Toward trustworthy mobile sensing

Commodity mobile devices have been utilized as sensor nodes in a variety of domains, including citizen journalism, mobile social services, and domestic eldercare. In each of these domains, data integrity and device-owners' privacy are first-class concerns, but current approaches to secure sensing fail to balance these properties. External signing infrastructure cannot attest to the values generated by a device's sensing hardware, while trusted sensing hardware does not allow users to securely reduce the fidelity of readings in order to preserve their privacy. In this paper we examine the challenges posed by the potentially conflicting goals of data integrity and user privacy and propose a trustworthy mobile sensing platform which leverages inexpensive commodity Trusted Platform Module (TPM) hardware.

[1]  Margaret Martonosi,et al.  Location-based trust for mobile user-generated content: applications, challenges and implementations , 2008, HotMobile '08.

[2]  Steve Vandebogart,et al.  Labels and event processes in the Asbestos operating system , 2005, TOCS.

[3]  Deborah Estrin,et al.  A framework for data quality and feedback in participatory sensing , 2007, SenSys '07.

[4]  Eddie Kohler,et al.  Making information flow explicit in HiStar , 2006, OSDI '06.

[5]  Deborah Estrin,et al.  PEIR, the personal environmental impact report, as a platform for participatory sensing systems research , 2009, MobiSys '09.

[6]  Justin Manweiler,et al.  SMILE: encounter-based trust for mobile social services , 2009, CCS.

[7]  Landon P. Cox,et al.  LiveCompare: grocery bargain hunting through participatory sensing , 2009, HotMobile '09.

[8]  Peter M. Chen,et al.  Pocket Hypervisors: Opportunities and Challenges , 2007, Eighth IEEE Workshop on Mobile Computing Systems and Applications.

[9]  Wen Hu,et al.  Towards trustworthy participatory sensing , 2009 .

[10]  Antti Sarela,et al.  A home-based care model of cardiac rehabilitation using digital technology , 2009 .

[11]  M. Hansen,et al.  Participatory Sensing , 2019, Internet of Things.

[12]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[13]  Alec Wolman,et al.  Enabling new mobile applications with location proofs , 2009, HotMobile '09.

[14]  Guilherme Ottoni,et al.  RIFLE: An Architectural Framework for User-Centric Information-Flow Security , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).

[15]  Hari Balakrishnan,et al.  Not-a-Bot: Improving Service Availability in the Face of Botnet Attacks , 2009, NSDI.

[16]  Heng Yin,et al.  Panorama: capturing system-wide information flow for malware detection and analysis , 2007, CCS '07.

[17]  Lodewijk Bos,et al.  Handbook of Digital Homecare , 2009 .

[18]  Alexandre M. Bayen,et al.  Virtual trip lines for distributed privacy-preserving traffic monitoring , 2008, MobiSys '08.

[19]  Michael K. Reiter,et al.  Flicker: an execution infrastructure for tcb minimization , 2008, Eurosys '08.

[20]  Paul Dourish,et al.  Ubiquitous sustainability: Citizen science and activism , 2008 .

[21]  Predrag V. Klasnja,et al.  Exploring Privacy Concerns about Personal Sensing , 2009, Pervasive.

[22]  Jeremie Leguay,et al.  Multi-modal health and activity monitoring framework for elderly people at home , 2008, PETRA '08.

[23]  Emin Gün Sirer,et al.  Device Driver Safety Through a Reference Validation Mechanism , 2008, OSDI.

[24]  Romit Roy Choudhury,et al.  Micro-Blog: sharing and querying content through mobile phones and social participation , 2008, MobiSys '08.

[25]  W. Marsden I and J , 2012 .

[26]  Paul Dourish,et al.  Ubiquitous Sustainability: Citizen Science & Activism (Workshop) , 2008 .