Privacy-aware collaboration among untrusted resource constrained devices

Individuals are increasingly encouraged to share private information with service providers. Privacy is relaxed to increase the utility of the data for the provider. This dissertation offers an alternative approach in which raw data stay with individuals and only coarse aggregates are sent to analysts. A challenge is the reliance on constrained devices for data collection. This dissertation demonstrates the practicality of this approach by designing and implementing privacy-aware systems that collect information using low-cost or ultra-low-power microcontrollers. Smart meters can generate certified readings suitable for use in a privacy-preserving system every 10s using a Texas Instruments MSP430 microcontroller. CRFIDs—batteryless devices that operate on harvested energy from RF—can generate encrypted sub-aggregates in 17s to contribute to a privacy-preserving aggregation system that does not rely on a trusted aggregator. A secure communication channel for CRFID tags via untrusted relays achieves a throughput of 18Kbps.

[1]  R. Ness Influence of the HIPAA Privacy Rule on health research. , 2007, JAMA.

[2]  Cynthia Dwork,et al.  Privacy-Preserving Datamining on Vertically Partitioned Databases , 2004, CRYPTO.

[3]  Liqun Chen,et al.  Identity based authenticated key agreement protocols from pairings , 2003, 16th IEEE Computer Security Foundations Workshop, 2003. Proceedings..

[4]  Jan Camenisch,et al.  A Signature Scheme with Efficient Protocols , 2002, SCN.

[5]  David E. Culler,et al.  TinyOS: An Operating System for Sensor Networks , 2005, Ambient Intelligence.

[6]  A. Juels,et al.  Universal Re-encryption for Mixnets , 2004, CT-RSA.

[7]  Atsuko Miyaji,et al.  Efficient Elliptic Curve Exponentiation Using Mixed Coordinates , 1998, ASIACRYPT.

[8]  Bruce Schneier,et al.  Cryptography Engineering - Design Principles and Practical Applications , 2010 .

[9]  Leslie Lamport,et al.  The part-time parliament , 1998, TOCS.

[10]  George Danezis,et al.  Privacy-preserving smart metering , 2011, ISSE.

[11]  David A. Wagner,et al.  Analyzing internet voting security , 2004, CACM.

[12]  D. Jefferson,et al.  Security analysis of SERVE 1 A Security Analysis of the Secure Electronic Registration and Voting Experiment ( SERVE ) , 2004 .

[13]  Jerome H. Saltzer,et al.  End-to-end arguments in system design , 1984, TOCS.

[14]  Chris Hanson,et al.  Amorphous computing , 2000, Commun. ACM.

[15]  Mani B. Srivastava,et al.  Challenges in resource monitoring for residential spaces , 2009, BuildSys '09.

[16]  Richard J. Lipton,et al.  Foundations of Secure Computation , 1978 .

[17]  H. Vincent Poor,et al.  A theory of utility and privacy of data sources , 2010, 2010 IEEE International Symposium on Information Theory.

[18]  H. Y. Lam,et al.  A Novel Method to Construct Taxonomy Electrical Appliances Based on Load Signaturesof , 2007, IEEE Transactions on Consumer Electronics.

[19]  Silvio Micali,et al.  Probabilistic encryption & how to play mental poker keeping secret all partial information , 1982, STOC '82.

[20]  Frank McSherry,et al.  Privacy integrated queries: an extensible platform for privacy-preserving data analysis , 2009, SIGMOD Conference.

[21]  Peter Schaar,et al.  Privacy by Design , 2010 .

[22]  Albert L. Waldo,et al.  Pacemaker and ICD Generator Malfunctions: Analysis of Food and Drug Administration Annual ReportsMaisel WH, Moynahan M, Zuckerman BD, et al (Harvard Med School; US Food and Drug Administration, Rockville, Md): JAMA 295:1901–1906, 2006§ , 2007 .

[23]  Amit Sahai,et al.  Pseudonym Systems , 1999, Selected Areas in Cryptography.

[24]  Georgios Kalogridis,et al.  Privacy for Smart Meters: Towards Undetectable Appliance Load Signatures , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[25]  Peter R. Croll,et al.  Consumer-Centric and Privacy-Preserving Identity Management for Distributed E-Health Systems , 2008, Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008).

