PiMiCo: Privacy Preservation via Migration in Collaborative Mobile Clouds

The proliferation of mobile devices and mobile clouds coupled with a multitude of their sensing abilities is creating interesting possibilities, the sensing capabilities are creating different types and fidelities of data in a geographically distributed manner that can be used to build new kinds of peer-to-peer applications. However, the data generated by these mobile devices can be personal and of a highly confidential nature. While very interesting possibilities exist for collaborating on the diverse, shared data in real time, privacy policies on the data sharing, transport, as well as usage must be clearly specified and respected. The goal of this work is to introduce a privacy preserving data centric programming model for building collaborative applications in large scale mobile clouds and discuss its design. Our work introduces several concepts and leverages privacy annotations and a transparent execution migration framework to achieve our goals. We also present an evaluation using several applications demonstrating that overheads are minimal and can be used in a real-time setting.

[1]  Santosh Pande,et al.  Multiverse: efficiently supporting distributed high-level speculation , 2013, OOPSLA.

[2]  Mahadev Satyanarayanan,et al.  The case for cyber foraging , 2002, EW 10.

[3]  Alec Wolman,et al.  MAUI: making smartphones last longer with code offload , 2010, MobiSys '10.

[4]  James A. Landay,et al.  An architecture for privacy-sensitive ubiquitous computing , 2004, MobiSys '04.

[5]  Kemal Ebcioğlu,et al.  X 10 : Programming for Hierarchical Parallelism and Non-Uniform Data Access ( Extended , 2004 .

[6]  Eric W. Weisstein Subset Sum Problem , 2000 .

[7]  Geoffrey H. Kuenning,et al.  Saving portable computer battery power through remote process execution , 1998, MOCO.

[8]  FoxArmando,et al.  Adapting to network and client variability via on-demand dynamic distillation , 1996 .

[9]  Ke Xu,et al.  A Survey of Research on Mobile Cloud Computing , 2011, 2011 10th IEEE/ACIS International Conference on Computer and Information Science.

[10]  Chonho Lee,et al.  A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..

[11]  Bill Yeager,et al.  Java mobile agents on project JXTA peer-to-peer platform , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.

[12]  Xue Liu,et al.  PDA: Privacy-Preserving Data Aggregation for Information Collection , 2011, TOSN.

[13]  Stephanie Forrest,et al.  Anonymous Data Collection in Sensor Networks , 2007, 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services (MobiQuitous).

[14]  Mahadev Satyanarayanan,et al.  Self-tuned remote execution for pervasive computing , 2001, Proceedings Eighth Workshop on Hot Topics in Operating Systems.

[15]  Laura Vasiliu,et al.  CloneCloud: Elastic Execution between Mobile Device and Cloud , 2012 .

[16]  Armando Solar-Lezama,et al.  A language for automatically enforcing privacy policies , 2012, POPL '12.

[17]  Santosh Pande,et al.  Efficient application migration under compiler guidance , 2005, LCTES '05.

[18]  Gabriel Antoniu,et al.  An Efficient and Transparent Thread Migration Scheme in the PM2 Runtime System , 1999, IPPS/SPDP Workshops.

[19]  Minho Shin,et al.  Anonysense: privacy-aware people-centric sensing , 2008, MobiSys '08.

[20]  Deborah Estrin,et al.  Personal data vaults: a locus of control for personal data streams , 2010, CoNEXT.

[21]  Manolis Terrovitis,et al.  Privacy preservation in the dissemination of location data , 2011, SKDD.

[22]  Alexandre M. Bayen,et al.  Virtual trip lines for distributed privacy-preserving traffic monitoring , 2008, MobiSys '08.

[23]  Michael Gertz,et al.  Security and privacy for geospatial data: concepts and research directions , 2008, SPRINGL '08.

[24]  Claude Castelluccia,et al.  A security framework for privacy-preserving data aggregation in wireless sensor networks , 2011, TOSN.

[25]  Byung-Gon Chun,et al.  CloneCloud: elastic execution between mobile device and cloud , 2011, EuroSys '11.

[26]  David R. Cheriton,et al.  The V distributed system , 1988, CACM.

[27]  Sheikh Iqbal Ahamed,et al.  Preserving privacy in wireless sensor networks using reliable data aggregation , 2011, SIAP.

[28]  Laxmikant V. Kalé,et al.  CHARM++: a portable concurrent object oriented system based on C++ , 1993, OOPSLA '93.

[29]  Xi Wang,et al.  Improving application security with data flow assertions , 2009, SOSP '09.

[30]  Sape J. Mullender,et al.  Protium, an infrastructure for partitioned applications , 2001, Proceedings Eighth Workshop on Hot Topics in Operating Systems.

[31]  Andrew C. Myers,et al.  Protecting privacy using the decentralized label model , 2000, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].