on Internet Measurement, pp. 280–293. ACM, Chicago (2009)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2018

Authors and Affiliations

  • Yi-Ning Liu
    • 1
    Email author
  • Yan-Ping Wang
    • 1
  • Xiao-Fen Wang
    • 2
  • Zhe Xia
    • 3
  • Jingfang Xu
    • 4
  1. 1.Guangxi Key Laboratory of Trusted SoftwareGuilin University of Electronic TechnologyGuilinChina
  2. 2.School of Computer Science and EngineeringUniversity of Electronics Science and Technology of ChinaChengduChina
  3. 3.School of Computer ScienceWuhan University of TechnologyWuhanChina
  4. 4.School of ComputerCentral China Normal UniversityWuhanChina

Personalised recommendations