[26]  Gregory D. Abowd,et al.  At the Flick of a Switch: Detecting and Classifying Unique Electrical Events on the Residential Power Line (Nominated for the Best Paper Award) , 2007, UbiComp.

[27]  Aggelos Kiayias,et al.  BiTR: Built-in Tamper Resilience , 2011, IACR Cryptol. ePrint Arch..

[28]  Vipul Gupta,et al.  Integrating elliptic curve cryptography into the web's security infrastructure , 2004, WWW Alt. '04.

[29]  Craig Gentry,et al.  Hierarchical ID-Based Cryptography , 2002, ASIACRYPT.

[30]  Adam Dunkels,et al.  Cross-Level Sensor Network Simulation with COOJA , 2006, Proceedings. 2006 31st IEEE Conference on Local Computer Networks.

[31]  W. Maisel,et al.  Pacemaker and ICD generator malfunctions: analysis of Food and Drug Administration annual reports. , 2006, JAMA.

[32]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[33]  W. Maisel,et al.  Pacemaker and ICD generator reliability: meta-analysis of device registries. , 2006, JAMA.

[34]  David Wetherall,et al.  Revisiting Smart Dust with RFID Sensor Networks , 2008, HotNets.

[35]  Colin Boyd,et al.  Advances in Cryptology - ASIACRYPT 2001 , 2001 .

[36]  Eric C. Larson,et al.  GasSense: Appliance-Level, Single-Point Sensing of Gas Activity in the Home , 2010, Pervasive.

[37]  M. Scott Implementing cryptographic pairings , 2007 .

[38]  Florian Kerschbaum,et al.  Plug-In Privacy for Smart Metering Billing , 2010, PETS.

[39]  Burton Rosenberg,et al.  Handbook of Financial Cryptography and Security , 2010 .

[40]  Mario Schootman,et al.  Area-level poverty and preterm birth risk: A population-based multilevel analysis , 2008, BMC public health.

[41]  Kevin Fu,et al.  BAT: Backscatter Anything-to-Tag Communication , 2013 .

[42]  Amit Sahai,et al.  Computing on Encrypted Data , 2008, ICISS.

[43]  Dorothy Ndedi Monekosso,et al.  A review of ant algorithms , 2009, Expert Syst. Appl..

[44]  Hans-Peter Kriegel,et al.  A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise , 1996, KDD.

[45]  Friedemann Mattern,et al.  ICT for Green – How Computers Can Help Us to Conserve Energy , 2010 .

[46]  Torben P. Pedersen Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.

[47]  Ronald L. Rivest,et al.  ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .

[48]  Magdalena Balazinska,et al.  Longitudinal study of a building-scale RFID ecosystem , 2009, MobiSys '09.

[49]  Alanson P. Sample,et al.  Design of an RFID-Based Battery-Free Programmable Sensing Platform , 2008, IEEE Transactions on Instrumentation and Measurement.

[50]  Matt Bishop,et al.  Computer Security: Art and Science , 2002 .

[51]  Yuval Ishai,et al.  Secure Arithmetic Computation with No Honest Majority , 2008, IACR Cryptol. ePrint Arch..

[52]  Luca Maria Gambardella,et al.  Ant Algorithms for Discrete Optimization , 1999, Artificial Life.

[53]  Mihir Bellare,et al.  Relations among Notions of Security for Public-Key Encryption Schemes , 1998, IACR Cryptol. ePrint Arch..

[54]  Sanjit Chatterjee,et al.  On cryptographic protocols employing asymmetric pairings - The role of Ψ revisited , 2011, Discret. Appl. Math..

[55]  Deepak Ganesan,et al.  Flit: a bulk transmission protocol for RFID-scale sensors , 2012, MobiSys '12.

[56]  Craig Gentry,et al.  Fully homomorphic encryption using ideal lattices , 2009, STOC '09.

[57]  Cynthia Dwork,et al.  Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.

[58]  Adam Dunkels,et al.  A database in every sensor , 2011, SenSys.

[59]  Christof Paar,et al.  Privacy Preserving Payments on Computational RFID Devices with Application in Intelligent Transportation Systems , 2012, RFIDSec.

[60]  Kevin Fu,et al.  CCCP: Secure Remote Storage for Computational RFIDs , 2009, USENIX Security Symposium.

[61]  Aggelos Kiayias,et al.  Traceable Signatures , 2004, EUROCRYPT.

[62]  Moni Naor,et al.  Non-malleable cryptography , 1991, STOC '91.

[63]  Elaine Shi,et al.  Privacy-Preserving Stream Aggregation with Fault Tolerance , 2012, Financial Cryptography.

[64]  Jean J. Labrosse,et al.  MicroC/OS-II: The Real Time Kernel , 1998 .

[65]  Michael Scott,et al.  Implementing Cryptographic Pairings on Smartcards , 2006, CHES.

[66]  Ian H. Witten,et al.  The WEKA data mining software: an update , 2009, SKDD.

[67]  Alexander Hinneburg,et al.  DENCLUE 2.0: Fast Clustering Based on Kernel Density Estimation , 2007, IDA.

[68]  Shyam Sadasivan An Introduction to the ARM Cortex-M3 Processor , 2006 .

[69]  Tatsuaki Okamoto,et al.  Statistical Zero Knowledge Protocols to Prove Modular Polynomial Relations , 1997, CRYPTO.

[70]  William M. Daley,et al.  Digital Signature Standard (DSS) , 2000 .

[71]  Chun Zhang,et al.  Storing and querying ordered XML using a relational database system , 2002, SIGMOD '02.

[72]  Prashant J. Shenoy,et al.  Private memoirs of a smart meter , 2010, BuildSys '10.

[73]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[74]  Paulo S. L. M. Barreto,et al.  Efficient pairing computation on supersingular Abelian varieties , 2007, IACR Cryptol. ePrint Arch..

[75]  Prashant J. Shenoy,et al.  Designing Privacy-Preserving Smart Meters with Low-Cost Microcontrollers , 2012, Financial Cryptography.

[76]  John Shawe-Taylor,et al.  Advances in Intelligent Data Analysis VII, 7th International Symposium on Intelligent Data Analysis, IDA 2007, Ljubljana, Slovenia, September 6-8, 2007, Proceedings , 2007, IDA.

[77]  Ricardo Dahab,et al.  Implementing Cryptographic Pairings over Barreto-Naehrig Curves , 2007, Pairing.

[78]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[79]  D·范威尼,et al.  Real-time kernel , 2009 .

[80]  David E. Culler,et al.  Design and implementation of a high-fidelity AC metering network , 2009, 2009 International Conference on Information Processing in Sensor Networks.

[81]  Irit Dinur,et al.  Revealing information while preserving privacy , 2003, PODS.

[82]  Jan Camenisch,et al.  Anonymous credentials on a standard java card , 2009, CCS.

[83]  Morris J. Dworkin,et al.  SP 800-38B. Recommendation for Block Cipher Modes of Operation: the CMAC Mode for Authentication , 2005 .

[84]  Amos Fiat,et al.  How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.

[85]  Kimberley Lamarche,et al.  Take the Challenge: Strategies to Improve Support for Parents of Chronically Ill Children , 2012, Home healthcare nurse.

[86]  M. Panella Associate Editor of the Journal of Computer and System Sciences , 2014 .

[87]  Vinod Vaikuntanathan,et al.  Can homomorphic encryption be practical? , 2011, CCSW '11.

[88]  Elaine Shi,et al.  Privacy-Preserving Aggregation of Time-Series Data , 2011, NDSS.

[89]  Piotr Indyk,et al.  Efficient and reliable low-power backscatter networks , 2012, CCRV.

[90]  David Wetherall,et al.  A software radio-based UHF RFID reader for PHY/MAC experimentation , 2011, 2011 IEEE International Conference on RFID.

[91]  Dieter Gollmann,et al.  Computer Security , 1979, Lecture Notes in Computer Science.

[92]  Benjamin Ransford,et al.  Moo : A Batteryless Computational RFID and Sensing Platform , 2011 .

[93]  Dan Boneh,et al.  Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.

[94]  Moni Naor,et al.  Our Data, Ourselves: Privacy Via Distributed Noise Generation , 2006, EUROCRYPT.

[95]  Jan Camenisch,et al.  Signature Schemes and Anonymous Credentials from Bilinear Maps , 2004, CRYPTO.

[96]  Dan Suciu,et al.  The Boundary Between Privacy and Utility in Data Publishing , 2007, VLDB.

[97]  Silvio Micali,et al.  The knowledge complexity of interactive proof-systems , 1985, STOC '85.

[98]  Carmela Troncoso,et al.  PrETP: Privacy-Preserving Electronic Toll Pricing , 2010, USENIX Security Symposium.

[99]  I. G. R. J. Roker A real-time operating system , 1986 .

[100]  Bruce M. Kapron,et al.  Fast asynchronous byzantine agreement and leader election with full information , 2008, SODA '08.

[101]  David Wetherall,et al.  Recognizing daily activities with RFID-based sensors , 2009, UbiComp.

[102]  C. Castelluccia,et al.  Efficient aggregation of encrypted data in wireless sensor networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.

[103]  Vinod Vaikuntanathan,et al.  Computing Blindfolded: New Developments in Fully Homomorphic Encryption , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.

[104]  Matt Brown,et al.  Invited talk , 2007 .

[105]  Annett Baier Selected Areas in Cryptography , 2005, Lecture Notes in Computer Science.

[106]  Kenneth G. Paterson,et al.  Pairings for Cryptographers , 2008, IACR Cryptol. ePrint Arch..

[107]  Ari Juels,et al.  "Yoking-proofs" for RFID tags , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.

[108]  Kevin Fu,et al.  HICCUPS: health information collaborative collection using privacy and security , 2009, SPIMACS '09.

[109]  Sofya Raskhodnikova,et al.  What Can We Learn Privately? , 2008, 2008 49th Annual IEEE Symposium on Foundations of Computer Science.

[110]  Alfred Menezes,et al.  Software Implementation of the NIST Elliptic Curves Over Prime Fields , 2001, CT-RSA.

[111]  George Danezis,et al.  Privacy-Friendly Aggregation for the Smart-Grid , 2011, PETS.

[112]  E. Lawrence Microgrids and Heterogeneous Power Quality and Reliability , 2008 .

[113]  Suman Nath,et al.  Differentially private aggregation of distributed time-series with transformation and encryption , 2010, SIGMOD Conference.

[114]  Ola Pettersson,et al.  ECG analysis: a new approach in human identification , 2001, IEEE Trans. Instrum. Meas..

[115]  Kevin Fu,et al.  Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[116]  David Blaauw,et al.  Near-Threshold Computing: Reclaiming Moore's Law Through Energy Efficient Integrated Circuits , 2010, Proceedings of the IEEE.

[117]  L. Biel,et al.  ECG analysis: a new approach in human identification , 1999, IMTC/99. Proceedings of the 16th IEEE Instrumentation and Measurement Technology Conference (Cat. No.99CH36309).

[118]  Dimitrios Gunopulos,et al.  Automatic Subspace Clustering of High Dimensional Data , 2005, Data Mining and Knowledge Discovery.

[119]  Elaine Shi,et al.  GUPT: privacy preserving data analysis made easy , 2012, SIGMOD Conference.

[120]  Silvio Micali,et al.  Probabilistic Encryption , 1984, J. Comput. Syst. Sci..

[121]  Adam Dunkels,et al.  Contiki - a lightweight and flexible operating system for tiny networked sensors , 2004, 29th Annual IEEE International Conference on Local Computer Networks.

[122]  S. Ramamurthy,et al.  Passive tag-to-tag communication , 2012, 2012 IEEE International Conference on RFID (RFID).

[123]  Paul Francis,et al.  Towards Statistical Queries over Distributed Private User Data , 2012, NSDI.

[124]  Aaron Roth,et al.  Privately releasing conjunctions and the statistical query barrier , 2010, STOC '11.

[125]  Dong Chao,et al.  Universal Software Radio Peripheral , 2010 .

[126]  Elias Leake Quinn,et al.  Smart Metering and Privacy: Existing Laws and Competing Policies , 2009 .

[127]  Geoff Mulligan,et al.  The 6LoWPAN architecture , 2007, EmNets '07.